期刊文献+
共找到1,532篇文章
< 1 2 77 >
每页显示 20 50 100
基于PQC+SM2融合算法下的部署包下发安全机制研究
1
作者 唐银春 《信息化研究》 2025年第6期30-34,共5页
本文针对传统公钥密码(如RSA、SM2)面临量子计算威胁的问题,提出一种PQC与SM2融合的安全方案。该方案通过SM2实现身份认证与数据完整性保护,并采用PQC+SM2混合密钥交换机制保障传输机密性。分析表明,该设计可同时抵御传统网络攻击与量... 本文针对传统公钥密码(如RSA、SM2)面临量子计算威胁的问题,提出一种PQC与SM2融合的安全方案。该方案通过SM2实现身份认证与数据完整性保护,并采用PQC+SM2混合密钥交换机制保障传输机密性。分析表明,该设计可同时抵御传统网络攻击与量子计算攻击,且兼容现有国密标准与基础设施,为部署包下发提供了兼顾合规性与后量子安全性的解决方案,对关键信息系统平滑过渡具有实用价值。 展开更多
关键词 pqc算法 SM2算法 量子安全 融合加密
在线阅读 下载PDF
量子安全的“PQC+QKD”融合型密钥管理体系研究
2
作者 赵勇 黄强 王子 《中国金融电脑》 2025年第9期7-11,共5页
近年来,量子计算发展迅速,形成了对抗量子计算密码技术即量子安全技术的强烈需求。基于数学和物理的两条技术路线各具特色且有着不同的适用场景,有必要基于现有技术优先设计和构建抗量子计算密码算法与量子密码技术融合的量子安全密码体... 近年来,量子计算发展迅速,形成了对抗量子计算密码技术即量子安全技术的强烈需求。基于数学和物理的两条技术路线各具特色且有着不同的适用场景,有必要基于现有技术优先设计和构建抗量子计算密码算法与量子密码技术融合的量子安全密码体系,将抗量子计算的对称密码算法和抗量子计算的公钥密码算法(也称为后量子密码算法,Post Quantum Cryptography,PQC)主要应用于密码用户侧,将量子密码技术(主要指量子密钥分发Quantum Key Distribition,QKD)主要应用于密钥管理基础设施,以实现全面的量子安全的密码服务和管理功能。本文研究了两种技术路线及其融合方案,并给出符合技术发展现状的建设路径参考。 展开更多
关键词 密码技术 量子安全 后量子密码 QKD pqc 融合方案
在线阅读 下载PDF
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
3
作者 Zeric Tabekoueng Njitacke Louai A.Maghrabi +1 位作者 Musheer Ahmad Turki Althaqafi 《Computers, Materials & Continua》 2025年第4期917-933,共17页
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinea... This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption process.Our findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective encryption.The encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit planes.These planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant ones.The subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance security.An auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted image.Experimental results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical images.As a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted images.Additionally,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,respectively.Furthermore,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach. 展开更多
关键词 Image cryptosystem robust chaos sine-cosine map nonlinear analysis tools medical images
在线阅读 下载PDF
Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals
4
作者 Borja Bordel Sánchez Fernando Rodríguez-Sela +1 位作者 Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 2025年第5期1821-1853,共33页
The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protec... The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protect those links,as the hardware node tends to be resource-constrained.Then Pseudo Random Number Generators are employed to produce random keys,whose final behavior depends on the initial seed.To guarantee good mathematical behavior,most key generators need an unpredictable voltage signal as input.However,physical signals evolve slowly and have a significant autocorrelation,so they do not have enough entropy to support highrandomness seeds.Then,electronic mechanisms to generate those high-entropy signals artificially are required.This paper proposes a robust hyperchaotic circuit to obtain such unpredictable electric signals.The circuit is based on a hyperchaotic dynamic system,showing a large catalog of structures,four different secret parameters,and producing four high entropy voltage signals.Synchronization schemes for the correct secret key calculation and distribution among all remote communicating modules are also analyzed and discussed.Security risks and intruder and attacker models for the proposed solution are explored,too.An experimental validation based on circuit simulations and a real hardware implementation is provided.The results show that the random properties of PRNG improved by up to 11%when seeds were calculated through the proposed circuit. 展开更多
关键词 Hyperchaotic circuits chaos synchronization hardware-supported technologies chaotic cryptosystems Industry 4.0 adaptative control
在线阅读 下载PDF
非比例阻尼线性体系地震响应的部分平方组合(CPQC)法 被引量:5
5
作者 俞瑞芳 周锡元 《土木工程学报》 EI CSCD 北大核心 2006年第11期43-49,126,共8页
对于非比例阻尼线性系统,当采用基于复振型的地震反应谱振型叠加方法,即复振型完全平方组合(CCQC)方法进行动力反应分析时计算工作量较大。为此,通过分析不同振型之间的位移、速度、位移-速度相关系数随频率比和阻尼比的变化规律,给出... 对于非比例阻尼线性系统,当采用基于复振型的地震反应谱振型叠加方法,即复振型完全平方组合(CCQC)方法进行动力反应分析时计算工作量较大。为此,通过分析不同振型之间的位移、速度、位移-速度相关系数随频率比和阻尼比的变化规律,给出了复振型平方和开方(CSRSS)组合方法的适用范围。同时通过分析指出在CCQC法中只需要考虑邻近振型的相关性,因此建议了一种介于CCQC法和CSRSS法之间的考虑部分相关性的复振型平方组合方法,称之为简化的CCQC法或复振型部分平方组合(CPQC)方法,用以提高计算效率。通过实例分析验证了所建议方法的适用范围、计算精度和效率。由于比例阻尼系统的地震反应谱振型组合方法是文中所述一般方法的特殊情况,因此本文提出的简化分析方法对比例阻尼系统也同样是适用的,并可以称为部分平方组合(PQC)方法。 展开更多
关键词 振型组合 非比例阻尼 复完全平方组合法 复振型部分平方组合方法 部分平方组合方法
原文传递
PQC—100助留剂在麦草浆造纸中的应用研究
6
作者 安庆坤 崔芳兰 高威 《江苏造纸》 2003年第4期39-41,共3页
介绍PQC—100助留剂在麦草浆造纸中的应用,通过不同加入顺序及加入量对纸张的填料留着率、灰份及白水浓度、脱水速度、裂断长等指标的影响进行了较系统的实验,探索PQC—100在麦草浆造纸中应用的最佳工艺条件。
关键词 pqc—100助留剂 麦草浆 造纸 填料留着率 应用研究 灰份
在线阅读 下载PDF
面向格密码的高面积效率基-4快速数论变换硬件架构与无访存冲突优化设计
7
作者 郑集文 赵石磊 +3 位作者 张子悦 刘志伟 于斌 黄海 《电子与信息学报》 北大核心 2026年第2期855-865,共11页
针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结... 针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结构的低计算复杂度基-4 NTT/INTT算法。其次,深入分析不同PQC算法中模数的共性特征,设计了基于K^(2)-RED约简的可扩展模乘单元。最后,通过优化存储器与蝶形单元之间的数据分解与重组,提出一种基于顺序循环和阶梯循环访存的读写地址生成方案,实现了高效的无访存冲突。与传统的乒乓存储模式相比,该方案可减少12.5%的存储空间。实验结果表明,在(项数,模数位宽)分别为(256,13),(256,23)和(1024,14)的3种配置下,该设计的面积-时间积(ATP)较现有方案分别降低56.4%,69.8%和50.3%以上,具有更高的面积效率。 展开更多
关键词 格基后量子密码 数论变换 恒定几何结构 K^(2)-RED约简 无访存冲突
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
8
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(pqc) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
SMG图像质量控制(PQC)体系建设的思考与实践
9
作者 霍秋林 顾婉卿 《影视制作》 2016年第12期17-21,共5页
SMG技术管理部自2015年起启动电视节目制作图像质量控制(Production Quality Control,简称PQC)机制建设,在既有技术质量管理体系的基础上,以视觉为切入,将主、客观评价体系有机结合,精益化分析各工种间的影响要素,逐步梳理工作界面,优... SMG技术管理部自2015年起启动电视节目制作图像质量控制(Production Quality Control,简称PQC)机制建设,在既有技术质量管理体系的基础上,以视觉为切入,将主、客观评价体系有机结合,精益化分析各工种间的影响要素,逐步梳理工作界面,优化机制和流程,以期实现对图像技术质量及视觉呈现效果整体化、系统化的集成管理。本文简要阐述了SMG-PQC机制建设的总体现状、规划思路与主要举措,并结合中超及国足赛事电视转播中应用的SMG足球转播PQC机制进行实例详解。 展开更多
关键词 图像质量控制(pqc) 管理架构 品控基准线 流程规范研究 工艺研究 评价体系构建 关键环节研究
在线阅读 下载PDF
New Constructions of Dynamic Threshold Cryptosystem 被引量:4
10
作者 龙宇 陈克非 毛贤平 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期431-435,共5页
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. ... This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the CanettiHalevi-Katz(CHK) transformation to transform it into a fully secure system in the traditional public key setting.Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security. 展开更多
关键词 threshold cryptosystem dynamic property dual system encryption one-time signature
原文传递
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
11
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
12
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
原文传递
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
13
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:2
14
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography QR code SECURITY ElGamal cryptosystem DWT
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
15
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:2
16
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
原文传递
Review of Public-Key Cryptosystem Based on the Error Correcting Code 被引量:1
17
作者 LI Zhongyuan QU Chengqin +1 位作者 ZHOU Xueguang ZHUO Lifeng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期489-496,共8页
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal... The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems. 展开更多
关键词 error correcting code public-key cryptosystem cascaded code safety
原文传递
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
18
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
在线阅读 下载PDF
Software Watermarking Scheme Based on Multivariate Public Key Cryptosystem
19
作者 SUN Xiaoyan ZHANG Maosheng +2 位作者 MAO Shaowu REN Zhengwei ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第3期257-261,共5页
Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum... Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum algorithm. This paper proposes a novel soft-ware watermarking scheme based on multivariate public key cryptosystem. The copyright information generated by copyright holder is transformed into copyright numbers using multivariate quadratic polynomial equations inspired by multivariate public key cryptosystem (MPKC). Every polynomial is embedded into the host program independently. Based on the security performance of MPKC, the robustness and invisibility of the proposed scheme is significantly improved in comparison with the RSA-based watermarking method. 展开更多
关键词 SOFTWARE WATERMARKING MULTIVARIATE cryptosystem COPYRIGHT
原文传递
Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings 被引量:1
20
作者 Mariana Durcheva 《Journal of Mathematics and System Science》 2014年第1期6-13,共8页
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob... The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography. 展开更多
关键词 Public key cryptosystem exotic semirings semiring action residuals.
在线阅读 下载PDF
上一页 1 2 77 下一页 到第
使用帮助 返回顶部