Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chen Jie is active.

Publication


Featured researches published by Chen Jie.


international conference on communications, circuits and systems | 2006

A New Method for Impossible Differential Cryptanalysis of 7-round Advanced Encryption Standard

Chen Jie; Wei Yongzhuang; Hu Yupu

this paper presents a new method for impossible differential cryptanalysis of 7-round Advanced Encryption Standard. This attack on the reduced 7-round AES requires about 2123.5 chosen plaintexts, demands 289 words of memory, and performs 2122 7-round AES encryptions. Furthermore, it is only 2?34.5 of the probability to fail to recover the secret key.


Science in China Series F: Information Sciences | 2007

Impossible differential cryptanalysis of advanced encryption standard

Chen Jie; Hu Yupu; Zhang Yueyu

Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis of Advanced Encryption Standard (AES) and presents two methods for impossible differential cryptanalysis of 7-round AES-192 and 8-round AES-256 combined with time-memory trade-off by exploiting weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 requires about 294.5 chosen plaintexts, demands 2129 words of memory, and performs 2157 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-256 requires about 2101 chosen plaintexts, demands 2201 words of memory, and performs 2228 8-round AES-256 encryptions.


Wuhan University Journal of Natural Sciences | 2006

A new method for impossible differential cryptanalysis of 8-round advanced encryption standard

Chen Jie; Hu Yupu; Wei Yongzhuang

This paper first presents an impossible differential property for 5-round Advanced Encryption Standard (AES) with high probability. Based on the property and the impossible differential cryptanalytic method for the 5-round AES, a new method is proposed for cryptanalyzing the 8-round AES-192 and AES-256. This attack on the reduced 8-round AES-192 demands 2121 words of memory, and performs 2148 8-round AES-192 encryptions. This attack on the reduced 8-round AES-256 demands 2153 words of memory, and performs 2180 8-round AES-256 encryptions. Furthermore, both AES-192 and AES-256 require about 298 chosen plain-texts for this attack, and have the same probability that is only 23 to fail to recover the secret key.


Wuhan University Journal of Natural Sciences | 2006

Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers

Li Fagen; Hu Yupu; Chen Jie

In 2006, Baoet al proposed an identity-based threshold proxy signature scheme with known signers. In this paper, we show that Baoet al s scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signers intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Baoet al s scheme. The improved scheme satisfies all secure requirements for threshold proxy signature.


Archive | 2014

Privacy protection type real-time electric charge collecting method for intelligent power grid

Chen Jie; Zhang Yueyu; Shi Junping; Liu Junfeng; Zhang Qian; Zhao Zhen; Chen Ruoxin; Zhou Hua


Archive | 2014

Power counting and charging method with private protection function in intelligent power grid

Chen Jie; Zhang Yueyu; Li Qi; Qiao Qiaomei; Gong Fan; Shi Junping; Hu Yupu; Liu Junfeng


Archive | 2017

It is large -scale around double -deck center section of thick bamboo structure of tubular heat exchanger

Yu Wang; Chen Jie; Liang Chengpo; Qin Liujun; Zhan Zhicheng; Yu Hao; Pu Hui; Lu Laiyun; Su Qingbo; Mi Xiaoguang


Archive | 2017

Set up drum baffle and perforated plate structure's winding tubular heat exchanger in casing

Chen Jie; Mi Xiaoguang; Lu Laiyun; Yu Sicong; Hu Suyang; Pu Hui; Ding Chao


Archive | 2017

Coiled tubular heat exchanger of core shell separation

Ren Tao; Duan Zhongdi; Ding Guoliang; Chen Jie; Mi Xiaoguang


Archive | 2016

Reduce transformer low voltage paper tinsel coil eddy current loss's device

Wang Chunguang; Xue Juan; Chen Jie; Ma Guangjuan

Collaboration


Dive into the Chen Jie's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ding Guoliang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Hu Haitao

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jiang Yiqiang

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gao Wei

Renmin University of China

View shared research outputs
Top Co-Authors

Avatar

Li Yuxing

China University of Petroleum

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge