您的位置: 专家智库 > >

国家自然科学基金(60573031)

作品数:10 被引量:33H指数:3
相关作者:谷大武李玮任艳丽刘亚更多>>
相关机构:上海交通大学更多>>
发文基金:国家自然科学基金教育部“新世纪优秀人才支持计划”更多>>
相关领域:自动化与计算机技术理学电子电信农业科学更多>>

文献类型

  • 9篇期刊文章
  • 1篇会议论文

领域

  • 7篇自动化与计算...
  • 2篇电子电信
  • 1篇交通运输工程
  • 1篇农业科学
  • 1篇理学

主题

  • 2篇密码
  • 2篇可证明安全
  • 2篇AGAINS...
  • 2篇ZERO-K...
  • 2篇PRECIS...
  • 2篇CRYPTO...
  • 1篇旁路攻击
  • 1篇签密
  • 1篇注记
  • 1篇码分
  • 1篇密码方案
  • 1篇密码分析
  • 1篇密文
  • 1篇可证明安全性
  • 1篇互素
  • 1篇公钥
  • 1篇公钥密码
  • 1篇公钥密码方案
  • 1篇安全性
  • 1篇OVER

机构

  • 4篇上海交通大学

作者

  • 4篇谷大武
  • 2篇任艳丽
  • 1篇李玮
  • 1篇刘亚

传媒

  • 3篇Journa...
  • 2篇Wuhan ...
  • 1篇通信学报
  • 1篇计算机应用研...
  • 1篇纯粹数学与应...
  • 1篇Journa...

年份

  • 1篇2010
  • 1篇2009
  • 5篇2008
  • 1篇2007
  • 2篇2006
10 条 记 录,以下是 1-10
排序方式:
可证明安全的公钥签密方案
认证性与保密性是密码学的基本功能。签密方案能同时实现加密与签名,且实现代价小于两者之和。可证明安全是证明密码方案安全性的一种有效的方法。据我们所知,所有可证明安全的签密方案都基于椭圆曲线上的双线性对与对称加密算法。本文基...
任艳丽谷大武
关键词:可证明安全签密不可伪造性
文献传递
Further Analysis of Block Ciphers against Timing Attacks
2006年
Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers.
LI WeiGU Dawu
关键词:REDUCTION
Efficient Scalar Multiplication for Elliptic Curves over Binary Fields
2008年
Scalar multiplication [n]P is the kernel and the most time-consuming operation in elliptic curve cryptosystems. In order to improve scalar multiplication, in this paper, we propose a tripling algorithm using Lopez and Dahab projective coordinates, in which there are 3 field multiplications and 3 field squarings less than that in the Jacobian projective tripling algorithm. Furthermore, we map P to(φε^-1(P), and compute [n](φε^-1(P) on elliptic curve Eε, which is faster than computing [n]P on E, where φε is an isomorphism. Finally we calculate (φε([n]φε^-1(P)) = [n]P. Combined with our efficient point tripling formula, this method leads scalar multiplication using double bases to achieve about 23% improvement, compared with Jacobian projective coordinates.
GU Haihua GU Dawu LIU Ya
进一步优化关于素数无穷性的Euclid证法被引量:1
2008年
令pi表示第i个素数.本文主要目的是用初等的方法构造性证明了,当r≥4时区间Ir中至少有2[log2(2r)]+1个素数,这一结果是Aldaz和Bravo对区间Ir中素数的个数的估值两倍.
刘亚谷大武
关键词:互素
Precise Zero-Knowledge Arguments with Poly-logarithmic Efficiency
2009年
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols.
丁宁谷大武
关键词:CRYPTOGRAPHYZERO-KNOWLEDGE
基于密钥编排故障的SMS4算法的差分故障分析被引量:23
2008年
提出并讨论了一种针对SMS4密钥编排方案的差分故障攻击方法。该方法采用面向字节的随机故障模型,通过在SMS4算法的密钥编排方案中导入故障,仅需要8个错误密文即可恢复SMS4算法的128bit原始密钥。数学分析和实验结果表明,该方法不仅扩展了故障诱导的攻击范围,而且提高了故障诱导的攻击成功率,减少了错误密文数,为故障攻击其他分组密码提供了一种通用的分析手段。
李玮谷大武
关键词:密码分析旁路攻击差分故障分析SMS4
Formalization of Fault Analysis and a New Approach of Fault Detection
2006年
Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on SPN have been given. The overhead and time tolerance of fault detection have been discussed. The pseudo-blinding method to detect fault attack is introduced, and the balance of the security, overhead and time tolerance based on the evaluation could be made.
王超谷大武祝力
On Sequential Composition of Precise Zero-Knowledge
2010年
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the code of verifier in almost the black-box way.We call such subclass emulated black-box zero-knowledge protocols.Our lemma provides better precisions for sequential composition of such protocols.
丁宁谷大武
关键词:CRYPTOGRAPHYZERO-KNOWLEDGE
公钥密码方案的可证明安全性注记被引量:3
2008年
长期以来,人们对于可证明安全的认识存在着一些误区:可证明安全的方案一定是安全的,归约证明紧的一定比归约松的更安全。总结了与方案安全性有关的几个要素,分析了公钥密码方案可证明安全的实质,纠正了以往的一些错误认识,指出可证明安全的方案不一定是安全的,归约紧的方案不一定比归约松的更安全。方案的安全性要综合四个要素一起考虑,总的来说,攻击模型越难,攻击目标越容易,困难问题越难,而归约证明最紧的方案越安全。
任艳丽谷大武
关键词:可证明安全
Resistance against side channel attack for RSA cryptosystem
2008年
Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based (the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differential power analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, an improvement for resisting fault attack is proposed, which can reduce extra computation time.
祝力谷大武王超
共1页<1>
聚类工具0