期刊文献+
共找到1,556篇文章
< 1 2 78 >
每页显示 20 50 100
基于监督学习的稀疏矩阵乘算法优选
1
作者 彭林 张鹏 +2 位作者 陈俊峰 唐滔 黄春 《计算机工程与科学》 北大核心 2025年第3期381-391,共11页
稀疏矩阵乘算法中主流的row-by-row计算公式上的SPA、HASH、ESC 3种稀疏矩阵乘实现算法,在对不同的稀疏矩阵进行计算时性能差异显著,在不同非零元规模上单一算法不总是能取得最佳性能,而且单一算法与最优选择存在明显差距。为此,提出了... 稀疏矩阵乘算法中主流的row-by-row计算公式上的SPA、HASH、ESC 3种稀疏矩阵乘实现算法,在对不同的稀疏矩阵进行计算时性能差异显著,在不同非零元规模上单一算法不总是能取得最佳性能,而且单一算法与最优选择存在明显差距。为此,提出了一种基于机器学习的最优稀疏矩阵乘算法选择模型,以给定矩阵集作为数据源,抽取稀疏矩阵的特征,并使用SPA、HASH、ESC计算获得的性能数据进行训练和验证,获得的模型能够仅使用稀疏矩阵的特征即可完成对新数据集的算法优选。实验结果表明,该模型可以获得91%以上的预测准确率,平均性能达到最优选择的98%,是单一算法性能的1.55倍以上,并且可在实际库函数中使用,具有良好的泛化能力和实用价值。 展开更多
关键词 稀疏矩阵乘 SpGEMM SPA算法 HASH算法 ESC算法 机器学习
在线阅读 下载PDF
Hash折叠寻址模型的研究
2
作者 庞志赟 萧琳 《现代信息科技》 2025年第5期184-186,192,共4页
在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关... 在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关心数据模型原型、数据存储规律与调用、数据Hash检索计算策略、结果存储和分发、折叠寻址结构模型,以及提升数据处理速度和数据查询处理能力等。应用Hash折叠检索策略和折叠函数原型构建折叠寻址思想模型,并将该思想应用于折叠寻址用例,对数据快速查询的Hash折叠寻址模型的研究具有重要意义。 展开更多
关键词 HASH 折叠寻址 存储结构 折叠检索策略 寻址模型
在线阅读 下载PDF
基于Python语言和Hash算法的双关键字查找算法应用研究
3
作者 卢志刚 陈平 《安徽水利水电职业技术学院学报》 2025年第1期43-48,共6页
大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,... 大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,并使用Python语言开发了使用该算法的软件。对比分析结果表明,该方法在处理大规模数据时,相比传统顺序查找和二分查找,不仅简化了实现过程,而且显著提高了查找效率。 展开更多
关键词 二维表 Hash table 查找算法
在线阅读 下载PDF
基于线性同态hash和秘密分享的高效可验证聚合方案
4
作者 高琦 孙奕 +1 位作者 王友贺 李宇杰 《计算机应用研究》 北大核心 2025年第2期599-605,共7页
针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的... 针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的可验证性,保证验证信息通信开销与模型维度无关,同时防止服务器通过伪造聚合hash欺骗用户接受错误聚合结果;然后基于椭圆曲线离散对数问题及其同态性保护输入的隐私,同时保证验证的正确性;接着通过融入秘密分享使验证过程可以容忍用户随时退出,并确保用户退出不会导致验证效率降低;最后理论分析证明了方案的正确性、可靠性和隐私性。仿真实验结果表明了方案的可行性和高效性,与VeriFL方案相比,具有更低的计算和通信开销,特别是存在用户退出时,显著提高了验证效率,具有更强的退出容忍性。 展开更多
关键词 联邦学习 隐私保护 可验证 线性同态hash 秘密分享 容忍退出
在线阅读 下载PDF
无线传感网络入侵干扰节点定位方法的优化设计
5
作者 贾仁祥 单鸿涛 《传感技术学报》 北大核心 2025年第8期1511-1518,共8页
为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统... 为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统思路,查询关键节点对象,并针对其定义攻击性判定Hash函数,联合相关攻击项,判定已标记对象入侵攻击等级。在无线传感网络中实施入侵信息的拟合处理,根据无线传感网络划分条件,定位入侵攻击项,完成无线传感网络入侵干扰节点定位。仿真结果表明,所提技术定位偏差在0.5~0.1之间,字段检测长度与真实长度的数值比保持在99%以上,检测时间低于30 s。符合检测无线传感网络攻击性信息的实际应用需求。 展开更多
关键词 无线传感网络 入侵干扰节点定位 粒子群算法 边界坐标 HASH函数 信息拟合 优化设计
