We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 166 results
  1. A CUDA-based parallel optimization method for SM3 hash algorithm

    Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the...

    Jichang Han, Tao Peng, Xuesong Zhang in The Journal of Supercomputing
    Article 10 June 2024
  2. Grover on SM3

    Grover’s search algorithm accelerates the key search on the symmetric key cipher and the pre-image attack on the hash function. To perform Grover’s...
    Gyeongju Song, Kyungbae Jang, ... Hwajeong Seo in Information Security and Cryptology – ICISC 2021
    Conference paper 2022
  3. Optimizing the SM4 Encryption Algorithm for Blockchain Security

    Encryption algorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise...
    **aomeng Hu, Haibo Yi, ... Yaning Du in Blockchain Technology and Application
    Conference paper 2024
  4. Correlation power attack on a message authentication code based on SM3

    Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm...

    Ye Yuan, Kai-ge Qu, ... **ang-min Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 01 July 2019
  5. An Efficient Keyword-Based Ciphertext Retrieval Scheme

    This paper designs an efficient ciphertext retrieval scheme that can realize single-keyword and multi-keyword retrieval while resisting privacy...
    Zihao Liu, Ruixuan Deng, ... Hua Shen in Provable and Practical Security
    Conference paper 2023
  6. Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm

    The data stored in the cloud contains a lot of privacy and confidentiality. The scalability of data privacy access control is weak, the attack...
    Chuangji Zhang, Weixuan Lin, Yanli Zhang in Multimedia Technology and Enhanced Learning
    Conference paper 2024
  7. Improved Homomorphic Evaluation for Hash Function Based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
    Benqiang Wei, **anhui Lu in Information Security and Cryptology
    Conference paper 2024
  8. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  9. A Mobile Data Leakage Prevention System Based on Encryption Algorithms

    Mobile Internet is an emerging field that is develo** rapidly. However, the frequent data leakage events caused by the security problems of mobile...
    Wen Shen, Hongzhang **ong in Big Data and Security
    Conference paper 2023
  10. Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm

    The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also...
    **g Zhou, Qian Wu, ... Jiaxin Li in Artificial Intelligence and Security
    Conference paper 2022
  11. Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm

    The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also...
    **g Zhou, Qian Wu, ... Jiaxin Li in Advances in Artificial Intelligence and Security
    Conference paper 2022
  12. Research on Secure and Encrypted Transmission Method of Electric Power Data Based on National Security Algorithm

    Another problem at present is that a large amount of data is transmitted electronically. This includes not only personal information, but also...
    Conference paper 2024
  13. On-Demand Allocation of Cryptographic Computing Resource with Load Prediction

    “Cryptography-as-a-Service” provides convenience for users to request cryptographic computing resources according to their needs. However, it also...
    **aogang Cao, Fenghua Li, ... Wenlong Kou in Information and Communications Security
    Conference paper 2023
  14. Electronic Voting Scheme Based on Blockchain and SM2 Cryptographic Algorithm Zero-Knowledge Proof

    Voting is an important basis for making decisions in social life. With the development of society, the efficiency of counting has been improved and...
    Zheng Lijuan, Li Dunyue, ... Chen Ziyang in Web Services – ICWS 2022
    Conference paper 2022
  15. A Multi-level Elastic Encryption Protection Model

    Most of the existing file encryption models are based on international cryptographic algorithms, and lack of flexibility when facing the changing...
    Caimei Wang, Zijian Zhou, ... Bowen Huang in Science of Cyber Security
    Conference paper 2021
  16. Research of CPA Attack Methods Based on Ant Colony Algorithm

    The Power analysis attack is an effective method of attacking encryption devices for leakage of side-channel information. CPA (Correlation Power...
    **aoyi Duan, You Li, ... Peishu Zhang in Security and Privacy in Communication Networks
    Conference paper 2021
  17. Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System

    A high-quality evidence-storage service is crucial for many existing applications. For example, judicial or arbitral authorities need to guarantee...
    Yongxin Zhang, Qinghao Wang, ... Hong Lei in Blockchain and Trustworthy Systems
    Conference paper 2022
  18. A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things

    The satellite Internet of Things (satellite IoT) has the characteristics of large space-time span and highly open communication links. While...
    Minqiu Tian, Fenghua Li, ... Chao Guo in Information and Communications Security
    Conference paper 2023
  19. Mathematical model and simulated annealing algorithm for Chinese high school timetabling problems under the new curriculum innovation

    As the first attempt, this paper proposes a model for the Chinese high school timetabling problems (CHSTPs) under the new curriculum innovation which...

    **ngxing Hao, **g Liu, ... Gustaph Sanga in Frontiers of Computer Science
    Article 29 September 2020
Did you find what you were looking for? Share feedback.