中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Filters    
Items/Page:    Sort:
practical rebound attack on 12-round cheetah-256 [会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang; Feng Dengguo; Wu Wenling
  |  
 
separation of duty in trust-based collaboration [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Deng Lingli; He Yeping; Xu Ziyao
  |  
 
an integrity assurance mechanism for run-time programs [会议论文]
4th International Conference on Information Security and Cryptology (Inscript 2008), Beijing, PEOPLES R CHINA, DEC 14-17,
Xu Ziyao; He Yeping; Deng Lingli
  |  
 
extended models for message authentication [会议论文]
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting; Wu Wenling; Wang Peng

 
unlinkable randomizable signature and its application in group signature [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Zhou Sujing; Lin Dongdai
  |  
 
resettable zero knowledge with concurrent soundness in the bare public-key model under standard assumption [会议论文]
3rd SKLOIS Conference on Information Security and Cryptology, Xining, PEOPLES R CHINA, AUG 31-SEP
Deng Yi; Lin Dongdai
  |  
 
security analysis of some threshold signature schemes and multi-signature schemes [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Cao TJ; Lin DD
  |  
 
hctr: a variable-input-length enciphering mode [会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P; Feng DG; Wu WL
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace