Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 588-591.doi: 10.11896/jsjkx.210100024
• Information Security • Previous Articles Next Articles
GU Shuang-jia1, LIU Wan-ping1, HUANG Dong2
CLC Number:
[1]WEI Y X.Research on safety supervision of logistics express in-dustry in China[J].Cooperative Economy Science,2020(8):190-192. [2]ZHANG Z Y,TENG M Y,LIAO H W,et al.User privacy information protection method for logistics industry[J].Journal of Hunan University of Arts and Science(Natural Science Edition),2016,28(2):74-78. [3]LIU H F,LIU Y,LIANG X L.A two-dimensional code encryption algorithm combining optimized AES and RSA algorithm[J].Journal of Shaanxi University of Science & Technology,2019,37(6):153-159. [4]YAO L S,ZHANG S L,FANG B,et al.Design and implementation of passenger information security system based on two dimensional code encryption[J].Journal of Changchun Teachers College,2020,39(2):68-77. [5]YI L H,ZOU X C,LIU Z L,et al.Design of AES coprocessor with high throughput and low cost[J].Application Research of Computers,2009,26(6):2136-2137. [6]FAN B X.Research on encryption method for big data[D].Huangshi:Hubei Normal University,2016. [7]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-likecryptosystems[J].Journal of Cryptology,1991,4(1):3-72. [8]MATSUI M.Linear cryptanalysis method for DES cipher [C]//Advances in Cryptology-EUROCRYPT.Berlin:Springer Verlag,1993:386-397. [9]XU Y T,LV Z G,HUANG Y G,et al.Optimization and implementation of AES algorithm based on STM32 MCU[J].Automation Instrument,2020,41(7):56-60. [10]CHEN Y W,LIU Y L,MA L T,et al.Research on AES and ECC algorithm improvement and hybrid encryption for substation[J].Foreign Electronic Measurement Technology,2020,39(10):60-65. [11]ALMAZROOIE M,SAMSUDIN A,ABDULLAH R,et al.Quantumreversible circuit of AES-128[J].Quantum Information Processing,2018,17(5):112-129. [12]ZHANG M H,CHEN Z J,XU X Y.Design and implementation of DSP security protection based on AES algorithm[J].Microelectronics and Computer,2019,39(10):32-36. [13]DIFFIE W,HELLMAN M E.Special feature exhaustive cryptanalysis of the NBS data encryption standard[J].IEEE Compu-ter,1977,10(6):74-84. [14]DERBEZ P,FOUQUE P,JEAN J.Improved key recovery attacks on reduced-round AES in the single-key setting[C]//32nd Annual International Conference on the Theory and Applications of Crypto-graphic Techniques.Springer,2013:371-387. [15]MANGARD S.A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion[C]//Information Security and Cryptology-ICISC 2002.Berlin,Heidelberg:Springer,2003:343-358. [16]MAGHREBI H.Deep learning based side channel attacks inpractice[J].IACR Cryptology ePrint Archive,2019,578. [17]ZHANG Y J,HAN Y X,LIU X Y.Account Password management app based on AES algorithm[J].Computer Technology and Development,2019,29(8):125-129. [18]LI G,YANG Y,SUN Y W,et al.Research on the application of AES algorithm in QR code generation and recognition[J].China New Communication,2020,22(9):95-96. [19]LIAO Z X,WANG J.Research on multiple encryption algorithm based on QR code[J].Computer Knowledge and Technology,2015,11(30):64-65. [20]QI N Q.Research on the application of RSA algorithm in two dimensional code anti-counterfeiting technology[D].Nanjing:Nanjing University of Posts and Telecommunication,2017. |
[1] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[2] | ZHU Di-chen, XIA Huan, YANG Xiu-zhang, YU Xiao-min, ZHANG Ya-cheng and WU Shuai. Research on Mobile Game Industry Development in China Based on Text Mining and Decision Tree Analysis [J]. Computer Science, 2020, 47(6A): 530-534. |
[3] | LU Yao, CHEN Kai-yan, WANG Yin-long and SHANG Qian-yi. L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method [J]. Computer Science, 2020, 47(6A): 375-380. |
[4] | CHEN Jing-xian. Design and Realization of Laboratory Equipment Management System Based on QR Code Technology and WeChat Mini-program Technology [J]. Computer Science, 2020, 47(11A): 673-677. |
[5] | LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41. |
[6] | XU Chuan-fu,WANG Xi,LIU Shu,CHEN Shi-zhao,LIN Yu. Large-scale High-performance Lattice Boltzmann Multi-phase Flow Simulations Based on Python [J]. Computer Science, 2020, 47(1): 17-23. |
[7] | SUN Lian-shan, OUYANG Xiao-tong, XU Yan-yan, WANG Yi-xing. Novel Sanitization Approach for Indirect Dependencies in Provenance Graph [J]. Computer Science, 2019, 46(3): 164-169. |
[8] | WANG Hui, ZHOU Ming-ming. Medical Information Security Storage Model Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 174-179. |
[9] | ZHAN Xiong, GUO Hao, HE Xiao-yun, LIU Zhou-bin, SUN Xue-jie, CHEN Hong-song. Research on Security Risk Assessment Method of State Grid Edge Computing Information System [J]. Computer Science, 2019, 46(11A): 428-432. |
[10] | ZHOU Yi-hua, ZHANG Bing, YANG Yu-guang, SHI Wei-min. Cluster-based Social Network Privacy Protection Method [J]. Computer Science, 2019, 46(10): 154-160. |
[11] | DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao. Information Security Framework Based on Blockchain for Cyber-physics System [J]. Computer Science, 2018, 45(2): 32-39. |
[12] | LENG Qiang, YANG Ying-jie, HU Hao. Self-adaption Adjustment Method for Experts in Risk Assessment [J]. Computer Science, 2018, 45(12): 98-103. |
[13] | DU Xing-zhou, ZHANG Kai, JIANG Kun, MA Hao-bo. Research on Blockchain-based Information Transmission and Tracing Pattern in Digitized Command-and-Control System [J]. Computer Science, 2018, 45(11A): 576-579. |
[14] | DONG Gui-shan, CHEN Yu-xiang, ZHANG Zhao-lei, BAI Jian, HAO Yao. Research on Identity Management Authentication Based on Blockchain [J]. Computer Science, 2018, 45(11): 52-59. |
[15] | CHEN Zhuang and YE Cheng-yin. Scheme of Cloud Audit Data Encryption Based on AES and ECC [J]. Computer Science, 2017, 44(Z6): 333-335. |
|