期刊文献+
共找到4,848篇文章
< 1 2 243 >
每页显示 20 50 100
Group-Based Successive Interference Cancellation for Multi-Antenna NOMA System with Error Propagation 被引量:2
1
作者 Cheng Hu Hong Wang +1 位作者 Changxiang Li Rongfang Song 《China Communications》 SCIE CSCD 2023年第8期276-287,共12页
Non-orthogonal multiple access(NOMA)is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity.However,for power domain NOMA,the required overall transmit power should ... Non-orthogonal multiple access(NOMA)is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity.However,for power domain NOMA,the required overall transmit power should be increased rapidly with the increasing number of users in order to ensure that the signal-to-interference-plus-noise ratio reaches a predefined threshold.In addition,since the successive interference cancellation(SIC)is adopted,the error propagation would become more serious as the order of SIC increases.Aiming at minimizing the total transmit power and satisfying each user’s service requirement,this paper proposes a novel framework with group-based SIC for the deep integration between power domain NOMA and multi-antenna technology.Based on the proposed framework,a joint optimization of power control and equalizer design is investigated to minimize transmit power consumption for uplink multi-antenna NOMA system with error propagations.Based on the relationship between the equalizer and the transmit power coefficients,the original problem is transformed to a transmit power optimization problem,which is further addressed by a parallel iteration algorithm.It is shown by simulations that,in terms of the total power consumption,the proposed scheme outperforms the conventional OMA and the existing cluster-based NOMA schemes. 展开更多
关键词 multi-antenna NOMA group-based successive interference cancellation error propagation power control
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
2
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms
3
作者 Ehan Sohn Sangmyung Lee +3 位作者 Sunggon Kim Kiwook Sohn Manish Kumar Yongseok Son 《Computer Modeling in Engineering & Sciences》 2025年第11期2761-2785,共25页
With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these d... With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these devices often handle personal information under limited resources,cryptographic algorithms must be executed efficiently.Their computational characteristics strongly affect system performance,making it necessary to analyze resource impact and predict usage under diverse configurations.In this paper,we analyze the phase-level resource usage of AES variants,ChaCha20,ECC,and RSA on an edge device and develop a prediction model.We apply these algorithms under varying parallelism levels and execution strategies across key generation,encryption,and decryption phases.Based on the analysis,we train a unified Random Forest model using execution context and temporal features,achieving R2 values up to 0.994 for power and 0.988 for temperature.Furthermore,the model maintains practical predictive performance even for cryptographic algorithms not included during training,demonstrating its ability to generalize across distinct computational characteristics.Our proposed approach reveals how execution characteristics and resource usage interacts,supporting proactive resource planning and efficient deployment of cryptographic workloads on edge devices.As our approach is grounded in phase-level computational characteristics rather than in any single algorithm,it provides generalizable insights that can be extended to a broader range of cryptographic algorithms that exhibit comparable phase-level execution patterns and to heterogeneous edge architectures. 展开更多
关键词 Internet of Things(IoT) cryptography power efficient computing performance modeling
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
4
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
5
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
基于对抗网络的可配置加解密硬件优化设计
6
作者 涂江涛 张会红 张跃军 《宁波大学学报(理工版)》 2026年第1期1-7,共7页
随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的... 随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的可配置加解密硬件设计方案。该方案首先对加解密模型进行硬件友好型优化,完成网络训练和量化;然后,采用Winograd+DSP48的卷积加速方法,将所需96个乘法器降低到32个;最后,设计CPU控制与调度系统架构,结合动态控制加速器的操作模式,实现高性能可配置加解密硬件电路。实验结果表明,所提方案最高工作频率为133 MHz,功耗为32.4 m W,吞吐量为17.06 GOPs。加解密网络的正确率达100%,破解网络正确率接近50%,硬件电路具备可配置和高安全特性。 展开更多
关键词 神经密码学 对抗神经网络 可配置 电路优化设计
在线阅读 下载PDF
面积高效的格密码多项式乘法硬件实现
7
作者 谢家兴 蒲金伟 +2 位作者 方伟钿 郑欣 熊晓明 《计算机工程》 北大核心 2026年第1期282-292,共11页
基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项... 基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项式乘法结构。首先,将数论变换(NTT)最后一轮、系数相乘和逆数论变换(INTT)第一轮融合成CCO,减少2轮蝶形运算和50%的旋转因子存储空间,降低内存访问开销;其次,采用轻量级硬件分别实现模加、模减、除2运算以及优化后的基于Barrett的模乘运算,有效减少逻辑资源开销,同时采用流水线、分时复用技术设计可重构运算单元(PE)阵列,使得各运算单元可以在不同变换下进行高效重组连接;此外,在内存映射方案上引入系数分组存储和特殊内存映射方法,利用地址映射规律对数据和旋转因子实现高效调度,避免内存映射冲突问题,以低成本实现内存访问;最后,采用先入先出(FIFO)结构实现数据重组,提升数据访问效率。实验结果显示,所提出的PM结构在Slices和数字信号处理器(DSP)的面积延时积(ATP)指标上相比于现有相关工作分别降低21.7%和61.1%以上,具有更高的面积效率。 展开更多
关键词 格密码 多项式乘法 数论变换 模约简 无冲突内存映射
在线阅读 下载PDF
低轨卫星互联网安全接入机制:认证算法与挑战
8
作者 吕政威 肖丽霞 +2 位作者 姚壮 曹越 周家喜 《移动通信》 2026年第1期146-154,共9页
随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地... 随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地面网络接入认证算法面临实时性不足、切换中断、安全风险高等挑战,构建适配的安全接入认证体系成为关键需求。基于此,总结了低轨卫星互联网接入认证算法,包括物理层认证、基于密码学的认证、基于区块链的认证、跨网络集成认证和轻量级身份认证,并探讨了低轨卫星互联网接入认证的未来研究方向。 展开更多
关键词 低轨卫星互联网 接入认证 密码学
在线阅读 下载PDF
探索整数格的拓扑图编码实现
9
作者 张明军 张玉婧 +1 位作者 张小慧 姚兵 《浙江大学学报(理学版)》 北大核心 2026年第1期47-56,62,共11页
在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编... 在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编码含有大量的数学猜想和计算NP-问题,因此其产生的数字串具有不可逆性和计算安全性。本文定义了新的标号和着色,并给出了实现这些标号和着色的算法,确定了承认这几种标号和着色的图类。同时,建立了毛毛虫树图格及其互补图格,探讨了这些图格与传统的整数格之间的关系。所用技术方法均基于有效且可行的算法实现。 展开更多
关键词 格密码 拓扑编码 全标号 全着色 图格 着色图格同态 非对称拓扑加密
在线阅读 下载PDF
Public Key Cryptography Based on Ergodic Matrices over Finite Field 被引量:8
10
作者 PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1525-1528,共4页
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over fini... A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 展开更多
关键词 ergodic matrix strong matrix public key cryptography
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
11
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
12
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
原文传递
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography 被引量:1
13
作者 K.Shankar P.Eswaran 《China Communications》 SCIE CSCD 2017年第2期118-130,共13页
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a secret image into n illogical share images. It is unable to reveal any data on the original image if at least one of the shares is not achieved. The original image, in fact, is realized by overlapping the entire shares directly, in order that the human visual system is competent to identify the collective secret image without employing any complicated computational tools. Therefore, they are communicated steadily as number of shares. The elliptic curve cryptography approach, in turn, is employed to augment the privacy and safety of the image. The new.fangled technique is utilized to generate the multiple shares which are subjected to encryption and decryption by means of the elliptic curve cryptography technique. The test outcomes have revealed the fact that the peak signal to noise ratio is 58.0025, Mean square error value is 0.1164 and the correlation coefficient is 1 for the decrypted image without any sort of distortion of the original image. 展开更多
关键词 visual cryptography PIXEL SHARES elliptic curve cryptography ENCRYPTION PSNR mean square error
在线阅读 下载PDF
Quantum Cryptography for Internet of Things Security 被引量:1
14
作者 Alekha Parimal Bhatt Anand Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期213-220,共8页
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr... Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security. 展开更多
关键词 INTERNET of THINGS QUANTUM COMPUTING QUANTUM cryptography SECURITY
在线阅读 下载PDF
A Visual Cryptography Based Digital Image Copyright Protection 被引量:6
15
作者 Adel Hammad Abusitta 《Journal of Information Security》 2012年第2期96-104,共9页
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec... A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. 展开更多
关键词 IMAGE WATERMARK PATTERN Visual cryptography Digital IMAGE COPYRIGHT
在线阅读 下载PDF
Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems 被引量:9
16
作者 Srinath Doss Jothi Paranthaman +5 位作者 Suseendran Gopalakrishnan Akila Duraisamy Souvik Pal Balaganesh Duraisamy Chung Le Van Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2021年第2期1577-1594,共18页
In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medica... In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests.This datum is sensitive,and hence security is a must in transforming the sensational contents.In this paper,an Evolutionary Algorithm,namely the Memetic Algorithm is used for encrypting the text messages.The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the encoded letter.To show its precision,equivalent to five RGB images and five Grayscale images are used to test the proposed algorithm.The results of the proposed algorithm were analyzed using statistical methods,and the proposed algorithm showed the importance of data transfer in healthcare systems in a stable environment.In the future,to embed the privacy-preserving of medical data,it can be extended with blockchain technology. 展开更多
关键词 Internet of Things medical images cryptography memetic algorithm STEGANOGRAPHY
在线阅读 下载PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme 被引量:1
17
作者 Ching-Nung Yang Chih-Cheng Wu Feng Liu 《Journal of Electronic Science and Technology》 CAS 2011年第4期317-324,共8页
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistie VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded. A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS. In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS. 展开更多
关键词 Probabilistic visual cryptography visual cryptography visual secret sharing.
在线阅读 下载PDF
A New Fast Modular Arithmetic Method in Public Key Cryptography 被引量:1
18
作者 WANG Bangju ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1645-1648,共4页
Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modul... Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modulus algorithm is proposed to improve the speed of the modular arithmetic in the presented paper. For changeable modulus algorithm, when modular computation of modulo n is difficult, it can be realized by computation of modulo n-1 and n-2 on the perquisite of easy modular computations of modulo n-1 and modulo n-2. The conclusion is that the new method is better than the direct method by computing the modular arithmetic operation with large modulus. Especially, when computations of modulo n-1 and modulo n-2 are easy and computation of modulo n is difficult, this new method will be faster and has more advantages than other algorithms on modular arithmetic. Lastly, it is suggested that the proposed method be applied in public key cryptography based on modular multiplication and modular exponentiation with large integer modulus effectively 展开更多
关键词 public key cryptography modular arithmetic modular multiplication modular exponentiation
在线阅读 下载PDF
Quantum Cryptography via Satellite 被引量:2
19
作者 Mitch Leslie 《Engineering》 SCIE EI 2019年第3期353-354,共2页
As it circled the Earth one night in 2017, the Chinese satellite Mozi, also called Micius, aimed a laser at a ground station in northeastern China (Fig. 1). Then, as it traveled toward Europe and into range, it direct... As it circled the Earth one night in 2017, the Chinese satellite Mozi, also called Micius, aimed a laser at a ground station in northeastern China (Fig. 1). Then, as it traveled toward Europe and into range, it directed a beam at a different receiver in Austria. These transmissions, delivered to sites 7600 km apart, were noteworthy because they marked the first time a satellite had relayed secret quantum keys for decrypting and viewing messages. With the keys, scientists in China and Austria were able to exchange and decipher encrypted images. And on 29 September 2017, the researchers used the system to set up an encrypted 75-minute video conference between members of the Chinese Academy of Sciences in Beijing and their counterparts at the Austrian Academy of Sciences in Vienna [1]. 展开更多
关键词 QUANTUM cryptography SATELLITE
在线阅读 下载PDF
Dual Visual Cryptography Using the Interference Color of Birefringent Material 被引量:1
20
作者 Huangyi Qin Toshiki Matsusaki +1 位作者 Yusuke Momoi Kenji Harada 《Journal of Software Engineering and Applications》 2017年第8期754-763,共10页
Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that... Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that uses the interference color of high-order retarder films and encrypts one secret image into two encrypted images. In other words, this method can only encrypt one image at a time. In this paper, we propose a new method that encrypts two color images using interference color. 展开更多
关键词 VISUAL cryptography POLARIZER INTERFERENCE COLOR Birefringent Material
在线阅读 下载PDF
上一页 1 2 243 下一页 到第
使用帮助 返回顶部