Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Applications》 2004-02
Add to Favorite Get Latest Update

Cryptography Algorithm- Survey and Trends

QIN Zhi-guang (College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China)  
Cryptography algorithm is the core of cryptography technology. Based on the introduction of some theoretical backgrounds, this paper discusses and analyses the update state of the cryptography algorithm. In studying symmetric-key (secret key) cryptography algorithm, the disadvantages of DES and the advantages of AES are analysed. In studying public-key cryptography algorithm, RSA and its unfavorable situation, ECC and its benefits, and some precautions in using ECC are discussed. Besides, NTRU is described and investigated. The paper ends with the perspectives of cryptography algorithm ,its applications and standardization.
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 LIU Sheng-guo,LIU Yan-lin(School of Computer and Communication Engineering,SWJTU,Chengdu 610031);Binary file encryption based on triple DES and RSA[J];Journal of Chengdu University of Information Technology;2006-01
2 WU Jiang, SONG Shi-yuan (Logistical Engineering University, Chongqing 400016,china);The Improvement of a Text-encryption Method[J];Journal of Chongqing Petroleum College;2004-02
3 QI Jun-xian,ZHOU Jian-qin (Department of Computer Science,Anhui University of Technology, Ma'anshan 243002,China);Survey on Cryptography Algorithms[J];Telecommunication Engineering;2006-05
4 LONG Ya (Computer Science Department of Bijie University,Bijie,Guizhou551700,China);A Program Design ECC-based Orderly Digital Multi-signature[J];Journal of Bijie University;2009-08
5 Tan Guolv(Department of Mathematics and Computer, Shangrao Normal College, Shangrao, Jangxi 334001);Construction of the Encryption Matrix Based on Matrices Tensor Production[J];Computer Engineering and Applications;2006-23
6 ZHUO Ze-penga,WEI Shi-minb(a.Department of Mathematics;b.Department of Computer Science & Technique,Huaibei Coal Industry Teachers College,Huaibei Anhui 235000,China);NTRU Public Key Cryptosystem and Its Analysis of Security[J];Journal of Huaiyin Institute of Technology;2006-05
7 BAI Guangwen,YU Jianxin(State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093);Implementation of Block Cipher on Embedded Microprocessor ARM[J];Computer Engineering;2006-13
8 ZOU A-jin1,XIAO Xiu-chun1,2(1.Information College,Guangdong Ocean University,Zhanjiang 524088;2.School of Information Science and Technology,Sun Yat-sen University,Guangzhou 510275);Asynchronous Encryption of Neural Networks Based on Chaotic Control System[J];Computer Engineering;2008-12
9 TIAN Zhi-gang1,BAO Wan-su1,ZHANG Wei2(1.Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004;2.Academy of Armored Forces Engineering of PLA,Beijing 100072);Secure Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J];Computer Engineering;2008-24
10 Zhang Xiaoli(Shanghai Institute of Foreign Trade,Shanghai 201600);Application of Cryptography Technology in E-Commerce Security[J];Computer & Digital Engineering;2005-12
China Proceedings of conference Full-text Database 1 Hits
1 ChenXiaoFeng University of Electronic Science and Technology Of China;In-depth anatomy of RSA software implement[A];[C];2009
Chinese Journal Full-text Database 1 Hits
1 Zhang Xianfeng Qin Zhiguang Liu Jinde (College of Computer Science and Engineering, UEST of China Chengdu 610054);Analysis of Security and Efficiency on Elliptic Curves Cryptosystems[J];Journal of University of Electronic Science and Technology of China;2001-02
Chinese Journal Full-text Database 10 Hits
1 XIN Yi1,TAO Ran2,WANG Yue2 (1.Department of Biomedical Engineering,Beijing Institute of Technology,Beijing 100081,China;2.Department of Electronic Engineering,Beijing Institute of Technology,Beijing 100081,China);Application of MFRFT to the Shamir's Three-pass Protocol[J];Acta Armamentarii;2008-06
2 ZHANG Qing-hua,YIN Long-jun,LIU Yong(Chongqing University of posts and Telecommunications,Chongqing 400065,P.R.China);Application of elliptic curve cryptosystem in digital signature[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-02
3 ZHOU Zheng-guo1 FAN wei1,2(1.Lianyungang Teachers College,Lianyungang 222006;2.Soochow University,Suzhou 215000);Research on Campus Network Intrusion Detection Technology Based on Data Mining[J];Journal of Chongqing University of Science and Technology(Natural Sciences Edition);2008-05
4 LIU Lian-hao,HU Zhi-yong(College of Information Science and Engineering, Central South University, Changsha 410083, China);The Decimal System Encryption Based on AES and Its Application in the Prepay System[J];Journal of Changsha University of Electric Power(Natural Science);2005-03
5 TAN Xian-lun, RUAN Yong-liangCollege of Electronics & Information Engineering, Tongji University, Shanghai 200331, China;A new improved algorithm of knapsack[J];Computer Knowledge and Technology;2004-29
6 LI Bei (The Information Management Department,University of Qinghai Finance and Economics College,Xining 810001,China);Research of a Enhanced Authentication in WLAN[J];Computer Knowledge and Technology;2008-28
7 YANG Jian-wu(Zengcheng college,South China Normal University,Guangzhou 511363,China);Design and Implementation of IDEA Encryption Algorithm[J];Computer Knowledge and Technology;2009-19
8 ZHANG Lei, ZHANG Chuan Fu (Institute of Electronic Technology, the PLA Information Engineering University,Zhengzhou 450004,China);The solution to master key generation for mobile IP registration[J];Application of Electronic Technique;2007-08
