中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Filters    
Items/Page:    Sort:
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets [会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)

 
Some new weaknesses in the RC4 stream cipher [会议论文]
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1); Zhang, Bin (1); Lin, Dongdai (2)

 
Cryptanalysis of Helix and Phelix revisited [会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)

 
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators [会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang

 
improved key recovery attacks on reduced-round salsa20 and chacha [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling

 
cube cryptanalysis of lblock with noisy leakage [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai

 
a new variant of time memory trade-off on the improvement of thing and ying's attack [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Lu Yao; Wang Wenhao; Zhang Bin; Lin Dongdai

 
applying time-memory-data trade-off to plaintext recovery attack [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Zhang Bin; Lu Yao; Zou Jing; Lin Dongdai

 
separating ne from some nonuniform nondeterministic complexity classes [会议论文]
15th Annual International Conference on Computing and Combinatorics, COCOON 2009, Niagara Falls, NY, United states, 37450
Fu Bin; Li Angsheng; Zhang Liyu

 
an improved fast correlation attack on stream ciphers [会议论文]
15th International Workshop on Selected Areas in Cryptography, SAC 2008, Sackville, NB, Canada, August 14,
Zhang Bin; Feng Dengguo
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace