[HTML][HTML] 安全协议实施安全性分析综述

孟博, 鲁金钿, 王德军, 何旭东 - 山东大学学报(理学版), 2018 - lxbwk.njournal.sdu.edu.cn
… A survey on computationally sound formal analysis of cryptographic protocol[J]. Chinese … A
survey:security verification analysis of cryptographic protocols implementations on real code[J/…

如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… In PQC, the cryptographic computation shall resist not only … Some features in PQC, such as
modular arithmetic in finite fields… scheme, which relies on code-based anti-quantum problem. …

LWR, MPLWE 和MPLWR 上的全同態加密

洪逸霖 - 2020 - tdr.lib.ntu.edu.tw
… Our work in modular switching step is to make sure the method described in [11] still work
this … we can solve this problem for example changing the scheme for code based encryption. …

結合二維條碼之影像驗證與回復機制之研究

林子瑋 - 2015 - auir.au.edu.tw
… , a SVD-based image authentication scheme using quick response code features is presented
in Chapter 4. Another QR code-based image authentication scheme is also proposed in …

[PDF][PDF] 后量子加密算法的硬件实现综述

曹元, 陆旭, 吴彦泽, 谢浩东, 乔云凯, 姚恩义… - Journal of Cyber …, 2021 - jcs.iie.ac.cn
authentication. … cryptography algorithm solicitation (round 2 and 3), outlines the current
main implementation methods of post-quantum encryption algorithms: hash-based, code-based, …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

L AKÇAY - 2022 - polen.itu.edu.tr
… for quantum-resistant Lattice-based Cryptography algorithms in the final stage of the NIST
Code-based cryptography Code-based cryptography is encryption techniques that mainly …

[PDF][PDF] 矩阵分解在密码中应用研究

张焕国, 刘金会, 贾建卫, 毛少武, 吴万青 - 密码学报, 2014 - jcr.cacrnet.org.cn
… of structured codes in code based cryptography[M]. In: Coding Theory and Cryptography
III. … Actual complexity of modular knapsack vector problem and practical security of a lattice …

基于Event-B 方法的安全协议设计, 建模与验证

李梦君, 潘国腾, 欧国东 - 软件学报, 2018 - jos.org.cn
… protocols and verify the correctness of … and verification tools Isabelle/HOL and VCC are
introduced, and the typical work on the design and modeling of security protocols and verification

[HTML][HTML] 一种基于CFI 保护的Android Native 代码保护框架

张文, 刘文灵, 李晖, 陈泽, 牛少彰 - 2018 - html.rhhz.net
… reinforced points, generate the reinforcement code based on the CFI policy, and integrate
the verification module into the target application. Then a CFI check is enforced during the run-…

针对一种基于SM3 算法的消息验证码的相关能量攻击

袁野, 曲凯歌, 乌力吉, 马佳伟… - 信息与电子工程前沿 …, 2022 - fitee.zjujournals.com
… attack on a message authentication code based on SM3∗ … the power consumption of
cryptographic devices and the … The reason is that the carry from bit 3 to bit 4 in the modular