中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-5 of 5)

Filters    
Items/Page:    Sort:
weaknesses of cosvd (2,128) stream cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Zhang Bin; Wu Hongjun; Feng Dengguo; Wang Hong
  |  
 
integral cryptanalysis of reduced fox block cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Wu Wenling; Zhang Wentao; Feng Dengguo
  |  
 
security analysis of some threshold signature schemes and multi-signature schemes [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Cao TJ; Lin DD
  |  
 
hctr: a variable-input-length enciphering mode [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P; Feng DG; Wu WL
  |  
 
an evolutionary algorithm to improve the nonlinearity of self-inverse s-boxes [会议论文]
7th International Conference on Information Security and Cryptology (ICISC 2004), Seoul, SOUTH KOREA, DEC 02-03,
Chen H; Feng DG
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace