排序方式: 共有22条查询结果,搜索用时 812 毫秒
1.
Shor proposed a polynomial time algorithm for computing the order of one element in a multiplicative group using a quantum computer. Based on Miller's randomization, he then gave a factorization algorithm. But the algorithm has two shortcomings, the order must be even and the output might be a trivial factor. Actually, these drawbacks can be overcome if the number is an RSA modulus. Applying the special structure of the RSA modulus,an algorithm is presented to overcome the two shortcomings. The new algorithm improves Shor's algorithm for factoring RSA modulus. The cost of the factorization algorithm almost depends on the calculation of the order of 2 in the multiplication group. 相似文献
2.
实时网上交易的数据安全方案探讨 总被引:2,自引:0,他引:2
左黎明 《华东交通大学学报》2003,20(2):78-82
提出了一种新的网上交易方法,并给出了这种方法的实现步骤,拓展了电子商务的功能。并且针对这种网上交易方法中的数据安全问题进行了深入探讨,提出了相应的解决方案。该方案便于实施而又具备高安全性和可行性。可以满足实际应用的需要。 相似文献
3.
提出了一种基于RSA的有序多重数字签名方案,该方案能够允许多个用户顺序地对一份文件进行签名,最后形成一个群体签名;并提出一种新的签名验证方案,可以有效地防止成员的欺诈行为,因而更具有安全性和实用性. 相似文献
4.
利用DES和RSA加密算法实现JAVA软件的注册授权策略 总被引:1,自引:0,他引:1
张俊 《青岛远洋船员学院学报》2006,27(2):68-71
通过JNI接口调用本地应用程序读取用户主机的硬盘序列号作为用户唯一性依据,利用RSA加密算法实现用户信息和注册信息的加密保护和验证。本文介绍了在商用JAVA软件开发过程中可以使用的一种注册验证策略的实现方法。 相似文献
5.
Introduction Factoring integers is generally thought to behard on a classical computer. But it is now heldthat prime factorization can be accomplished inpolynomial time on a quantum computer. This re-markable work is due to Shor[1]. For a given num-ber n, he gave a quantum computer algorithm forfinding the order r of an element x (mod n) insteadof giving a quantum computer algorithm for factor-ing n directly. The indirect algorithm is feasiblebecause factorization can be reduced to finding th… 相似文献
6.
7.
公钥密码体制对于保证网络信息安全起到了非常重要的作用,本文结合笔者学习密码学基础的一些体会,对公钥密码体制的基本概念,发展现状、及未来的发展展望做个简单地概述。 相似文献
8.
基于注册码的软件加密方法 总被引:5,自引:0,他引:5
本文介绍了在网络上大行其道的注册码(序列号)软件加密方法,并给出了一个基于Visual C 6.0开发平台和非对称加密算法RSA的实例.该方法可实现一台计算机一个注册码,解密难度大,从而较为有效的防止非法用户,而且实现容易,几乎不需要额外的成本. 相似文献
9.
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme. 相似文献
10.
IntroductionData security is becoming a more and more im-portantissue nowadays with the ever- creasing pop-ularity of electronical communication[1] . The fun-damental security requirements include confiden-tiality,authentication,data integrity,and nonre-pudiation.To provide such security services,mostsystems use public key cryptography. Among thevarious public key cryptography algorithms,theRSA cryptosystem is the bestknown,most versa-tile,and widely used public key cryptosystem to-day.In pu… 相似文献