您的位置: 专家智库 > >

国家自然科学基金(U1135004)

作品数:14 被引量:24H指数:3
相关作者:白国强蔡冰清程鹏邱爽陈弘毅更多>>
相关机构:清华大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划湖北省自然科学基金更多>>
相关领域:电子电信自动化与计算机技术更多>>

文献类型

  • 9篇中文期刊文章

领域

  • 7篇电子电信
  • 2篇自动化与计算...

主题

  • 3篇CRYPTA...
  • 3篇CRYPTO...
  • 2篇BASED_...
  • 1篇信道
  • 1篇硬件
  • 1篇硬件实现
  • 1篇杂凑
  • 1篇杂凑函数
  • 1篇杂凑算法
  • 1篇扫描电镜
  • 1篇探针
  • 1篇密码
  • 1篇功耗
  • 1篇分组密码
  • 1篇NATIVE
  • 1篇POST
  • 1篇PROBLE...
  • 1篇PSEUDO
  • 1篇QUANTU...
  • 1篇QUANTU...

机构

  • 3篇清华大学

作者

  • 3篇白国强
  • 1篇程鹏
  • 1篇陈弘毅
  • 1篇邱爽
  • 1篇蔡冰清

传媒

  • 3篇微电子学与计...
  • 2篇Wuhan ...
  • 2篇Tsingh...
  • 2篇China ...

年份

  • 6篇2016
  • 2篇2015
  • 1篇2014
14 条 记 录,以下是 1-9
排序方式:
Cryptanalysis of Cryptosystems Based on General Linear Group被引量:1
2016年
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.
Jianwei JiaJinhui LiuHuanguo Zhang
关键词:CRYPTOGRAPHYCRYPTANALYSIS
Key Exchange Protocol Based on Tensor Decomposition Problem被引量:1
2016年
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.
MAO ShaowuZHANG HuanguoWU WanqingZHANG PeiSONG JunLIU Jinhui
SM3杂凑算法的流水线结构硬件实现被引量:8
2015年
提出一种流水线结构的硬件实现策略,同时采用CSA加法器进行关键路径压缩,极大地提高了工作频率和算法的计算速率.在191 MHz时钟频率下,实现了73.54Gb/s的高吞吐率.
蔡冰清白国强
关键词:杂凑函数硬件实现
分组密码线性部件的抗功耗攻击特性
2015年
通过对FPGA实现的分组密码SM4进行实际攻击,发现了SM4的线性部件使其具有抗差分功耗攻击的能力,研究并归纳了一般分组密码中线性部件的结构特性和其抗功耗攻击能力的关系,从而提出了一种针对分组密码的算法设计层面的功耗攻击防护措施.完成了对硬件实现的国密SM4算法的成功的DPA攻击.
邱爽白国强陈弘毅
关键词:分组密码侧信道攻击
Towards Fast Repackaging and Dynamic Authority Management on Android
2016年
In order to enhance the security of Android applications, we propose a repackaging and dynamic authority management scheme based on Android application reinforcement methods Instead of using root privileges and system modification, we introduce a user-level sandbox, which utilizes the native C-level interception mechanism, to further reinforce the risk applications and improve the entire security of Android system. Additionally, by importing and improving the repackaging features, this proposed scheme reduces the potential risks of applications and achieves the goal of the dynamic monitoring of permissions. Finally, a comprehensive evaluation, including efficiency analysis and detection evaluation with 1 000 malwares, whose overall average success rate is about 96%, shows the feasibility and univer- sality of the proposed scheme.
SONG JunZHANG MohanHAN ChunlingWANG KaixinZHANG Huanguo
A Class of the Hamming Weight Hierarchy of Linear Codes with Dimension 5被引量:1
2014年
The weight hierarchy of a [n, k; q] linear code C over Fq is the sequence (d1,…, dr,… , dk), where dr is the smallest support weight of an r-dimensional subcode of C. In this paper, by using the finite projective geometry method, we research a class of weight hierarchy of linear codes with dimension 5. We first find some new pre- conditions of this class. Then we divide its weight hierarchies into six subclasses, and research one subclass to determine nearly all the weight hierarchies of this subclass of weight hierarchies of linear codes with dimension 5.
Guoxiang HuHuanguo ZhangLijun WangZhe Dong
EEPROM的扫描电镜探测和探针攻击被引量:1
2016年
阐述两种针对芯片的侵入式攻击方法,即扫描电镜(SEM)探测和探针攻击.攻击的目标都是从EEPROM中提取数据内容,EEPROM因为通常会存储认证信息和个人密钥等敏感信息.描述两个实验过程,第一个实验利用非易失性存储器的存储特点,对一个通用存储器芯片进行预处理后直接使用SEM进行观测,试图从图像上辨别不同存储状态的单元并且定位单个存储器单元;第二个实验对某款芯片预处理后,针对单个EEPROM存储器单元晶体管各端口进行电学连接,制作焊盘(PAD),之后使用探针探测存储器单元工作电信号,从而区分不同状态的单元.
程鹏白国强
关键词:EEPROMSEM
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
2016年
Advances in quantum computation threaten to break public key eryptosystems that are based on the difficulty of fac- torization or the difficulty of discrete logariths, although , no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures up to now. The proposed new quasi-inverse based cryptography scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we illustrate that two of the quasi-inverse based cryptography are vulnerable to a structural attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. In addition, we conduct a detailed analysis on attack methods and provide some improved suggestions on these two schemes.
LIU JinhuiZHANG HuanguoJIA Jianwei
关键词:CRYPTOGRAPHYCRYPTANALYSIS
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems被引量:3
2016年
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been found for solving certain mathematical problems in non-commutative algebraic structures. Recently, two novel public-key encryption schemes, BKT-B cryptosystem and BKT-FO cryptosystem, based on factorization problems have been proposed at Security and Communication Networks in 2013. In this paper we show that these two schemes are vulnerable to structural attacks and linearization equations attacks, and that they only require polynomial time complexity to obtain messages from associated public keys. We conduct a detailed analysis of the two attack methods and show corresponding algorithmic descriptions and efficiency analyses. In addition, we provide some improvement suggestions for the two public-key encryption schemes.
Jinhui LiuAiwan FanJianwei JiaHuanguo ZhangHouzhen WangShaowu Mao
关键词:CRYPTOGRAPHYCRYPTANALYSIS
共1页<1>
聚类工具0