中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 11)

Items/Page:    Sort:
Random table and hash coding-based binary code obfuscation against stack trace analysis [期刊论文]
IET INFORMATION SECURITY, 2016-01-01, 卷号: 10, 期号: 1, 页码: 18-27
Xie, X;  Lu, B;  Gong, DF;  Luo, XY;  Liu, FL
  |  
 
Practical-time related-key attack on Hummingbird-2 [期刊论文]
IET INFORMATION SECURITY, 2015-01-01, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ; Zhang, B; Feng, DG
  |  
 
On the approximation of S-boxes via Maiorana-McFarland functions [期刊论文]
IET Information Security, 2013-01-01, 卷号: 7, 期号: 2, 页码: 134-143
Wei, Yongzhuang (1); Pasalic, Enes (3)

 
Systemic threats to hypervisor non-control data [期刊论文]
IET INFORMATION SECURITY, 2013-01-01, 卷号: 7, 期号: 4, 页码: 349-354
Ding, Baozeng; He, Yeping; Wu, Yanjun; Yu, Jiageng

 
design and logical analysis on the access authentication scheme for satellite mobile communication networks [期刊论文]
IET Information Security, 2012-01-01, 卷号: 6, 期号: 1, 页码: 41073
Zheng G.; Ma H.-T.; Cheng C.; Tu Y.-C.
  |  
 
attribute-based signature scheme with constant size signature in the standard model [期刊论文]
IET Information Security, 2012-01-01, 卷号: 6, 期号: 2, 页码: 47-54
Ge A.-J.; Ma C.-G.; Zhang Z.-F.
  |  
 
cheating immune visual cryptography scheme [期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 1, 页码: 51-59
Liu F.; Wu C.; Lin X.
  |  
 
impossible differential cryptanalysis of spn ciphers [期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 2, 页码: 111-120
Li R.; Sun B.; Li C.
  |  
 
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round [期刊论文]
IET Information Security, 2010-01-01, 卷号: 4, 期号: 3, 页码: 167-184
Zhao X.; Feng D.
  |  
 
analysis of bilinear pairing-based accumulator for identity escrowing [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 99-107
Tartary C.; Zhou S.; Lin D.; Wang H.; Pieprzyk J.
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace