中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [11]
计算机科学国家重点实... [8]
信息安全国家重点实验... [4]
并行计算实验室 [1]
中科院软件所 [1]
作者
吴长茂 [1]
Content Type
会议论文 [16]
期刊论文 [8]
学位论文 [1]
Issued Date
Language
英语 [11]
中文 [3]
Source
lecture no... [5]
informatio... [1]
internatio... [1]
mathematic... [1]
proceeding... [1]
更多...
Project
Indexed
EI [14]
SCI [3]
CNKI [1]
CPCI [1]
EI,SCI,IST... [1]
更多...
Spnsorship
national n... [2]
assoc. com... [1]
bcqre, chu... [1]
ieee compu... [1]
ieee relia... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 11-20 of 25)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
trcbc: another look at cbc-mac
[期刊论文]
Information Processing Letters, 2012-01-01, 卷号: 112, 期号: 7, 页码: 302-307
Zhang Liting
;
Wu Wenling
;
Wang Peng
;
Liang Bo
  |  
cbcr: cbc mac with rotating transformations
[期刊论文]
SCIENCE CHINA-INFORMATION SCIENCES, 2011-01-01, 卷号: 54, 期号: 11, 页码: 2247-2255
Zhang LiTing
;
Wu WenLing
;
Zhang Lei
;
Wang Peng
polye+ctr: a swiss-army-knife mode for block ciphers
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Zhang Liting
;
Wu Wenling
;
Wang Peng
  |  
simple power analysis attacks using chosen message against ecc hardware implementations
[会议论文]
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun
;
Wu Keke
;
Xu Guoqing
;
Yuan Hai
;
Luo Peng
  |  
value-based program characterization and its application to software plagiarism detection
[会议论文]
33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu, HI, United states, 21-May-20
Jhi Yoon-Chan
;
Wang Xinran
;
Jia Xiaoqi
;
Zhu Sencun
;
Liu Peng
;
Wu Dinghao
  |  
constructing rate-1 macs from related-key unpredictable block ciphers: pgv model revisited
[会议论文]
17th International Workshop on Fast Software Encryption, Seoul, SOUTH KOREA, FEB 07-10,
Zhang Liting
;
Wu Wenling
;
Wang Peng
;
Zhang Lei
;
Wu Shuang
;
Liang Bo
  |  
assume-guarantee reasoning with local specifications
[会议论文]
12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, 40848
Lomuscio Alessio
;
Strulo Ben
;
Walker Nigel
;
Wu Peng
  |  
extended models for message authentication
[会议论文]
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting
;
Wu Wenling
;
Wang Peng
symbolic test generation using a temporal logic with constrained events
[会议论文]
Symposium on Formal Methods and Hybrid Real-Time Systems held in Honour of Dines Bjorner/Zhou Chaochen, Macao, PEOPLES R CHINA, SEP 24-25,
Liu Daguang
;
Wu Peng
;
Lin Huimin
  |  
symbolic bisimulations for probabilistic systems
[会议论文]
4th International Conference on the Quantitative Evaluation of Systems, QEST 2007, Edinburgh, United kingdom, September
Wu Peng
;
Palamidessi Catuscia
;
Lin Huimin
  |  
previous
1
2
3
next
Copyright © 2007-2022
中国科学院软件研究所
-
Feedback
Powered by
CSpace