期刊文献+
共找到1,295篇文章
< 1 2 65 >
每页显示 20 50 100
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
1
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
基于神经网络的随机数生成器评估综述
2
作者 韩益亮 冯浩康 +2 位作者 吴旭光 孙钰腾 王圆圆 《信息网络安全》 北大核心 2026年第2期171-188,共18页
随机数在密码学应用和密码系统中扮演着关键角色,其质量直接关系到系统的安全性。文章综述了基于神经网络的随机数生成器评估方法的最新研究进展。首先,介绍随机数生成器及其现有随机性测试套件;其次,重点分析基于神经网络的评估方法,... 随机数在密码学应用和密码系统中扮演着关键角色,其质量直接关系到系统的安全性。文章综述了基于神经网络的随机数生成器评估方法的最新研究进展。首先,介绍随机数生成器及其现有随机性测试套件;其次,重点分析基于神经网络的评估方法,包括预测模型与分类模型;再次,通过与传统评估方法对比,详细阐述神经网络在随机数生成器评估中的优势与潜力;最后,指出当前研究中存在的关键问题及未来改进方向。 展开更多
关键词 随机数生成器 神经网络 熵估计 密码学
在线阅读 下载PDF
数字技术对货币与金融统计的影响、挑战与应对
3
作者 彭刚 李敬 《统计理论与实践》 2026年第2期5-16,共12页
以区块链、大数据等为代表的数字技术在提升金融效率的同时推动全球金融范式变革,并对传统货币与金融统计体系构成严峻挑战。以金融系统“表—中—里”三层架构为线索,系统梳理了数字技术在金融中的应用路径,并从统计目的、主体、客体... 以区块链、大数据等为代表的数字技术在提升金融效率的同时推动全球金融范式变革,并对传统货币与金融统计体系构成严峻挑战。以金融系统“表—中—里”三层架构为线索,系统梳理了数字技术在金融中的应用路径,并从统计目的、主体、客体、方法、总量指标五个维度,深入剖析了其对货币与金融统计体系的系统性变革。在此基础上,聚焦加密资产计量、数据隐私保护等核心挑战,结合中国金融统计实践提出相关应对建议,可为弥补金融统计信息缺口、提升宏观政策科学性、助力金融强国建设与金融市场高质量发展提供一定理论参考与实践支撑。 展开更多
关键词 数字技术 货币与金融统计 加密资产 区块链
在线阅读 下载PDF
私有算法密码芯片非入侵式攻击检测框架
4
作者 魏淙洺 王菁 +3 位作者 王安 丁瑶玲 孙绍飞 祝烈煌 《软件学报》 北大核心 2026年第2期894-914,共21页
近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提... 近年来,密码芯片迅速发展,与此同时也面临着非入侵式攻击的严重威胁.目前已有国内外标准给出了非入侵式攻击检测流程与方法,但这些标准均针对公开算法制定,对于私有算法并不适用,私有算法密码芯片存在着很大的安全隐患.针对这一问题,提出面向私有算法密码芯片的非入侵式攻击检测框架,该框架包含计时分析测试、简单能量/电磁分析测试、差分能量/电磁分析测试3大部分.对于计时分析测试,采用基于平均去噪的计时分析方法,提高所采集时间的可用性.针对简单能量/电磁分析,提出面向私有密码算法的视觉观察法和交叉关联分析方法.针对差分能量/电磁分析,通过TVLA-1和TVLA-2双重检测方法有效检测私有算法密码芯片不同来源的泄露,评估私有算法密码芯片的抗差分能量/电磁攻击能力.该框架是对传统非入侵式攻击检测的有效补充,极大提高了非入侵式攻击检测的检测范围.为了验证该框架的有效性,在多款密码芯片上开展黑盒实验,实验结果表明该框架能够有效检测私有算法密码芯片的抗非入侵式攻击安全性. 展开更多
关键词 非入侵式攻击 私有算法 密码芯片 计时分析 能量分析
在线阅读 下载PDF
面向低空高密度飞行安全的无人机识别信息可信构造与容量分析
5
作者 孙汉存 白子轩 +1 位作者 许晋 葛宁 《数据采集与处理》 北大核心 2026年第1期53-65,共13页
随着中国低空经济的高速发展,低空空域呈现超大规模节点接入与超高密度频谱复用的新特征,无人机实时安全监管成为重大挑战。根据中国强制性标准要求及民航局规定,无人机需以广播形式对其运行识别信息进行不间断报送,地面监测节点以此进... 随着中国低空经济的高速发展,低空空域呈现超大规模节点接入与超高密度频谱复用的新特征,无人机实时安全监管成为重大挑战。根据中国强制性标准要求及民航局规定,无人机需以广播形式对其运行识别信息进行不间断报送,地面监测节点以此进行身份识别。然而标准广播模式缺乏源可信认证机制,存在较大安全隐患,且现有研究缺乏针对我国标准格式的广播容量理论分析与量化评估。针对以上问题,本文提出使用国密SM2算法的广播式运行识别信息可信构造方法,在标准广播报文基础上附加数字签名,形成抗攻击的强认证能力,规避国际算法后门风险。其次,建立适用于Wi-Fi信标广播体制的低空信道容量理论分析,并通过仿真实验验证表明载波侦听多址接入(Carrier sense multiple access,CSMA)机制相较纯ALOHA协议性能提升约85%。在理想信道环境假设下,使用2.4 GHz单频段、20 MHz带宽、1 s更新周期及18 dBm发射功率,引入国密签名后的可信广播理论容量为82架/km^(2),有效满足当下15~22架/km^(2)的高密度容量需求。为降低引入签名带来的容量影响,本文进一步提出可变频次签名策略,在高密度场景下减少容量损失,同时确保身份认证信息的完整性与不可抵赖性。本文提出的签名方法与容量分析模型可为未来低空监管系统部署提供理论依据与设计参考。 展开更多
关键词 低空经济 广播式运行识别 国密SM2签名算法 Wi-Fi信标 容量分析
在线阅读 下载PDF
云平台密码服务设计与研究
6
作者 邓福彪 《福建电脑》 2026年第2期83-87,共5页
为解决云平台密码服务应用中的关键问题,本文提出了三种典型密码支撑模式,并设计了相应的服务功能、接口及关键数据处理方案。通过系统分析租用密码机、密码服务器及密码服务三种模式的优缺点、适用场景与接口设计,为用户选择适宜的密... 为解决云平台密码服务应用中的关键问题,本文提出了三种典型密码支撑模式,并设计了相应的服务功能、接口及关键数据处理方案。通过系统分析租用密码机、密码服务器及密码服务三种模式的优缺点、适用场景与接口设计,为用户选择适宜的密码服务模式、接口及定义核心数据风险提供了具体措施,从而确保云平台信息系统能够合规、高效地运用密码技术。本研究为商用密码用户选择密码支撑方案与功能接口提供了理论依据与实践指导。 展开更多
关键词 云平台 云密码服务 密码支撑 密码接口
在线阅读 下载PDF
阿尔贝蒂《论密码》中“formula”涵义与其密码算法
7
作者 杨欣童 《计算》 2026年第2期62-67,72,共7页
阿尔贝蒂在其著作《论密码》中提出的核心概念“formula”,长期以来被解读为一种物理装置,即密码盘本身。然而,通过对《论密码》文本的细致分析及其密码算法的系统梳理,本文指出,这一传统理解未能充分揭示阿尔贝蒂的真实意图。研究表明,... 阿尔贝蒂在其著作《论密码》中提出的核心概念“formula”,长期以来被解读为一种物理装置,即密码盘本身。然而,通过对《论密码》文本的细致分析及其密码算法的系统梳理,本文指出,这一传统理解未能充分揭示阿尔贝蒂的真实意图。研究表明,“formula”并非仅指代密码盘的硬件结构,而是一个具有多种映射关系和多层映射关系的密码算法。该算法通过动态调整字母与数字的对应关系,实现了加密过程的复杂性与安全性,体现了阿尔贝蒂对数学映射思想的深刻运用。本文通过探求“formula”的涵义对阿尔贝蒂的密码装置与相应算法做了澄清,为西方密码学的机械化和算法化进程提供了参考。 展开更多
关键词 《论密码》 阿尔贝蒂 密码算法 FORMULA 映射
在线阅读 下载PDF
基于KSAO模型的密码技术技能人才职业能力框架构建
8
作者 胡兵 张靖 罗攀 《计算机应用文摘》 2026年第2期136-138,141,共4页
文章基于KSAO模型,系统解构《密码技术应用员国家职业技能标准》中的四级职业能力要求,融合密码理论、工程实践、法律法规与职业伦理等要素,构建了涵盖4个一级维度及16项二级指标的密码技术技能人才职业能力框架。该框架覆盖从基础操作... 文章基于KSAO模型,系统解构《密码技术应用员国家职业技能标准》中的四级职业能力要求,融合密码理论、工程实践、法律法规与职业伦理等要素,构建了涵盖4个一级维度及16项二级指标的密码技术技能人才职业能力框架。该框架覆盖从基础操作到战略决策的层次化能力需求,旨在为建立系统化、规范化的密码技术技能人才培养体系提供理论依据与实践参考。 展开更多
关键词 KSAO模型 密码技术 职业能力 技能标准 能力框架
在线阅读 下载PDF
适用于智能家居系统的SM2两方协同签名方案
9
作者 许国威 刘登志 《计算机工程与科学》 北大核心 2026年第1期89-97,共9页
智能家居系统已经在人们的日常生活中得到了广泛的普及和应用。然而,智能家居节点计算资源受限,在实现隐私保护和密钥管理方面仍存在诸多问题。为了提升智能家居系统的安全性,设计出了一种轻量级签名方案。该方案基于SM2密码算法和两方... 智能家居系统已经在人们的日常生活中得到了广泛的普及和应用。然而,智能家居节点计算资源受限,在实现隐私保护和密钥管理方面仍存在诸多问题。为了提升智能家居系统的安全性,设计出了一种轻量级签名方案。该方案基于SM2密码算法和两方协同签名进行构造,并进行密钥分割存储,以降低密钥泄露的风险。同时,将密钥生成与用户注册相结合,并在用户与智能网关交互生成私钥的过程中增加认证参数,从而进一步提高系统安全性且在签名阶段无需合成完整的私钥。最后,提供安全性证明,包括不可伪造性、匿名性和存储安全性。模拟实验的结果表明,所设计的签名方案适用于轻量级环境下的智能家居系统。 展开更多
关键词 智能家居系统 两方协同签名 SM2椭圆曲线公钥密码算法 密钥分割
在线阅读 下载PDF
超声引导下隐神经阻滞联合坐骨神经阻滞对胫腓骨骨折术后康复影响的研究
10
作者 黄增柱 张文娜 +1 位作者 龚泽锋 彭汉新 《黑龙江医药》 2026年第1期54-57,共4页
目的:探讨超声引导下神经联合阻滞麻醉在胫腓骨骨折术后镇痛中的效用,及对患者康复进程的促进价值。方法:选择60例择期行胫腓骨切开复位内固定术治疗的胫腓骨骨折患者随机分组。对照组在超声引导下单纯采用坐骨神经阻滞(SNB)处理,观察... 目的:探讨超声引导下神经联合阻滞麻醉在胫腓骨骨折术后镇痛中的效用,及对患者康复进程的促进价值。方法:选择60例择期行胫腓骨切开复位内固定术治疗的胫腓骨骨折患者随机分组。对照组在超声引导下单纯采用坐骨神经阻滞(SNB)处理,观察组在超声引导下进行隐神经阻滞联合SNB处理。比较两组术后多时间点疼痛评分、镇静效果,肌力分级;比较两组补救镇痛率、术后康复时间。结果:术后4、8、12h,观察组VAS评分均明显低于对照组(P<0.05)。观察组补救镇痛率明显低于对照组(P<0.05)。术后4、8、12h,观察组Ramsay镇静评分与肌力分级均较对照组明显更高(P<0.05)。观察组各康复指标时间较对照组明显更短,行走距离更长(P<0.05)。结论:超声引导下隐神经阻滞联合SNB在胫腓骨骨折术后镇痛中的应用效果较好,可有效提升患者镇静效果与肌力水平,加速患者术后康复,且镇痛处理安全性较高,值得推广应用。 展开更多
关键词 超声引导 隐神经阻滞 坐骨神经阻滞 胫腓骨骨折 术后康复
暂未订购
Research of the Kernel Operator Library Based on Cryptographic Algorithm 被引量:1
11
作者 王以刚 钱力 黄素梅 《Journal of Donghua University(English Edition)》 EI CAS 2001年第4期45-48,共4页
The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algo... The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algorithm, the data transfer system with the cryptographic algorithm library has many remarkable advantages in algorithm rebuilding and optimization,easily adding and deleting algorithm, and improving the security power over the traditional algorithm. The user can choose any one in all algorithms with the method against any attack because the cryptographic algorithm library is extensible. 展开更多
关键词 CRYPTOLOGY cryptographic algorithm ALGORITHM library cryptographic mechanism OPERATOR
在线阅读 下载PDF
Game-Based Automated Security Proofs for Cryptographic Protocols 被引量:1
12
作者 顾纯祥 光焱 祝跃飞 《China Communications》 SCIE CSCD 2011年第4期50-57,共8页
Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof ... Provable security has become a popular approach for analyzing the security of cryptographic protocols.However,writing and verifying proofs by hand are prone to errors.This paper advocates the automatic security proof framework with sequences of games.We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game.The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs,and thus can deal with some practical cryptographic schemes with hard problems.We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme. 展开更多
关键词 cryptographic protocols probable security automatic security proof process calculus
在线阅读 下载PDF
An FPGA Implementation of GF(p)Elliptic Curve Cryptographic Coprocessor 被引量:1
13
作者 LIU Yu-zhen QIN Zhong-ping ZHANG Huan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p)elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array(FPGA).The focus of the coprocessor is on the most critical,complicated and time-consuming point multiplicati... A GF(p)elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array(FPGA).The focus of the coprocessor is on the most critical,complicated and time-consuming point multiplications.The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications.The characteristic of hardware parallelism is considered in the implementation of point multiplications.The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1)with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case.At the same circumstance,the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor CRYPTOGRAPHY information security
在线阅读 下载PDF
Design of a Secure and Efficient Distributed Cryptographic Storage System
14
作者 杨晓元 朱率率 《China Communications》 SCIE CSCD 2011年第2期66-74,共9页
Proxy Re-encryption(PRE) is greatly concerned by researchers recently. It potentially has many useful applications in network communications and file sharing. Secure distributed cryptographic file system is one of its... Proxy Re-encryption(PRE) is greatly concerned by researchers recently. It potentially has many useful applications in network communications and file sharing. Secure distributed cryptographic file system is one of its applications. But the practical applications of PRE are few. And even fewer of them are tested by systematically designed experiments. Appling a couple of representative algorithms proposed by BBS,Ateniese,Shao,et al.,a distributed file system is designed. In the system,some substitute mechanisms such as data dispersal,dynamic file sharing,are well-applied. A lot of features such as flexible authorization and data redundancy are embraced in the system. The comparison evaluation justified that the system is more practical and efficient. 展开更多
关键词 cryptographic file system proxy re-encryption file sharing data redundancy
在线阅读 下载PDF
Establishment and Application of Cryptographic Library Model
15
作者 Tie-Ming Liu Lie-Hui Jiang +1 位作者 Jing Jing Yuan-Yuan Zhang 《Journal of Computer and Communications》 2015年第5期21-32,共12页
When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models ... When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models use formalized approach to describe the frame of cryptology and the structure of cryptographic function, complete the mapping from cryptographic function property to its architecture, and accomplish the result presentation of data analysis and mapping at last. The model can solve two problems: the first one is to know the hierarchy of the cryptographic function in the library well;the second one is to know some kinds of information, such as related cryptology algorithm and protocol, etc. These function implements can display the result graphically. The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology. 展开更多
关键词 cryptographic LIBRARY Model cryptographic LIBRARY Architecture cryptographic Algorithm ENCRYPTION and DECRYPTION KEYS ENCRYPTION and DECRYPTION Data Information Recovery
暂未订购
Construction Vectors for Visual Cryptographic Schemes
16
作者 FEI Ruchun 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期441-448,共8页
The concept of group construction vector and independent construction vector for visual cryptography is proposed, and the method based on construction vector is presented for con-structing basis matrices. The general ... The concept of group construction vector and independent construction vector for visual cryptography is proposed, and the method based on construction vector is presented for con-structing basis matrices. The general solutions to construction vectors and the general solutions to k out of n visual cryptographic schemes are obtained. Using the construction vectors, everyone can construct visual cryptographic schemes simply and efficaciously according to the formulas. The concept and the general solutions to construction vector present a good idea for researches on visual cryptographic schemes, including structural properties, the bound of pixel expansion and contrast, and optimal construction. 展开更多
关键词 visual cryptographic scheme basis matrix groupconstruction vector independent construction vector
原文传递
All-Optical Cryptographic Device for Secure Communication
17
作者 Fabio Garzia Roberto Cusani 《Communications and Network》 2010年第4期235-245,共11页
An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a f... An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transmitted at the original speed without slowing down. 展开更多
关键词 cryptographic DEVICE Security DEVICE SOLITON Interaction ALL-OPTICAL SWITCHING SPATIAL SOLITON ALL-OPTICAL Device.
暂未订购
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
18
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 cryptographic SECURITY privacy preservation DECRYPTION INTEGRITY
在线阅读 下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
19
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
在线阅读 下载PDF
Measurement-device-independent quantum cryptographic conferencing with an untrusted source
20
作者 Rui-Ke Chen Wan-Su Bao +4 位作者 Yang Wang Hai-Ze Bao Chun Zhou Mu-Sheng Jiang Hong-Wei Li 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期115-124,共10页
Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical m... Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol. 展开更多
关键词 quantum cryptographic conferencing measurement-device-independent quantum key distribution untrusted source
原文传递
上一页 1 2 65 下一页 到第
使用帮助 返回顶部