中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [15]
信息安全国家重点实... [11]
作者
Content Type
会议论文 [26]
Issued Date
2013 [2]
2012 [10]
2011 [7]
2010 [3]
2008 [1]
Language
英语 [15]
Source
lecture n... [26]
Project
Indexed
EI [26]
Spnsorship
national n... [2]
university... [2]
adnovum [1]
beijing in... [1]
chinese ac... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 26)
Filters
Indexed:EI
Source:lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
improved key recovery attacks on reduced-round salsa20 and chacha
[会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
[会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
benchmarking for steganography by kernel fisher discriminant criterion
[会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Huang Wei
;
Zhao Xianfeng
;
Feng Dengguo
;
Sheng Rennong
a real-time key recovery attack on the lightweight stream cipher a2u2
[会议论文]
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing
;
Feng Xiutao
;
Feng Dengguo
;
Wu Chuankun
efficient attribute proofs in anonymous credential using attribute-based cryptography
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Zhang Yan
;
Feng Dengguo
on the probability distribution of the carry cells of stream ciphers f-fcsr-h v2 and f-fcsr-h v3
[会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Song Haixin
;
Fan Xiubin
;
Wu Chuankun
;
Feng Dengguo
fully secure doubly-spatial encryption under simple assumptions
[会议论文]
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
[会议论文]
10th International Conference on Applied Cryptography and Network Security, ACNS 2012, Singapore, Singapore, June 26, 2012 - June 29, 2012
Zhang Wentao
;
Su Bozhan
;
Wu Wenling
;
Feng Dengguo
;
Wu Chuankun
an efficient leakage characterization method for profiled power analysis attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong
;
Zhou Yongbin
;
Feng Dengguo
daa protocol analysis and verification
[会议论文]
3rd International Conference on Trusted Systems, INTRUST 2011, Beijing, China, November 27, 2011 - November 29, 2011
Qin Yu
;
Chu Xiaobo
;
Feng Dengguo
;
Feng Wei
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace