中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 20)

Filters    
Items/Page:    Sort:
recursive diffusion layers for (lightweight) block ciphers and hash functions [会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling

 
on the resistance of boolean functions against fast algebraic attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong; Zhang Fangguo; Liu Meicheng

 
two applications of an incomplete additive character sum to estimating nonlinearity of boolean functions [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Du Yusong; Zhang Fangguo

 
characterizations of locally testable linear- and affine-invariant families [会议论文]
17th Annual International Computing and Combinatorics Conference, COCOON 2011, Dallas, TX, United states, August 14,
Li Angsheng; Pan Yicheng
  |  
 
a short signature scheme from the rsa family [会议论文]
13th Information Security Conference, ISC 2010, Boca Raton, FL, United states, 25-Oct
Yu Ping; Xue Rui
  |  
 
results on the immunity of boolean functions against probabilistic algebraic attacks [会议论文]
16th Australasian Conference on Information Security and Privacy, ACISP 2011, Melbourne, VIC, Australia, 11-Jul-02
Liu Meicheng; Lin Dongdai; Pei Dingyi
  |  
 
loiss: a byte-oriented stream cipher [会议论文]
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
  |  
 
cryptanalysis of a generalized unbalanced feistel network structure [会议论文]
15th Australasian Conference on Information Security and Privacy, ACISP 2010, Sydney, NSW, Australia, 44017
Li Ruilin; Sun Bing; Li Chao; Qu Longjiang
  |  
 
a new efficient algorithm for computing all low degree annihilators of sparse polynomials with a high number of variables [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Xu Lin; Lin Dongdai; Li Xin
  |  
 
a computational proof of complexity of some restricted counting problems [会议论文]
6th Annual Conference on Theory and Applications of Models of Computation, TAMC 2009, Changsha, China, 43969
Cai Jin-Yi; Lu Pinyan; Xia Mingji
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace