全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Shenghui Su , Tao Xie , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2016
摘要:Abstract(#br)To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non-iterative hash function called JUNA that is based on a multivariate permutation problem and an anomalous subset product problem to which no sub...
作者:Shuwang Lü , Maozhi Xu
来源:[J].Theoretical Computer Science(IF 0.489), 2016
摘要:Abstract(#br)This paper gives the definition and property of a bit-pair shadow, and devises the three algorithms of a public key cryptoscheme called JUOAN that is based on a multivariate permutation problem and an anomalous subset product problem to which no subexponential t...
作者:Shenghui Su , Shuwang Lü , Xiubin Fan
来源:[J].Theoretical Computer Science(IF 0.489), 2011, Vol.412 (39), pp.5374-5386
摘要:Abstract(#br)It is well known that the inverse function of y = x with the derivative y ′ = 1 is x = y , the inverse function of y = c with the derivative y ′ = 0 is nonexistent, and so on. Hence, on the assumption that the noninvertibility of the univariate increasing functi...
作者:Shenghui Su , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2012, Vol.426-427, pp.91-117
摘要:Abstract(#br)In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and six characteristics of a prototypal public key cryptosystem which is used for encryption and signature, and is based on three new pro...
作者:Shuwang Lü , Hong Pan
来源:[J].Journal of Electronics (China), 2010, Vol.27 (4), pp.458-464
摘要:Abstract(#br)Based on grow tree composite model, Finite Field Wavelet Grow Tree (FW-GT) was proposed in this paper. FW-GT is a novel framework to be used in data encryption enhancing data security. It is implemented by replacement operator and wavelet operator. Forward integ...
作者:Shuwang Lü , Zhenhua Liu
来源:[B].Lecture Notes in Computer Science2006
摘要:AbstractIn this paper, we give a new identity-based signcryption scheme based on pairings. It is secure against adaptive chosen ciphertext and identity attack in the random oracle with the Modified Bilinear Diffie-Hellman assumption [14]. It produces shorter ciphertext than any o...
作者:... Chunfu Jia , Shuwang Lü , Zhenhua Liu
来源:[B].Lecture Notes in Computer Science2007
摘要:Abstract Motivated by frequency hopping, port and address hopping technique is thought to be essential and efficient for active cyber-defense and intelligence security. A novel scheme of timestamp-based synchronization is proposed and a prototype using port and add...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×