中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 407)

Filters    
Items/Page:    Sort:
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface [期刊论文]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013-01-01, 卷号: 8202 LNAI, 页码: V-VI
Sun, Maosong (1); Liu, Ting (2); Sun, Le (3); Zhang, Min (4); Lin, Dekang (5); Wang, Haifeng (6)

 
improved key recovery attacks on reduced-round salsa20 and chacha [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling

 
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators [会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang

 
cube cryptanalysis of lblock with noisy leakage [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai

 
tracking end-effectors for marker-less 3d human motion estimation in multi-view image sequences [会议论文]
15th International Conference on Human-Computer Interaction, HCI International 2013, Las Vegas, NV, United states, July 21, 2013 - July 26, 2013
Wang Wenzhong; Wang Zhaoqi; Deng Xiaoming; Luo Bin

 
boomerang and slide-rotational analysis of the sm3 hash function [会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar; Shen Yanzhao; Wang Gaoli; Youssef Amr M.

 
accountable authority identity-based encryption with public traceability [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lai Junzuo; Deng Robert H.; Zhao Yunlei; Weng Jian

 
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong

 
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli; Weng Jian; Zhao Yunlei

 
rewrite-based statistical model checking of wmtl [会议论文]
3rd International Conference on Runtime Verification, RV 2012, Istanbul, Turkey, September 25, 2012 - September 28, 2012
Bulychev Peter; David Alexandre; Larsen Kim G.; Legay Axel; Li Guangyuan; Poulsen Danny Bgsted

 

1 2 3 4 5 6 7 8 9 10 next

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace