Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Engineering Mathematics》 2002-01
Add to Favorite Get Latest Update

The Application of Number Theory in Cryptography

WANG Guo jun (Xi'an Jiaotong University, Xi'an 710049; Shanxi Normal University, Xi'an 710062)  
Through three typical examples, how to apply the number theory in cryptography is introduced briefly.
【Fund】: 国家自然科学基金重点项目 198310 4 0
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 DONG Le,YUAN De-qiang (School of Mathematical Science,Anyang Normal University,Anyang 455000,China);Some Properties of a Special Generalized Self-shrinking Sequence on GF(3)[J];Journal of Anyang Normal University;2009-02
2 CHEN Xiao-min1,GUO Ai-huang1,LI Zheng-bin2(1.College of Electronics and Information Engineering,Tongji University,Shanghai 200092,CHN;2.State Key Lab.of Advanced Optical Communication Systems and Networks,Peking University,Beijing 100871,CHN);Performance Analysis of A New Optical Code Label in OC-GMPLS Networks[J];Semiconductor Optoelectronics;2008-02
3 KUANG Wei\ ZHANG Xiao lin HU Yi (Beijing University of Aeronautics and Astronautics, Dept. of Electronic Engineering);Scheme of Secure Telemetry Data Transmitting System Using in Certain UAV System[J];Journal of Beijing University of Aeronautics and Astronautics;2002-01
4 Luo Shoushan (Department of Basic Science, Beijing University of Posts and Telecommunications, Beijing 100876) Zhong Yuwei (Training Center, Beijing University of Posts and Telecommunications, Beijing 100876) Yang Yixian (Department of Information En;On Calculating the Generalized Hamming Weights of Hamming Codes with Simulated Annealing[J];JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS;1999-04
5 XU Guo ai, ZHANG Sheng, HU Zheng ming, YANG Yi xian (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);The Design and Implement of a Proxy Based on Gateway[J];Journal of Beijing University of Posts and Telecommunications;2001-03
6 YANG Yi xian, HU Zheng ming, XU Cheng qian (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);Overview of Dyadic Theory[J];Journal of Beijing University of Posts and Telecommunications;2002-01
7 YUE Jun qiao, NIU Xin xin, YANG Yi xian (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);Information Hiding Technology of Voice Encryption Communication[J];Journal of Beijing University of Posts and Telecommunications;2002-01
8 WEN Qiaoyan1,YANG Yixian2(1School of Science, Beijing University of Posts and Telecommunications, Beijng 100876, China; 2Information Engineering School, Beijing University of Posts and Telecommunicatrons, Beijing 100876, China);Enumeration of Resilient Functions[J];Journal of Beijing University of Posts and Telecommunications;2002-04
9 DING Jin-kou, HUANG Zheng , WEN Qiao-yan, YANG Yi-xian (1.School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2. Information Eugineering Shcool,Beijing University of Posts and Telecommunications,Beijing 100876, China);Construction and Properties with a Kind of Extensive Bent Functions[J];Journal of Beijing University of Posts and Telecommunications;2003-S1
10 HUANG Zheng , DING Jin-kou , WEN Qiao-yan , YANG Yi-xian (1 .School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2. Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);Recursive Production Algorithm of a Lager Set of Orthogonal Arrays of GF(2)[J];Journal of Beijing University of Posts and Telecommunications;2003-S1
China Proceedings of conference Full-text Database 10 Hits
1 Shen Yanguang, Si Chunjing (Hebei University of Engineering 056038) (Guangdong Provincial Key Laboratory of Information Security Technology (Guangzhou University) 510006);Research on Improving Nonlinearity of a Class of Bent Functions[A];[C];2006
2 CAO Ming, GU Li-ze, HU Zhengming, YANG Yixian (Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) Slate Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China);Annihilators of Boolean Functions[A];[C];2006
3 Na Jian Liu Wenfen (Information Engineering University,Zhengzhou Henan 450002,China);The Coincidence of the Multiply and Xor Clock Controlled Combiner[A];[C];2008
4 ZHU Hong-yu~1 LIU gui~(1,2) LIU Yu-jun~2 MAO Hong-yu~1 TANG Ling-li~1 (Jiangnan Institute of Computing Technology,Wuxi 214083,China) 1 (Institute of Information Engineering,Information Engineering University of PLA,Zhengzhou 450002,China) 2;Improvements on the McEliece Public Key Cryptosytems[A];[C];2008
5 Yang Liming~1,Zhou Liang~2 The State Telecom Anti-Interference key LAB,UESTC,Chengdu,610054;The security analysis on long binary Sequences[A];[C];2008
6 Wang Yong-juan Han Wen-bao Zeng Ben-sheng Li Shi-qu (Department of Information Research,PLA Information Engineering College Information Engineering Institute,Zhengzhou,450002);Construct Bent Function by Character Matrices[A];[C];2006
7 Li Weiwei Wang Zhuo Zhang Zhijie (Inst. of Computer Science and Information Engineering , Northwest University for Nationalities 730030);The Application of Derivative and E-derivative on H-Boolean Functions[A];[C];2008
8 Zhang Zhijie Wang Zhuo Li Weiwei (Inst. of Computer Science and Information Engineering, Northwest University for Nationalities, 730030);The Application of E-derivative in Studying Bent Function[A];[C];2008
9 LI Hao~(1,2) XIE Duan-qiang~1 (1 Department of Mathematics and System Science,School of Science,National University of Defense Technology,Changsha 410073,China 2 Bejing Aeronautical Technology Research Centre,Bejing 100076,China);The Periodic Autocorrelation Function of Pseudorandom Sequences over GF(q)[A];[C];2009
10 QIAO Tong-xu,ZHANG Wen-zheng,ZHU Shi-xiong (State Key Laboratory for Modern Communications,Chengdu Sichuan 610041,China);Least Periods Computing of Some Classes of Periodic Sequences[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHU Sheng_zhi(School of Sciences, Northern Jiaotong University, Beijing 100044,China);An Infinite Product and Its Application in Number Theory[J];Journal of Northern Jiaotong University;2002-06
2 LI Hai-long,LIU Zhi-min,CHENG Xing-ge (Dept.Math.,Weinan Teachers College,Weinan 714000,Shaanxi,China);A number theoretic function and its fifth power mean value formula[J];Journal of Baoji College of Arts and Science(Natural Science Edition);2002-04
3 Zhu Weiyi (College of Mathematics,Physics and Information Engineer Zhejiang Normal University,Jinhua 321004,China);On the asymptotic property of the F. Smarandache function S(m~n)[J];Pure and Applied Mathematics;2007-01
4 ZHANG Hai rong 1,HUANG Yan xin 2,FU Yan ning 2,WANG Ming de 3 (1.Dean's Office, Changchun Post and Telecommun.Inst., Changchun 130012,China; 2.Dept.of Computer Eng.,Changchun Post and Telecommun.Inst.,Changchun 130012,China; 3.Jilin Branch of;Realization method of RSA algorithm in public-key cryptosystem[J];JOURNAL OF CHANGCHUN POST AND TELECOMMUNICATION INSTITUTE;2000-02
5 Jian Xiaoqing;RSA System and Implementing the Arithmetic on Resolveing Large Prime Number[J];Computer Study;2001-04
6 DONG Qing kuan,FU Xiao tong,XIAO Guo zhen(National Key Lab of Integrated Service Networks,Xidian University,Xi'an,Shanxi 710071,China);An Effective Searching Algorithm for Factoring Large Integer n=pq[J];Acta Electronica Sinica;2001-10
7 REN Gang lian 1,2 , REN Xiang ming 3 (1.Department of Mathematics,Northwest University,Xian 710069,China; 2.Qian Xian Teachers School,Qianxian 713300,China; 3.Shaan Xi Energy Institute,Xianyang 712000,China);An asymptotic formula of one kind number theoreticfunctions[J];Basic Sciences Journal of Textile Universities;2002-03
8 JI Yong-qiang(Danfeng Teacher′s School,Shangluo,Shaanxi,726207,China);Number theoretical functions and its equation[J];Basic Sciences Journal of Textile Universities;2006-01
9 HU Yong-zhong(Department of Information Sciences and Mathematics,Foshan University,Foshan 528000,China);A note to the exponential diophantine equation x~2+D~m=p~n[J];Journal of Foshan University(Natural Science Edition);2007-03
10 LIU Shao tao, LING Jie (Faculty of Computer, GDUT, Guangzhou 510090, China);Data Encryption Algorithm and The Generation and Operation of Great Primes[J];Journal of Guangdong University of Technology;2001-04
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 WANG Hao-yu(School of Electronic Information & Control Engineering,Beijing University of Technology,Beijing 100022,China);SCADA system emulator in a kind of garbage incinerator model[J];Journal of Qinghai University;2005-02
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 ZHENG Dong 1,ZHANG Fang guo 2,CHEN Ke fei 1,YOU Jin yuan 1(1 Dept.of Computer Science and Engineering,Shanghai Jiaotong Univ.,Shanghai 200030,China; 2 Key Lab.On ISDN,Xidian Univ.,Xi'an 710071,China);Multi-Item Fair Exchange with Semi Trusted Neutral Party[J];Acta Electronica Sinica;2001-01
2 SHI Rong-Hua (Changsha Railway University, Changsha 410075);A(t,n)THRESHOLD SHARED VERIFICATION SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;2000-03
3 JIANG Xiao Ning, YE Cheng Qing, and PAN Xue Zeng (Department of Computer Science & Engineering, Zhejiang University, Hangzhou 310027);FAIR EXCHANGE PROTOCOLS WITH OFF-LINE SEMI-TRUSTED THIRD PARTY[J];Journal of Computer Research and Development;2001-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved