军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 31-45 共查到会议中心 军队指挥学相关记录113条 . 查询时间(2.08 秒)
2016年8月30日至9月1日,由中国密码学会密码数学理论专业委员会、宁夏大学和清华大学联合主办的“中国密码学会密码数学理论专委会2016年学术研讨会”在美丽的塞上名城银川隆重召开。本次会议邀请了国内外众多著名密码专家和学者,包括2000年“图灵奖”得主、中国科学院外籍院士姚期智和中国科学院院士潘建伟等莅临会议并作特邀报告。来自国内外密码数学理论领域的150余位学者专家、行业精英和工程技术人员参加...
Over the past decade, the hybrid lattice reduction and meet-in-the middle attack (called the Hybrid Attack) has been used to evaluate the security of many lattice-based cryprocraphic schemes such as N...
Oblivious transfer protocol is an important cryptographic primitive having numerous applications and particularly playing an essential role in secure multiparty computation protocols. On the other han...
Several cryptographic methods have been developed based on the difficulty to determine the set of solutions of a polynomial system over a given field. We build a polynomial ideal whose algebraic set...
In this paper I propose the fully homomorphic public-key encryption(FHPKE) scheme with zero norm noises that is based on the discrete logarithm assumption(DLA) and computational Diffie–Hellman assumpt...
2016年7月28日至29日,由中国密码学会量子密码专业委员会主办,青岛理工大学理学院承办的“中国密码学会2016年量子密码专业委员会学术会议”在美丽的海滨城市青岛召开。本次会议是量子密码专业委员会举办的学术年会,旨在促进量子密码专业的理论研究和应用,推动学科交流,增强相关研究方向的交叉合作,同时为探讨量子密码专业发展趋势、前沿和应用问题提供交流平台。会议获得了中国科协高端学术交流活动项目的支持,...
A robust combiner for hash functions takes two candidate implementations and constructs a hash function which is secure as long as at least one of the candidates is secure. So far, hash function combi...
Searchable Symmetric Encryption aims at making possible searching over an encrypted database stored on an untrusted server while keeping privacy of both the queries and the data, by allowing some smal...
The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the bounded leakage and the continual leakage mod...
由中国科学院信息安全国家重点实验室(SKLOIS)和中国密码学会(CACR)主办、国际密码协会(IACR)协办的“第十二届信息安全与密码学国际会议”(Inscrypt 2016)将于2016年11月4-6日在北京举办。
The accuracy and the fast convergence of a leakage model are both essential components for the efficiency of side-channel analysis. Thus for efficient leakage estimation an evaluator is requested to p...
Despite much study, the computational complexity of differential privacy remains poorly understood. In this paper we consider the computational complexity of accurately answering a family QQ of statis...
2015年,国务院学位委员会、教育部决定在“工学”门类下增设“网络空间安全”一级学科,并明确指出需加强“网络空间安全”的学科建设。截至目前,教育部批准全国共116所高校设置网络空间安全类相关本科专业。密码学与信息安全是网络空间安全学科重要的研究方向。为了让我国网络空间安全相关领域的教育、科研工作者更好地分享各自教育教学改革的经验和做法,中国密码学会教育与科普工作委员会将于2016年9月9日至11日...
CRYPTO 2016 is the 36th International Cryptology Conference. It will be held at the University of California, Santa Barbara (UCSB) from August 14 to 18, 2016. The academic program covers all aspects o...
Asiacrypt 2016, the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, will be organized by Vietnam Institute for Advanced Study in Mathematics...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...