Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 221100116-4.doi: 10.11896/jsjkx.221100116
• Information Security • Previous Articles Next Articles
SUN Min, SHAN Tong, XU Senwei
CLC Number:
[1]YANG Q,LIU Y,CHEN T,et al.Federated machine learning:Concept and applications[J].ACM Transactions on Intelligent Systems and Technology(TIST),2019,10(2):1-19. [2]YAN Y X,MA M,JIANG H.An Efficient Privacy Protection Sifang Machine Learning Scheme Based on Secret Sharing [J].Computer Research and Development,2022,59(10):2338-2347. [3]KANG H Y,DENG J.Enhanced hybrid encryption method for secure storage of medical data[J].Journal of Beijing Institute of Technology,2021,41(10):1058-1068. [4]Cryptography Administration.SM4 Block Cipher Algorithm:GM/T 0002-2012 [S].Beijing:China Standard Press,2012. [5]WANG J W,ZHANG S H,LI C.A Controllable Identity Management and Authentication Model of Agricultural Product Supply Chain Based on ECC-ZKP[J].Computer Application Research,2022,39(10):2916-2922,2928. [6]BIAN J X,LI Y J,WANG J H.Research on Hybrid Encryption Algorithm Based on SM4 and ECC[J].Computer Applications and Software,2016,33(10):303-306,324. [7]General Administration of Quality Supervision,Inspection andQuarantine of the People’s Republic of China,Standardization Administration of China.Information Security Technology SM2 Elliptic Curve Public Key Cryptographic Algorithm Part 1:General Provisions:GB/T 32918.1-2016 [S].Beijing:China Standards Press,2017. [8]Cryptography Administration.SM3 Cryptographic Hash Algo-rithm:GB/T 32905-2016[S].Beijing:China Standard Press,2012. [9]LI J L,MO Y N,SU T,et al.Hardware Design of High-speed Hybrid Encryption System Based on National Secret Algorithms SM2,SM3,SM4 [J].Computer Application Research,2022,39(9):2818-2825,2831. [10]HUANG X L,SHI H S,ZHANG C B,et al.Unpredictability of a Class of Combinatorial Linear Congruential Generators[J].Journal of Tsinghua University(Natural Science Edition),2016,56(1):22-27. [11]LI W,WANG M L,GU D W,et al.Ciphertext-only FailureAnalysis of SM4 Cryptographic Algorithm[J].Journal of Computers,2022,45(8):1814-1826. |
[1] | ZHAI Jia-qi, LI Bin, ZHOU Qing-lei, CHEN Xiao-jie. Implementation of FPGA-based High-performance and Scalable SM4-GCM Algorithm [J]. Computer Science, 2022, 49(10): 74-82. |
[2] | ZHU Ren-jie. Study on SM4 Differential Fault Attack Under Extended Fault Injection Range [J]. Computer Science, 2019, 46(11A): 493-495. |
|