您的位置: 专家智库 > >

国家自然科学基金(60525201)

作品数:6 被引量:26H指数:3
相关作者:王薇王小云刘明洁毕经国韩立东更多>>
相关机构:山东大学清华大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划更多>>
相关领域:电子电信自动化与计算机技术一般工业技术更多>>

文献类型

  • 6篇中文期刊文章

领域

  • 3篇电子电信
  • 2篇自动化与计算...
  • 1篇一般工业技术

主题

  • 2篇码分
  • 2篇密码
  • 2篇密码分析
  • 2篇ATTACK
  • 1篇密码算法
  • 1篇密码体制
  • 1篇密码学
  • 1篇公钥
  • 1篇公钥密码
  • 1篇公钥密码算法
  • 1篇公钥密码体制
  • 1篇REPLAC...
  • 1篇SECURE
  • 1篇V3
  • 1篇VERIFI...
  • 1篇WITNES...
  • 1篇ABC
  • 1篇AR
  • 1篇ARIA
  • 1篇CON

机构

  • 2篇清华大学
  • 2篇山东大学

作者

  • 1篇韩立东
  • 1篇王小云
  • 1篇王薇
  • 1篇毕经国
  • 1篇刘明洁

传媒

  • 3篇Tsingh...
  • 1篇电子与信息学...
  • 1篇通信学报
  • 1篇Scienc...

年份

  • 1篇2010
  • 3篇2009
  • 2篇2008
6 条 记 录,以下是 1-6
排序方式:
两种背包型的公钥密码算法的安全性分析被引量:6
2010年
背包型公钥密码体制是几个最早的公钥密码体制之一,分析其安全性十分重要。该文对两种抵抗Shamir攻击和低密度攻击的背包型公钥密码体制进行了安全性分析,提出一种新的攻击方法,指出可以利用多项式时间算法以很大的概率找到私钥,从而破解了它们。
韩立东刘明洁毕经国
关键词:公钥密码体制密码分析
Certificateless Encryption Scheme Secure in Standard Model被引量:2
2009年
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless encryption scheme is presented which is IND-CCA secure against both Type I and Type II at- tackers without random oracle. This encryption scheme can defend against the malicious key generation center attack, and can reach Girault's trusted level 3 as in traditional public key infrastructure-based cryp- tography. This certificateless encryption scheme has a shorter public key than other schemes in the stan- dard model.
张国艳王小云
Dedicated Linear Attack on ARIA Version 1.0
2009年
ARIA is a new block cipher designed as the block cipher standard of South Korea. The current version is 1.0, which is an improvement of version 0.8 with the security using four kinds of S-boxes instead of two and an additional two rounds of encryptions. These improvements are designed to prevent the dedicated linear attack on ARIA version 0.8 by the four different kinds of S-boxes. This paper presents 12 linear approximations of a single round function that succeeds in attacking ARIA version 1.0 on 7, 9, or 9 rounds for key sizes of 128, 192, or 256 bits using any of these approximations. The corresponding data complexities are 2^87, 2^119, and 2^119, the counting complexities are 1.5×2^88, 2^119, and 2^119, the memory required for each attack on all three key versions is 2^64 bits and there are 12 weak key classes. These results are similar to the dedicated linear attack on ARIA version 0.8 and show that the improved version can also not effectively resist this type of attack.
李申华张海纳王小云
关键词:ARIA
Simplified Design for Concurrent Statistical Zero-Knowledge Arguments
2009年
This paper shows that the protocol presented by Goyal et al. can be further simplified for a one-way function, with the simplified protocol being more practical for the decisional Diffie-Hellman assumption. Goyal et al. provided a general transformation from any honest verifier statistical zero-knowledge argument to a concurrent statistical zero-knowledge argument. Their transformation relies only on the existence of one-way functions. For the simplified transformation, the witness indistinguishable proof of knowledge protocols in "parallel" not only plays the role of preamble but also removes some computational zero-knowledge proofs, which Goyal et al. used to prove the existence of the valid openings to the commitments. Therefore, although some computational zero-knowledge proofs are replaced with a weaker notion, the witness indistinguishable protocol, the proof of soundness can still go through.
魏普文张国艳张立江王小云
关键词:CONCURRENT
对CLEFIA算法的饱和度分析被引量:11
2008年
评估了2007年提出的分组加密算法CLEFIA抗饱和度分析的强度。指出并改正了CLEFIA的设计者Shirai等人提出的8圈区分器的错误。将白化密钥和子密钥结合,并利用分别征服策略减少需要猜测的密钥个数,采用"部分和"技术以降低时间复杂度。从而,将对10圈CLEFIA的饱和度攻击扩展到11圈的CLEFIA-128/192/256。此外,该攻击还可应用到12圈的CLEFIA-192/256和13圈的CLEFIA-256。
王薇王小云
关键词:密码学密码分析
Fast correlation attack on streamcipher ABC v3被引量:7
2008年
ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2^103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 2^50.56 operations. The attack can be applied to ABC vl and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC vl as well as ABC v2 decreases to 2^97 + 20^95.19,It reveals that ABC v3 incurs more weak keys than that of ABC vl and v2.
ZHANG HaiNaLI LinWANG XiaoYun
关键词:CRYPTANALYSIS
共1页<1>
聚类工具0