Search
Search Results
-
A CUDA-based parallel optimization method for SM3 hash algorithm
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the...
-
Grover on SM3
Grover’s search algorithm accelerates the key search on the symmetric key cipher and the pre-image attack on the hash function. To perform Grover’s... -
Optimizing the SM4 Encryption Algorithm for Blockchain Security
Encryption algorithms play a critical role in ensuring data security. However, challenges such as slow operation and suboptimal efficiency arise... -
Correlation power attack on a message authentication code based on SM3
Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm...
-
An Efficient Keyword-Based Ciphertext Retrieval Scheme
This paper designs an efficient ciphertext retrieval scheme that can realize single-keyword and multi-keyword retrieval while resisting privacy... -
Data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm
The data stored in the cloud contains a lot of privacy and confidentiality. The scalability of data privacy access control is weak, the attack... -
Improved Homomorphic Evaluation for Hash Function Based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic... -
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
-
A Mobile Data Leakage Prevention System Based on Encryption Algorithms
Mobile Internet is an emerging field that is develo** rapidly. However, the frequent data leakage events caused by the security problems of mobile... -
Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm
The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also... -
Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm
The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also... -
Research on Secure and Encrypted Transmission Method of Electric Power Data Based on National Security Algorithm
Another problem at present is that a large amount of data is transmitted electronically. This includes not only personal information, but also... -
On-Demand Allocation of Cryptographic Computing Resource with Load Prediction
“Cryptography-as-a-Service” provides convenience for users to request cryptographic computing resources according to their needs. However, it also... -
Electronic Voting Scheme Based on Blockchain and SM2 Cryptographic Algorithm Zero-Knowledge Proof
Voting is an important basis for making decisions in social life. With the development of society, the efficiency of counting has been improved and... -
A Multi-level Elastic Encryption Protection Model
Most of the existing file encryption models are based on international cryptographic algorithms, and lack of flexibility when facing the changing... -
Research of CPA Attack Methods Based on Ant Colony Algorithm
The Power analysis attack is an effective method of attacking encryption devices for leakage of side-channel information. CPA (Correlation Power... -
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System
A high-quality evidence-storage service is crucial for many existing applications. For example, judicial or arbitral authorities need to guarantee... -
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things
The satellite Internet of Things (satellite IoT) has the characteristics of large space-time span and highly open communication links. While... -
Mathematical model and simulated annealing algorithm for Chinese high school timetabling problems under the new curriculum innovation
As the first attempt, this paper proposes a model for the Chinese high school timetabling problems (CHSTPs) under the new curriculum innovation which...