We design cryptographical graphs for information security by the following principles: (1) be used conveniently in usually; (2) with strong security, that is, it is difficult to be broken; (3) there are enough graphs and labellings for making desired keys and locks. For answering the above problems, we prove the series cryptographical graphs have good properties, and show the guarantee for constructing large scale of cryptographical trees from smaller cryptographical trees. The methods used for constructing the desired cryptographical graphs can be transformed into efficient algorithms.National Natural Science Foundation of China [61572046, 61163054, 61363060, 61662066]CPCI-S(ISTP)15-2010
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number t...
Graphs may be used for the design of stream ciphers, block ciphers or public-key ciphers. This paper...
We introduce *bonsai trees*, a lattice-based cryptographic primitive that we apply to resolve some i...
The security of real networks is facing serious challenges and is harder than ever. We propose an id...
The security of real networks is facing serious challenges and is harder than ever.We propose an ide...
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, ...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to ...
Leakage-free authentication of trees and graphs have been studied in the literature. Such schemes ha...
In today’s technological world, confidentiality is an important issue to deal with, and it is carrie...
The security of passwords generated by the graphic lattices is based on the difficulty of the graph ...
We have been investigating the cryptographical properties of in nite families of simple graphs of la...
Graph theory studies the properties of graphs and networks. Graphs are an excellent tool for designi...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number t...
Graphs may be used for the design of stream ciphers, block ciphers or public-key ciphers. This paper...
We introduce *bonsai trees*, a lattice-based cryptographic primitive that we apply to resolve some i...
The security of real networks is facing serious challenges and is harder than ever. We propose an id...
The security of real networks is facing serious challenges and is harder than ever.We propose an ide...
Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, ...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to ...
Leakage-free authentication of trees and graphs have been studied in the literature. Such schemes ha...
In today’s technological world, confidentiality is an important issue to deal with, and it is carrie...
The security of passwords generated by the graphic lattices is based on the difficulty of the graph ...
We have been investigating the cryptographical properties of in nite families of simple graphs of la...
Graph theory studies the properties of graphs and networks. Graphs are an excellent tool for designi...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number t...
Graphs may be used for the design of stream ciphers, block ciphers or public-key ciphers. This paper...
We introduce *bonsai trees*, a lattice-based cryptographic primitive that we apply to resolve some i...