9 PENG Mi1,WANG Xing2(1.School of Electronic Information,Huazhong University of Science and Technology,Wuhan 430074,China;2.School of Mechamism,Huazhong University of Science and Technology Wuhan 430074,China);Design of new password-DQ password[J];Electronic Design Engineering;2009-02
10 XIN Yi TAO Ran WANG Yue (Department of Electronic Engineering,Beijing Institute of Technology,Beijing 100081,China);Real-value encryption of digital image utilizing fractional Fourier transform[J];Optical Technique;2008-04
China Proceedings of conference Full-text Database 2 Hits
1 ;Cheat-Proof Secret Sharing Scheme Based on ECDSA[A];[C];2005
2 Sheng Jiafeng~1 Chen Dan~2 (1.Nanjing Financial and Economic School,Nanjing 210001; 2.Nanjing University of Aeronautics and Astronautics,Nanjing 210001);Research of Analyzing and advancing WEP Protocol of Wireless Networks[A];[C];2009
Chinese Journal Full-text Database 10 Hits
1 YE Jia -sheng(Anhui TV University,Hefei 230022,C hina);Legal Thoughts on Electronic Signature and Authentication under the Environment of E-commerce──Focus also on Regulations of E-commerce in Guangdong Province[J];Journal of Anhui TV University;2003-02
2 Meng mel, then yong, Li zbong -jun;The scheme of constructing the database safe mechanism[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-02
3 LIU Tao,YAN Yi-qun (Dept. of Comp. Engn., AnHui University of Technology and Science, WuHu, 241000, China);Study and design of generating meet-keybased on elliptic curve crypto-protocol[J];Journal of Anhui University of Technology and Science;2004-01
4 Kang Xiaohua (Qiannan Vocational - technical College for Nationalities,Duyun 558022,Guizhou,China);Researches on the setting up humanistic concept in the student management[J];Journal of Anshun Teachers College;2004-01
5 FANG Jia-xi, XU Shan-feng, LI Yu-shan (Institute of Electronic CAD , Xidian University, Xi’an 710071,China);Principle and peripheral interface design of USB[J];Semiconductor Technology;2002-11
6 Zhao Hui (College of Fund. Sci. , North China Univ. of Tech., 100041, Beijing , China);Arnold Transformation of n Dimensions and its Periodicity[J];Journal of North China University of Technology;2002-01
7 DENG Liang bo, ZHA Jian zhong (College of Mechanical and Electronic Control Engineering,Northern Jiaotong University, Beijing 100044,China);XML Applied in Product Information Integration of Network-Based Manufacturing[J];Journal of Northern Jiaotong University;2002-04
8 ZHANG Yihao TIAN Ze YU Dunshan SHENG Shimin (Department of Microelectronics,Peking University,Beijing,100871);An Improvement in the VLSI Implementation of Montgomery Algorithm[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2004-01
9 WANG Jian JIANG Anping SHENG Shimin(Department of Microelectronics, Peking University, Beijing, 100871);A Dual Field Modular Inversion Algorithm and Hardware Implementation[J];Acta Scientiarum Naturalium Universitatis Pekinensis;2007-01
10 Lin Xuelian Liu Xudong Huai Jinpeng (Dept. of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics);Design and Implementation of XML Data Security System[J];Journal of Beijing University of Aeronautics and Astronautics;2003-04
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 LU Hua-ling(Chongqing University of Posts and Telecommunications,Chongqing 400065,China);Research on Security Technology for Electronic Commerce[J];Journal of Chongqing Institute of Technology(Natural Science Edition);2007-12
2 LUO Na (Department of Computer, Jiangxi Economy Administrative Cadre Institute, Nanchang 330000, China);In Electronic Commerce Security Encryption Technology Discussion and Application[J];Computer Knowledge and Technology;2008-31
3 CHEN Chen, WANG Xing-jun (Digital Television Technology R&D Center, Tsinghua University, Beijing 100084, China);Research on Bi-directional ECC-based Authentication Protocol[J];Video Engineering;2009-04
4 HE Jian(Dean`s office Sun Yat-sen University, Guangzhou, Guangdong 510275,China);A Technology and Model of Random Password which First Encrypted on Vision[J];Computer Security;2010-11
5 WU Ying-ying,ZHOU Lu,CHEN Chan(School of Law,Chongqing University of Posts and Telecomunications,Chongqing 400065,China);Preliminary Evidence and Its Application in the Electronic Signature[J];Journal of Chongqing University of Posts and Telecommunications(Social Science Edition);2010-06
6 ;Research and Implementation of Cipher Security Technology of GPON[J];Information & Communications;2008-03
7 ;WPS协议分析之浅见[J];Heilongjiang Science and Technology Information;2008-23
8 WANG Jing-tong(Information Department,Hunan Business College,Changsha 410205);Encryption Algorithm in E-commerce and Security[J];Journal of Hunan Business College;2007-05
9 Wei Guoheng;Performance Analysis of Data Encryption Based on IDEA[J];Computer & Digital Engineering;2007-11
10 CHONG Jin-feng,ZHUO Ze-peng (Department of Mathematics,Huaibei Coal Industry Teachers College,Huaibei 235000,China);An Optimized NTRU Cryptography Algorithm[J];Computer and Modernization;2008-04
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Xiong Jintao Liu Hongxiu Pi Dezhong (Institute of Applied Physics ,UEST of China Chengdu 610054)$$$$;Lucas Public-key Cryptosystem and Its Security[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1999-04
2 Xiang Qian; Liu Zhao (Inst of Electronic Eng., UEST of China Chengdu 610054);Simplest Accomplishment of Arithmetic on Galois Fields[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;2000-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved