您的位置: 专家智库 > >

国家自然科学基金(61202386)

作品数:13 被引量:19H指数:3
相关作者:唐明高剑邱镇龙彭红波张焕国更多>>
相关机构:武汉大学北京南瑞智芯微电子科技有限公司教育部更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划湖北省自然科学基金更多>>
相关领域:电子电信自动化与计算机技术理学更多>>

文献类型

  • 7篇中文期刊文章

领域

  • 4篇自动化与计算...
  • 3篇电子电信

主题

  • 4篇CRYPTO...
  • 3篇CRYPTA...
  • 2篇信道
  • 2篇BASED_...
  • 1篇信道分析
  • 1篇掩码
  • 1篇嵌入式
  • 1篇嵌入式平台
  • 1篇轻量
  • 1篇轻量级
  • 1篇防护方法
  • 1篇PERIOD
  • 1篇POST
  • 1篇PROBLE...
  • 1篇PSEUDO
  • 1篇QUANTU...
  • 1篇QUANTU...
  • 1篇RESIST...
  • 1篇RSM
  • 1篇AL

机构

  • 2篇武汉大学
  • 1篇教育部
  • 1篇北京南瑞智芯...

作者

  • 2篇唐明
  • 1篇张焕国
  • 1篇邱镇龙
  • 1篇高剑
  • 1篇彭红波

传媒

  • 2篇Wuhan ...
  • 2篇China ...
  • 1篇武汉大学学报...
  • 1篇山东大学学报...
  • 1篇Tsingh...

年份

  • 1篇2017
  • 5篇2016
  • 1篇2014
13 条 记 录,以下是 1-7
排序方式:
Key Exchange Protocol Based on Tensor Decomposition Problem被引量:1
2016年
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.
MAO ShaowuZHANG HuanguoWU WanqingZHANG PeiSONG JunLIU Jinhui
A New Quantum Algorithm for Computing RSA Ciphertext Period被引量:2
2017年
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem.In this paper,we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciphertext C.The new algorithm has the following properties:1)recovering the RSA plaintext M from the ciphertext C without factoring n; 2)avoiding the even order of the element; 3)having higher success probability than Shor's; 4)having the same complexity as Shor's.
WANG YahuiYAN SongyuanZHANG Huanguo
关键词:CRYPTOLOGY
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
2016年
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.
Jianwei JiaJinhui LiuHuanguo Zhang
关键词:CRYPTOGRAPHYCRYPTANALYSIS
嵌入式平台下ZUC算法的侧信道频域攻击被引量:3
2014年
针对嵌入式设备在执行ZUC加密运算过程中的侧信道信息泄露问题,提出了一种基于傅里叶变换的侧信道频域攻击。以嵌入式平台上的ZUC加密运算设计实现为分析目标,进行侧信道时域攻击和频域攻击的对比实验。实验结果表明,侧信道频域攻击远比时域攻击更高效,且适用于其他加密算法及多种设计平台。
唐明高剑孙乐昊邱镇龙
关键词:侧信道攻击嵌入式
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
2016年
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures up to now. The proposed new quasi-inverse based cryptography scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we illustrate that two of the quasi-inverse based cryptography are vulnerable to a structural attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. In addition, we conduct a detailed analysis on attack methods and provide some improved suggestions on these two schemes.
LIU JinhuiZHANG HuanguoJIA Jianwei
关键词:CRYPTOGRAPHYCRYPTANALYSIS
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
2016年
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been found for solving certain mathematical problems in non-commutative algebraic structures. Recently, two novel public-key encryption schemes, BKT-B cryptosystem and BKT-FO cryptosystem, based on factorization problems have been proposed at Security and Communication Networks in 2013. In this paper we show that these two schemes are vulnerable to structural attacks and linearization equations attacks, and that they only require polynomial time complexity to obtain messages from associated public keys. We conduct a detailed analysis of the two attack methods and show corresponding algorithmic descriptions and efficiency analyses. In addition, we provide some improvement suggestions for the two public-key encryption schemes.
Jinhui LiuAiwan FanJianwei JiaHuanguo ZhangHouzhen WangShaowu Mao
关键词:CRYPTOGRAPHYCRYPTANALYSIS
针对RSM轻量防护方法的能量分析被引量:1
2016年
以已有的轻量级RSM掩码方案为研究对象,利用掩码汉明重量的差异提出了一种新型攻击方法,并在此基础上,利用加密过程中间值的汉明重量差异进行能量分析,将该攻击方法扩展成为了掩码汉明重量无差异的对抗方法.实验结果表明,本文的攻击方法可还原单次加密的掩码值,成功率达到93.1%,经DPA Contest官网所提供数据验证,该攻击方法可成功还原掩码并最终完成密钥恢复.
唐明彭红波胡晓波张焕国
共1页<1>
聚类工具0