中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [6]
作者
Content Type
会议论文 [6]
Issued Date
2012 [6]
Language
英语 [6]
Source
lecture no... [6]
Project
Indexed
EI [6]
Spnsorship
national s... [6]
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-6 of 6)
Filters
Content Type:会议论文
Source:lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
preimage attacks on step-reduced sm3 hash function
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian
;
Wu Wenling
;
Wu Shuang
;
Su Bozhan
;
Dong Le
on the resistance of boolean functions against fast algebraic attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong
;
Zhang Fangguo
;
Liu Meicheng
autodunt: dynamic latent dependence analysis for detection of zero day vulnerability
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Chen Kai
;
Lian Yifeng
;
Zhang Yingjun
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo
;
Zhou Yongbin
;
Liu Jiye
;
Chen Danyang
synthetic linear analysis: improved attacks on cubehash and rabbit
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Lu Yi
;
Vaudenay Serge
;
Meier Willi
;
Ding Liping
;
Jiang Jianchun
an efficient leakage characterization method for profiled power analysis attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong
;
Zhou Yongbin
;
Feng Dengguo
1
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace