中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-7 of 7)

Items/Page:    Sort:
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators [会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang

 
prevent kernel return-oriented programming attacks using hardware virtualization [会议论文]
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Tian Shuo; He Yeping; Ding Baozeng

 
biclique cryptanalysis of reduced-round piccolo block cipher [会议论文]
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng; Wu Wenling; Yu Xiaoli

 
an enhanced n-way exchange-based incentive scheme for p2p file sharing (short paper) [会议论文]
8th International Conference on Information and Communications Security, Raleigh, NC, DEC 04-07,
Deng Lingli; He Yeping; Xu Ziyao; Yuan Chunyang
  |  
 
weaknesses of cosvd (2,128) stream cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Zhang Bin; Wu Hongjun; Feng Dengguo; Wang Hong
  |  
 
integral cryptanalysis of reduced fox block cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Wu Wenling; Zhang Wentao; Feng Dengguo
  |  
 
on the security of tweakable modes of operation: tbc and tae [会议论文]
8th International Conference on Information Security, Singapore, SINGAPORE, SEP 20-23,
Wang P; Feng DG; Wu WL
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace