中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 28)

Filters        
Items/Page:    Sort:
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables [会议论文]
The Sixth International Conference on Information Security Practice and Experience Conference (ISPEC 2010), Seoul, Korea, 2010-5-12~2010-05-13
Lin Xu; Dongdai Lin; Xin Li
  |  
 
some improvements on model checking coreasm models of security protocols [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhao Zhenju; Liu Feng; Peng Jianhua; Huang Danqing; Xue Rui; Zhang Zhenfeng
  |  
 
trusted channels with password-based authentication and tpm-based attestation [会议论文]
2010 International Conference on Communications and Mobile Computing, CMC 2010, Shenzhen, China, April 12,
Zhou Lingli; Zhang Zhenfeng
  |  
 
threshold password-based authenticated group key exchange in gateway-oriented setting [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Hui; Wu Chuan-Kun; Wei Lingbo
  |  
 
the lower bound on the second-order nonlinearity of a class of boolean functions with high nonlinearity [会议论文]
Applicable Algebra in Engineering, Communications and Computing, 北京, 2010
Sun Guanghong; Wu Chuankun
  |  
 
towards a flexible spatially aware access control model [会议论文]
2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, Buffalo, NY, United states, September
Zhang Desheng; Zhang Min; Chen Chi
  |  
 
near-collisions on the reduced-round compression functions of skein and blake [会议论文]
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur Malaysia, 2010
Su Bozhan; Wu Wenling; Wu Shuang; Dong Le
  |  
 
integral attacks on reduced-round aria block cipher [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Yanjun; Wu Wenling; Zhang Lei
  |  
 
refinement of millers algorithm over edwards curves [会议论文]
Cryptographers Track held at the RSA Conference (CT-RSA), San Francisco, CA, MAR 01-05,
Xu Lei; Lin Dongdai
  |  
 
practical rebound attack on 12-round cheetah-256 [会议论文]
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang; Feng Dengguo; Wu Wenling
  |  
 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace