中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [198]
计算机科学国家重点... [66]
信息安全国家重点实... [61]
互联网软件技术实验... [25]
基础软件国家工程研... [21]
更多...
作者
左正康 [2]
王俊杰 [1]
张扶桑 [1]
邓小明 [1]
Content Type
会议论文 [398]
期刊论文 [7]
学位论文 [2]
Issued Date
2013 [15]
2012 [81]
2011 [62]
2010 [44]
2009 [53]
更多...
Language
英语 [223]
Source
lecture ... [407]
Project
Indexed
EI [239]
SCI [36]
ISTP [35]
SPRINGER [16]
其他 [15]
更多...
Spnsorship
national n... [8]
ieee compu... [7]
national s... [6]
chinese ac... [5]
fudan univ... [5]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 407)
Filters
Source:lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
[期刊论文]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013-01-01, 卷号: 8202 LNAI, 页码: V-VI
Sun, Maosong (1)
;
Liu, Ting (2)
;
Sun, Le (3)
;
Zhang, Min (4)
;
Lin, Dekang (5)
;
Wang, Haifeng (6)
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
[会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin
;
Wang Mingsheng
;
Zhang Bin
;
Li Yongqiang
improved key recovery attacks on reduced-round salsa20 and chacha
[会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
recursive diffusion layers for (lightweight) block ciphers and hash functions
[会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao
;
Wang Mingsheng
;
Wu Wenling
weak keys of the full misty1 block cipher for related-key differential cryptanalysis
[会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lu Jiqiang
;
Yap Wun-She
;
Wei Yongzhuang
assumption generation for asynchronous systems by abstraction refinement
[会议论文]
9th International Symposium on Formal Aspects of Component Software, FACS 2012, Mountain View, CA, United states, September 12, 2012 - September 14, 2012
Yang Qiusong
;
Clarke Edmund M.
;
Komuravelli Anvesh
;
Li Mingshu
rewrite-based statistical model checking of wmtl
[会议论文]
3rd International Conference on Runtime Verification, RV 2012, Istanbul, Turkey, September 25, 2012 - September 28, 2012
Bulychev Peter
;
David Alexandre
;
Larsen Kim G.
;
Legay Axel
;
Li Guangyuan
;
Poulsen Danny Bgsted
a recognition system for online handwritten tibetan characters
[会议论文]
9th IAPR Workshop on Graphics Recognition, GREC 2011, Seoul, Korea, Republic of, September 15, 2011 - September 16, 2011
Ma Long-Long
;
Wu Jian
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
[会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
[会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli
;
Weng Jian
;
Zhao Yunlei
1
2
3
4
5
6
7
8
9
10
next
Copyright © 2007-2022
中国科学院软件研究所
-
Feedback
Powered by
CSpace