期刊文献+

Progress and Prospect of Some Fundamental Research on Information Security in China 被引量:7

Progress and Prospect of Some Fundamental Research on Information Security in China
原文传递
导出
摘要 With the development of network and information technologies, information security is more and more widely researched in China. To know where the work is and where it goes, we focus on comprehensively surveying the twenty years of important fundamental research by Chinese scholars, and giving, from our point of view, the significance as well as the outlook of future work. Some of the reviewed work, including the researches on fundamental theory of cryptography, cryptographic algorithm, security protocol, security infrastructure and information hiding, greatly advances the related sub-fields, and is highly recognized in and outside of China. Nevertheless, the overall work, we think, is still facing the problems of unbalanced development of sub-areas, limited scope of research, lack of systematic work and application, etc., leaving much room for improvement in the near future. With the development of network and information technologies, information security is more and more widely researched in China. To know where the work is and where it goes, we focus on comprehensively surveying the twenty years of important fundamental research by Chinese scholars, and giving, from our point of view, the significance as well as the outlook of future work. Some of the reviewed work, including the researches on fundamental theory of cryptography, cryptographic algorithm, security protocol, security infrastructure and information hiding, greatly advances the related sub-fields, and is highly recognized in and outside of China. Nevertheless, the overall work, we think, is still facing the problems of unbalanced development of sub-areas, limited scope of research, lack of systematic work and application, etc., leaving much room for improvement in the near future.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第5期740-755,共16页 计算机科学技术学报(英文版)
基金 Supported by the National Natural Science Foundation of China under Grant No. 60025205. Acknowledgements Xian-Feng Zhao et al. for of the survey. We would like to thank Dr. their assistance in our writing
关键词 CRYPTOLOGY security protocol security infrastructure information security cryptology, security protocol, security infrastructure, information security
  • 相关文献

参考文献12

二级参考文献91

  • 1[1]Lebedev, A. N., Volchkov, A. A., NUSH, http: //www.cryptonessie.org.
  • 2[2]Mitsuru Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology-Eurocrypt'93, Berlin: Springer-Verlag, 1993, 386-397.
  • 3[1]Blackley, G. R., Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference,1979, 48: 313-317.
  • 4[2]Shamir, A., How to share a secret, Communications of the ACM, 1979, 22: 612-613.
  • 5[3]Blundo, C., De Santis, A., Di Crescenzo, G., Multi-secret sharing schemes, Advances in Cryptology-CRYPTO'94,1995, 839: 150-163.
  • 6[4]Beimel, A., Secure Schemes for Secret Sharing and Key Distribution, PhD thesis, Technion-Israel Institute of Techonlogy, 1996.
  • 7[5]Blundo, C., De Santis, A., Masucci, B., Randomness in Multi-Secret Sharing Schemes, Technical Report, University of Salerno, 1998.
  • 8[1]Filiol E,Fontaine C,Josse S.The COSvd Ciphers.In:The State of the Art of Stream Ciphers,Workshop Record,Belgium,October 2004.45-59
  • 9[2]Wu H,Bao F.Cryptanalysis of stream cipher COS (2,128) mode I.In:Australian Conference on Information Security and Privacy-ACISP'2002,LNCS Vol.2384.Berlin:Springer-Verlag,2002.154-158
  • 10[3]Babbage S.The COS stream ciphers are extremely weak.http://eprint.iacr.org/2001/078/

共引文献45

同被引文献49

引证文献7

二级引证文献395

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部