Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update

Design and Analysis of Cryptographic Secure Hash Algorithm

Zhu Huafei;Liu Jianwei(Doctoral Class,Xidian Univ.,Xi’an 710071)Wang Xinmei;Xiao Cuozheng(Xidian Univ.,Xi’an 710071)  
The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.
【Fund】: 国家自然科学基金
【CateGory Index】: TN918
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
2 ;Smart Card Based Authentication and Application[J];Applications of The Computer Systems;2005-01
Chinese Journal Full-text Database 10 Hits
1 Jia Kebin, Shen Bo (College of Electronic Information & Control Engineering, Beijing Polytechnic University, Beijing 100022) Liu Junqian, Ren Qicai, Wang Yibo (Department of State Assets, Beijing Polytechnic University, Beijing 100022);The Study of Interior Security to Campus-Wide Information Systems[J];Journal of Beijing Polytechnic University;2000-04
2 Hu Yishi Huai Jinpeng (School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China);Research and implementation on Web services-based single sign-on system[J];Journal of Beijing University of Aeronautics and Astronautics;2004-03
3 Liu Jianwei;Wang Yumin;Xiao Guozhen(National Key Lab.of ISDN,Xidian Univ.,Xi'an 710071);A Protocol for Authentication of Mobile User Based on KryptoKnight[J];ACTA ELECTRONICA SINICA;1998-01
4 LI Zi chen,YANG Yi xian,WU Wei ling(Beijing University of Posts and Telecommunications,Beijing 100876,China);Key Authentication Scheme Based on Digital Signature[J];ACTA ELECTRONICA SINICA;2000-04
5 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
6 LIU Shao tao, LING Jie (Faculty of Computer, GDUT, Guangzhou 510090, China);Data Encryption Algorithm and The Generation and Operation of Great Primes[J];Journal of Guangdong University of Technology;2001-04
7 LI Jian-jun,ZHU Hai-bo,ZHANG Li-xia (Dept.of Economy and Trade,Harbin University of Commerce,Harbin150076,China);The Structure of E-business firewall and Its Application[J];Journal of Heilongjiang Commercial College (Natural Sciences Edition);2001-03
8 Chen Qin\ Jiang Hong (Department of Computer Science and Technology, Hangzhou Institute of Electronic Engineering, Hangzhou 310037);Design and Analysis of Hash Function[J];JOURNAL OF HANGZHOU UNIVERSITY(NATURE SCIENCE);1999-01
9 XU Qiu Liang and LI Da Xing (Department of Computer Science, Shandong University, Jinan 250100) (Institute of Network Security, Shandong University, Jinan 250100);ELLIPTIC CURVE CRYPTOSYSTEMS[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;1999-11
10 LI Wei 1 and XU Zhi-Wei 2 1(Software Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080) 2(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080);A Model of Grid Address Space with Applications[J];Journal of Computer Research and Development;2003-12
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 Chen Yanyu(Minjiang University,Fuzhou 350001,Fujian,China);A Fair Electronic Payment Schemes Based on Concurrent Signature[J];Journal of Anshun University;2009-02
2 ;基于动态口令身份认证系统的设计与实现[J];;2007-02
3 DONG Jiang~(1a),DONG Shi-lei~2,GUO Yun-xia~(1b)(1a.Educational Technology Center,1b.Library of Nanhu Campus,Jilin University,Changchun 130012,China;2.School of Telecommunication and Network Technology,Bejing University of Posts and Telecommunication,Beijing 100876,China);Universal Platform of Downloading OTA Technology Based on SMS[J];Journal of Changchun Post and Telecommunication Institute;2005-06
4 GONG Ru-hong1,ZHOU Yan2 (1.Guangzhou Intelligence Communications Technology Co., Ltd., Guangzhou 510630,China; 2.Department of Computer,Electromechanic & Information Engineering Institute,FoShan Science & Technology Institute,Foshan 528000,China);The Algorithm Design and Application of two-way Authentication Mechanism[J];Computer Knowledge and Technology;2008-05
5 ;Application of Fingerprint Recognition at Power System Database[J];Power System Engineering;2008-03
6 SHI Xiao-ying (Department of Computer Science of Weinan Teachers University,Shanxi Weinan 714000);The Design and Realization of Identify Authentication System Based on Dynamic Password[J];CD Technology;2006-01
7 ;Introduction on the Standards and Testing Method for Digital Certificate Application Products[J];Information Technology & Standardization;2009-Z1
8 Wang Hongjun (Department of Computer Science, JiLin Normal University, SiPing 136000, China);The Research on Network Security Techniques[J];Heilongjiang Electronic Technology;2002-12
9 TIAN Zhong-fu,WANG Shu-yang,GU Zhi-xin (Information Engineering College of Northeast Forestry University,Harbin 150040,China);Application of sound groove recognition technology in e-commerce safety authentication[J];Information Technology;2005-11
10 QU Yi (Dept.of Computer Science,Huaihai Institute of Technology,L ianyungang2 22005 ,China);A Study on the Identification Authentication of Network Security[J];JOURNAL OF HUAIHAI INSTITUTE OF TECHNOLOGY;2001-01
China Proceedings of conference Full-text Database 3 Hits
1 Zou Yingchun~1 Wang Zhenqi~2 Wang Ping~3 1,3 School of Computer Science and Technology; 2 Information and network center,North China Electric Power University,Baoding 071003,China;Research of Fingerprint-based Campus Identity Verification System[A];[C];2008
2 ZHANG Xi GU Li-ze LI Zhong-xian Information Security Center,State Key Laboratory of Networking and Switching,Beijing University of Posts and Telecommunications,Beijing 100876;A Research and Implementation in Kerberos Authentication Protocol based on USBKEY[A];[C];2008
3 ;Analysis and Improvement of Password Authentication[A];[C];2004
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved