您的位置: 专家智库 > >

国家自然科学基金(60373087)

作品数:22 被引量:460H指数:5
相关作者:张焕国王玉华王邦菊沈昌祥黄继武更多>>
相关机构:武汉大学河南工业大学华中农业大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金博士科研启动基金更多>>
相关领域:自动化与计算机技术理学电子电信更多>>

文献类型

  • 22篇期刊文章
  • 4篇会议论文

领域

  • 22篇自动化与计算...
  • 2篇电子电信
  • 2篇理学

主题

  • 5篇信任计算
  • 5篇网络
  • 5篇密码
  • 3篇计算机
  • 3篇TRUSTE...
  • 3篇BASED_...
  • 3篇LFSR
  • 2篇信息安全
  • 2篇智能卡
  • 2篇匿名
  • 2篇网络安全
  • 2篇密码学
  • 2篇口令
  • 2篇口令认证
  • 2篇安全工作
  • 2篇安全协议
  • 2篇PROTOC...
  • 2篇TPM
  • 2篇ATTACK
  • 1篇电路

机构

  • 5篇武汉大学
  • 3篇河南工业大学
  • 2篇华中农业大学
  • 1篇上海交通大学
  • 1篇中山大学
  • 1篇中国科学院软...
  • 1篇中国人民解放...

作者

  • 5篇张焕国
  • 3篇王玉华
  • 2篇王邦菊
  • 1篇詹静
  • 1篇冯登国
  • 1篇王鹃
  • 1篇曹珍富
  • 1篇管爱红
  • 1篇黄继武
  • 1篇侯志强
  • 1篇王张宜
  • 1篇沈昌祥

传媒

  • 14篇Wuhan ...
  • 2篇计算机工程
  • 1篇武汉大学学报...
  • 1篇通信学报
  • 1篇中国科学(E...
  • 1篇Semico...
  • 1篇Scienc...
  • 1篇Journa...

年份

  • 1篇2009
  • 4篇2008
  • 7篇2007
  • 10篇2006
  • 4篇2005
22 条 记 录,以下是 1-10
排序方式:
Thermal Noise Random Number Generator Based on LFSR
2006年
With the rapid development of cryptography, the strength of security protocols and encryption algorithms consumedly relies on the quality of random number. In many cryptography applications, higher speed is one of the references required. A new security random number generator architecture is presented. Its philosophy architecture is implemented with FPGA, based on the thermal noise and linear feedback shift register(LFSR). The thermal noise initializes LFSRs and is used as the disturbed source of the system to ensure the unpredictability of the produced random number and improve the security strength of the system. Parallel LFSRs can produce the pseudo-random numbers with long period and higher speed. The proposed architecture can meet the requirements of high quality and high speed in cryptography.
WANG Yu-huaNIU Li-ping
关键词:密码学安全性
Evolutionary Design of Boolean Functions
<正> We use evolutionary computing to synthesize Boolean functions randomly. By using specific crossover and mu...
WANG Zhang-yi, ZHANG Huan-guo, QIN Zhong-ping, MENG Qing-shu School of Computer, Wuhan University, Wuhan 430072, Hubei, China
文献传递
Analysis of affinely equivalent Boolean functions被引量:5
2007年
By some basic transforms and invariant theory, we give two results: 1) an algorithm, which can be used to judge if two Boolean functions are affinely equivalent and to obtain the equivalence relationship if they are equivalent. This is useful in studying Boolean functions and in engineering. For example, we classify all 8-variable homogeneous bent functions of degree 3 into two classes; 2) Reed-Muller codes R(4,6)/R(1,6), R(3,7)/R(1,7) are classified efficiently.
MENG QingShuZHANG HuanGuoYANG MinWANG ZhangYi
关键词:布尔函数不变量REED-MULLER码
A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents被引量:1
2006年
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.
GUAN HuanmeiMENG XuejunZHANG Huanguo
XEN Virtual Machine Technology and Its Security Analysis被引量:5
2007年
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine tech- nology become the focus of people’s attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future.
XUE HaifengQING SihanZHANG Huanguo
关键词:虚拟计算机安全技术硬件XEN
安全的非智能卡匿名口令认证方案被引量:2
2008年
对Rhee-Kwon-Lee非智能卡(SC)口令认证方案进行安全分析发现,此方案易受内部攻击,不能实现口令自由更换,并且计算效率不高。基于此提出了一种新的基于散列函数的非SC匿名口令认证方案,新方案采用匿名身份与口令混淆,并结合时间戳来提高安全性和计算效率。新方案弥补了Rhee-Kwon-Lee方案的安全缺陷。而且,与其他同类非SC方案相比较,新方案支持文中理想的非SC口令认证方案的所有安全需求,安全性能最好且计算量小。
王邦菊张焕国王玉华
关键词:口令口令认证散列函数智能卡
Practical Internet Voting Protocol without Strong Physical Assumption
2007年
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The proposed Internet voting protocol does not apply the strong physical assumptions and has the properties of privacy, completeness, soundness, fairness, invariableness, and universal verifiability, receipt-free and coercion-resistant. At the same time it solves some problems in other internet voting proto- cols and the verification progress of universal verifiability is sim- ple and efficient.
MENG BoZHANG Huanguo
关键词:安全协议加密技术
A Fast Attack Algorithm on the MD5 Hash Function被引量:5
2006年
The sufficient conditions for keeping desired differential path of MD5 was discussed. By analyzing the expanding of subtraction difference, differential characters of Boolean functions, and the differential characters of shift rotation, the sufficient conditions for keeping desired differential path could be obtained. From the differential characters of shift rotation, the lacked sufficient conditions were found. Then an algorithm that reduces the number of trials for finding collisions were presented. By restricting search space, search operation can be reduced to 2 34 for the first block and 2 30 for the second block. The whole attack on the MD5 can be accomplished within 20 hours using a PC with 1.6 G CPU.
王张宜张焕国覃中平孟庆树
关键词:计算方法MD5脉冲干扰
A New Secure Password Authentication Scheme Using Smart Cards
2008年
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can satisfy all the listed ideal security requirements and has the following merits: ① it can resist all the attacks listed in introduction; ② less storage mem- ory requirement due to no verification table stored in server; ③ low computational cost due to hash functions based operations; ④ even if the smart card is lost, the new system is still secure; ⑤ As user identity is anonymous, this scheme is more practical. The new proposed scheme can be applied in source constraint networks.
WANG Bangju1,2, WANG Yuhua3, ZHANG Huanguo1 1. School of Computer, Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education, Wuhan 430072, Hubei, China
关键词:智能卡身份识别密码系统
Design and Implementation of a Bootstrap Trust Chain被引量:1
2006年
The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on the Windows and today’s commodity hardware, merely depends on availability of an embedded security module (ESM). ESM and security enhanced BIOS is the root of trust, PMBR (Pre-MBR) checks the integrity of boot data and Windows kernel, which is a checking agent stored in ESM. In the end, the paper analyzed the mathematic expression of the chain of trust and the runtime performance compared with the common booting process. The trust chain bootstrap greatly strengthens the security of personal computer system, and affects the runtime performance with only adding about 12% booting time.
YU Fajiang ZHANG Huanguo
关键词:信任计算ESM
共3页<123>
聚类工具0