排序方式: 共有3条查询结果,搜索用时 15 毫秒
1
1.
WANG Bangju ZHANG Huanguo 《武汉大学学报:自然科学英文版》2006,11(6):1645-1648
0 IntroductionPublic key cryptosystemsolvedthe secure problemof keydistributionsoundlyinsymmetric cryptosystem[1],real-ized digital signature and message authentication successfullyin secureinformationsystem. However ,secure applications ofthemneed badly high-speedsoftware,hardware,andarithme-tic computation of large number .Furthermore,the secret ex-ponent cannot betoosmall[2]and operands should be 1 024 bitorlarger[3]whenthe securitylevel is set high.So,manylargeinteger modular multiplicatio… 相似文献
2.
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can satisfy all the listed ideal security requirements and has the following merits: (1) it can resist all the attacks listed in introduction; (2) less storage memory requirement due to no verification table stored in server; (3) low computational cost due to hash functions based operations; (4) even if the smart card is lost, the new system is still secure; (5) As user identity is anonymous, this scheme is more practical. The new proposed scheme can be applied in source constraint networks. 相似文献
3.
ZHANG Huanguo WANG Yuhua WANG Bangju WU XIAOping 《武汉大学学报:自然科学英文版》2007,12(1):75-78
0 Introduction With the development of cryptography, the need for random numbers of high quality is sharply growing. Pub- lic/private keypairs for asymmetric algorithms are gener- ated from random bit streams[1,2]; random numbers are also used for key gen… 相似文献
1