中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 28)

Filters    
Items/Page:    Sort:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes [期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1); Wu, Wenling (2); Wu, Shuang (2); Zou, Jian (2)

 
recursive diffusion layers for (lightweight) block ciphers and hash functions [会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling

 
on the resistance of boolean functions against fast algebraic attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong; Zhang Fangguo; Liu Meicheng

 
detecting and correcting the index of dae by the combinatorial relaxation algorithm [会议论文]
2011 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, DCABES 2011, Wuxi, Jiangsu, China, October 14
Yan Yongxin; Zhang Xiaolei; Wu Xuesong; Cao Jianwen

 
model checking: a coalgebraic approach [会议论文]
5th International Conference on Theoretical Aspects of Software Engineering, TASE 2011, Xi'an, Shaanxi, China, August 29,
Gao Jianhua; Jiang Ying

 
two applications of an incomplete additive character sum to estimating nonlinearity of boolean functions [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Du Yusong; Zhang Fangguo

 
characterizations of locally testable linear- and affine-invariant families [期刊论文]
Theoretical Computer Science, 2011-01-01, 卷号: 414, 期号: 1, 页码: 55-75
Angsheng Li; Yicheng Pan

 
a short signature scheme from the rsa family [会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping; Xue Rui
  |  
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
asymptotic granularity reduction and its application [期刊论文]
Theoretical Computer Science, 2011-01-01, 卷号: 412, 期号: 39, 页码: 5374-5386
Su Shenghui; L&#; Shuwang; Fan Xiubin
  |  
 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace