中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 41-50 of 317)

Items/Page:    Sort:
a generic construction from selective-ibe to public-key encryption with non-interactive opening [会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Zhang Jiang; Xie Xiang; Zhang Rui; Zhang Zhenfeng

 
automatic search of truncated impossible differentials for word-oriented block ciphers [会议论文]
13th International Conference on Cryptology in India, INDOCRYPT 2012, Kolkata, India, December 9, 2012 - December 12, 2012
Wu Shengbao; Wang Mingsheng

 
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks [会议论文]
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Sasaki Yu; Wang Lei; Wu Shuang; Wu Wenling

 
3kf9: enhancing 3gpp-mac beyond the birthday bound [会议论文]
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Zhang Liting; Wu Wenling; Sui Han; Wang Peng

 
a real-time key recovery attack on the lightweight stream cipher a2u2 [会议论文]
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing; Feng Xiutao; Feng Dengguo; Wu Chuankun

 
cryptanalysis of reduced-round klein block cipher [会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Yu Xiaoli; Wu Wenling; Li Yanjun; Zhang Lei

 
a new efficient property-based attestation protocol based on elliptic curves [会议论文]
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo; Yu Qin

 
the higher-order meet-in-the-middle attack and its application to the camellia block cipher (extended abstract) [会议论文]
13th International Conference on Cryptology in India, INDOCRYPT 2012, Kolkata, India, December 9, 2012 - December 12, 2012
Lu Jiqiang; Wei Yongzhuang; Kim Jongsung; Pasalic Enes

 
fast tate pairing computation on twisted jacobi intersections curves [会议论文]
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Zhang Xusheng; Chen Shan; Lin Dongdai

 
improved linear analysis on block cipher multi2 [会议论文]
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Lu Yi; Ding Liping; Wang Yongji

 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 next

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace