Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Haiwen, Ou"'
Publikováno v:
Security and Communication Networks. 2023:1-12
Existing malicious encrypted traffic detection approaches need to be trained with many samples to achieve effective detection of a specified class of encrypted traffic data. With the rapid development of encryption technology, various new types of en
Publikováno v:
Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications ISBN: 9789811924552
This paper designs and implements a private cloud platform deployed on an office system that supports domestic software and hardware. With the rapid development of cloud computing, more and more enterprises and users choose cloud platform as a vital
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91c8b9e8c643e6a6c75992083cf82c23
https://doi.org/10.1007/978-981-19-2456-9_119
https://doi.org/10.1007/978-981-19-2456-9_119
Publikováno v:
Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications ISBN: 9789811924552
The wide application of mobile terminals that makes the software and hardware of mobile platforms gradually become the important target of malicious attackers. In response to the above problems, this paper proposes a vulnerability mining scheme based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b58f889de317da65f96fdb5d0c66477c
https://doi.org/10.1007/978-981-19-2456-9_114
https://doi.org/10.1007/978-981-19-2456-9_114
Publikováno v:
2019 IEEE 5th International Conference on Computer and Communications (ICCC).
As a dual cryptanalysis corresponding to differential analysis, integral cryptanalysis is more effective than differential and linear analyses in analyzing of some structures and algorithms. A new integral distinguisher for Midori is proposed in this
Autor:
Zongduo Dai, Haiwen Ou
Publikováno v:
Science in China Series A: Mathematics. 42:140-146
LetR be a finite commutative ring with identity and τ be a nonnegative integer. In studying linear finite automata, one of the basic problems is how to characterize the class of rings which have the property that every (weakly) invertible linear fin
Publikováno v:
2012 Fourth International Conference on Multimedia Information Networking and Security.
This paper proposes a new public key signature scheme based on multivariate quadratic polynomials over a finite field with odd prime characteristic. This signature scheme has a very simple internal transformation, allowing for efficient signature gen
Publikováno v:
Web Information Systems and Mining ISBN: 9783642334689
WISM
WISM
This paper proposes a new public key signature scheme based on multivariate polynomials over a finite field with characteristic 2. This scheme has a very simple internal transformation, allowing for efficient signature generation and verification. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58187acfd8875df901788201691a2dae
https://doi.org/10.1007/978-3-642-33469-6_33
https://doi.org/10.1007/978-3-642-33469-6_33
Publikováno v:
IAS
SMS4 is a 128-bit block cipher, which is used in the WAPI standard in China. This paper examines algebraic attacks on SMS4 over two different fields, that is, GF(2) and GF$(2^8),$ respectively. With regards to this, we first describe the SMS4 as syst
Publikováno v:
ICESS
Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The MD6 hash function is developed by a team led by Professor Ronald L. Rivest in response to the call for proposals for a SHA-3 cryp
Publikováno v:
Information and Communications Security ISBN: 9783540428800
ICICS
ICICS
Xinmei Wang [1] proposed a digital signature scheme based on error-correctingco des, and then a revised scheme was proposed in [6]. Some attacks on the operation of its basic form and some variations were given in [2,3,4,5], and then an attack on Xin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f293e8cee102ecbb9bab10911dc805b
https://doi.org/10.1007/3-540-45600-7_10
https://doi.org/10.1007/3-540-45600-7_10