在线阅读 下载PDF
康托展开在算法中的应用
6
作者 戴德军 《电脑编程技巧与维护》 2025年第5期29-31,43,共4页
介绍了康托展开的原理,指出了康托展开值是一个数在其全排列中的位次,相当于这个数的一个HASH值。康托展开的本质是全排列与自然数的双射。在搜索算法中利用康托展开值可以进行判重,提高空间使用效率。
关键词 康托展开 全排列 判重 HASH值
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
7
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
基于加密算法的车载ECU安全部署设计
8
作者 王宇航 魏银 《人工智能与机器人研究》 2025年第5期1218-1229,共12页
由于现代汽车智能化的快速发展,软件定义汽车的愿想正逐渐成为现实,汽车制造商需要通过快速迭代软件来提升产品竞争力,由此带来的用户数据泄露、软件被恶意攻击等风险也日益增加,同时制造商与用户对于软件安全的重视程度也随之增加。软... 由于现代汽车智能化的快速发展,软件定义汽车的愿想正逐渐成为现实,汽车制造商需要通过快速迭代软件来提升产品竞争力,由此带来的用户数据泄露、软件被恶意攻击等风险也日益增加,同时制造商与用户对于软件安全的重视程度也随之增加。软件部署技术必须能够安全有效抵御这些威胁,本文设计了一套软件部署流程,在流程中增加了软件安全算法,使需要更新的软件能安全可靠地部署到规定的内存区域中。为确保ECU固件升级时,数据传输的安全性,在进入Bootloader模式时需要经过诊断27服务的安全验证,防止外部用户非法篡改内部数据,为此,设计了诊断27服务的加密验证方案。同时设计使用椭圆曲线和Hash256算法的组合来对需要部署的车载软件包进行加密和解密,确保外部需要下载的软件包为正确的版本。对于已经被恶意篡改的软件包,需要被丢弃。对需要测试的功能点进行了测试用例的编写,结合软件和硬件需求,在Canoe软件搭建了一套完整的软硬件实验平台,对测试用例的相关功能点进行了正常工况和异常工况的测试。 展开更多
关键词 软件部署 27服务 椭圆曲线 Hash256 BOOTLOADER
在线阅读 下载PDF
Dynamically redactable blockchain based on decentralized Chameleon hash
9
作者 Xinzhe Huang Yujue Wang +3 位作者 Yong Ding Qianhong Wu Changsong Yang Hai Liang 《Digital Communications and Networks》 2025年第3期757-767,共11页
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai... The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment. 展开更多
关键词 Privacy protection Redactable blockchain Chameleon hash Consistency check SCALABILITY
在线阅读 下载PDF
利用哈希算法实现机加工图纸相似度计算
10
作者 马天慧 吴辰阳 张虹 《上海汽车》 2025年第8期48-51,57,共5页
为计算多张图纸的相似度,采用哈希(Hash)算法来判断图纸是否相似,并采用计算机视觉、科学计算等工具做到最佳实践,使得整个程序兼顾准确率和效率的折中需求。项目具有算法简单、易实现、计算机算力要求低和准确率高等优点,在图纸相似度... 为计算多张图纸的相似度,采用哈希(Hash)算法来判断图纸是否相似,并采用计算机视觉、科学计算等工具做到最佳实践,使得整个程序兼顾准确率和效率的折中需求。项目具有算法简单、易实现、计算机算力要求低和准确率高等优点,在图纸相似度匹配和避免重复加工零件等方面具有较高作用。 展开更多
关键词 HASH 算法 机加工图纸 图像相似度
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
11
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control Hash algorithms False data injection attack
在线阅读 下载PDF
基于区块链的边缘计算分布式安全认证系统设计
12
作者 秦前锋 蔡卫江 +3 位作者 陶迎新 张航瑞 关迪予 秦健 《自动化仪表》 2025年第1期83-88,共6页
针对电网终端用户安全存在无法认证和认证速度较慢等问题,设计了基于区块链的边缘计算分布式安全认证系统。利用区块链技术的区块链机制实现电网终端用户安全认证的安全、稳定控制。利用边缘计算的分布特征,通过融合区块链上边缘设备终... 针对电网终端用户安全存在无法认证和认证速度较慢等问题,设计了基于区块链的边缘计算分布式安全认证系统。利用区块链技术的区块链机制实现电网终端用户安全认证的安全、稳定控制。利用边缘计算的分布特征,通过融合区块链上边缘设备终端和Hash分布式存储模型,获取新设备的身份信息,实现对新设备或用户的安全分布式控制认证。将认证后的设备或用户信息上传到核心区块链网络,以减少主机协议转换认证的工作量、提升身份验证的速度。利用委托权益证明(DPoS)共识技术对Hash模型进行改进,解决了Hash模型刷新完身份后无法继续认证的问题。通过试验验证,该系统核算的数据误差率最大为0.7%、最小为0.2%。该系统应用效果显著。 展开更多
关键词 区块链技术 委托权益证明 边缘计算 安全认证 Hash模型 终端入网
在线阅读 下载PDF
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
13
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
基于信息技术的安全认证协议研究
14
作者 卢爱芬 熊永平 《河北软件职业技术学院学报》 2025年第1期1-4,共4页
单服务器身份认证已无法满足人们的信息安全认证需求,为解决该问题,一种轻量级的身份认证协议,可满足多服务器环境下的人们复杂的需求。协议基于一种创新的加密算法实现对所要发送数据加密,即变形Hash函数。变形Hash函数巧妙结合加密参... 单服务器身份认证已无法满足人们的信息安全认证需求,为解决该问题,一种轻量级的身份认证协议,可满足多服务器环境下的人们复杂的需求。协议基于一种创新的加密算法实现对所要发送数据加密,即变形Hash函数。变形Hash函数巧妙结合加密参数自身包含的汉明权重变量,不仅减少了新变量的引入,还降低了存储空间。从多个攻击类型角度分析,表明提出的身份认证协议可抵抗常见的攻击。 展开更多
关键词 安全认证 多服务器 变形Hash函数 身份认证协议 轻量级
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
15
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture 被引量:2
16
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 Cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
在线阅读 下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
17
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
在线阅读 下载PDF
安全高效的移动支付系统设计
18
作者 张曼 《信息与电脑》 2024年第17期102-104,共3页
随着移动互联网的快速发展,移动支付成了不可或缺的一部分。与此同时,安全挑战和威胁也日益凸显。本文设计了一种结合对称加密、非对称加密优点及hash算法特点的加密机制,通过对不可否认性及完整性保障、用户登录管理模块、加盐hash增... 随着移动互联网的快速发展,移动支付成了不可或缺的一部分。与此同时,安全挑战和威胁也日益凸显。本文设计了一种结合对称加密、非对称加密优点及hash算法特点的加密机制,通过对不可否认性及完整性保障、用户登录管理模块、加盐hash增强密码安全性、认证功能模块以及支付功能模块进行设计,实现了移动支付系统的安全高效性。 展开更多
关键词 加密算法 移动支付系统 HASH算法 安全认证
在线阅读 下载PDF
蜂窝物联网匿名访问用户身份认证算法 被引量:3
19
作者 郭文俊 《吉林大学学报(理学版)》 CAS 北大核心 2024年第3期636-642,共7页
针对蜂窝物联网涉及大规模设备的连接和身份认证管理,且攻击者会使用各种方法伪造身份信息,使得匿名访问用户身份认证难度增大的问题,提出一种蜂窝物联网匿名访问用户身份认证算法.首先,以5G网络为蜂窝物联网系统的动态应用场景,预置系... 针对蜂窝物联网涉及大规模设备的连接和身份认证管理,且攻击者会使用各种方法伪造身份信息,使得匿名访问用户身份认证难度增大的问题,提出一种蜂窝物联网匿名访问用户身份认证算法.首先,以5G网络为蜂窝物联网系统的动态应用场景,预置系统参数;其次,根据用户的身份标识号和公钥,利用伪造名称生成用户的匿名访问信息,注册匿名存至本地;最后,基于去中心化理念,对比单元公钥与邻单元群密钥、随机数加密信息与单元Hash值的解密结果,认证用户身份.实验结果表明,该算法有效缩短了身份认证与批量消息验证所需时间,减少了数据传输所需字节数,时间开销仅为13 ms,计算开销仅为4 ms,通信开销仅为210字节,且能成功抵御15种身份认证攻击类型. 展开更多
关键词 蜂窝物联网 5G网络 匿名访问 身份认证 椭圆曲线加密 HASH函数
在线阅读 下载PDF
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function 被引量:2
20
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
上一页 1 2 78 下一页 到第
使用帮助 返回顶部