首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
数学   10篇
物理学   2篇
  2017年   1篇
  2012年   1篇
  2011年   2篇
  2007年   3篇
  2006年   1篇
  2000年   1篇
  1996年   1篇
  1995年   1篇
  1992年   1篇
排序方式: 共有12条查询结果,搜索用时 0 毫秒
11.
Xiang Peng  Peng Zhang   《Optik》2006,117(11):525-531
We present a security analysis to the virtual optics (VO)-based cryptosystems, in which several aspects affecting security strength of the algorithm involved in such systems are considered. We start with the evaluation of the computational complexities of virtual-optical-imaging (VOI)-based and virtual-optical-holography (VOH)-based cryptosystems as the security strength of a cryptosystem is relevant to its computational complexity. Furthermore, we assess the key length and key space of both VOI- and VOH-based cryptosystems, respectively, to show their performance. Other cryptographic properties such as confusion and diffusion, nonlinearity, as well as resistant capacity to potential attacks are also explored to illustrate the security of VO-based cryptosystem. Finally the scheme of hardware encryption based on virtual optics is briefly discussed.  相似文献   
12.
In Eurocrypt 2004 Augot and Finiasz presented a coding theoretic public key cryptosystem that suggests a new approach for designing such systems based on the Polynomial Reconstruction Problem (PR). Their cryptosystem is an instantiation of this approach under a specific choice of parameters which, given the state of the art of coding theory, we show in this work to be sub-optimal. Coron showed how to attack the Augot and Finiasz cryptosystem. A question left open is whether the general approach suggested by the cryptosystem works or not. In this work, we show that the general approach (rather than only the instantiation) is broken as well.   相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号