中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Items/Page:    Sort:
threshold password-based authenticated group key exchange in gateway-oriented setting [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Hui; Wu Chuan-Kun; Wei Lingbo
  |  
 
integral attacks on reduced-round aria block cipher [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Yanjun; Wu Wenling; Zhang Lei
  |  
 
accelerating inverse of gf(2(n)) with precomputation [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Xu Lei; Lin Dongdai
  |  
 
a new efficient algorithm for computing all low degree annihilators of sparse polynomials with a high number of variables [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Xu Lin; Lin Dongdai; Li Xin
  |  
 
efficient concurrent npoly(log n)-simulatable argument of knowledge [会议论文]
5th International Conference on Information Security Practice and Experience, Xi an, PEOPLES R CHINA, APR 13-15,
Huang Guifang; Lin Dongdai; Zhang Yanshuo

 
some new observations on the sms4 block cipher in the chinese wapi standard [会议论文]
5th International Conference on Information Security Practice and Experience, Xi an, PEOPLES R CHINA, APR 13-15,
Zhang Wentao; Wu Wenling; Feng Dengguo; Su Bozhan

 
static analysis of a class of memory leaks in trustedbsd mac framework [会议论文]
5th International Conference on Information Security Practice and Experience, Xi an, PEOPLES R CHINA, APR 13-15,
Wu Xinsong; Zhou Zhouyi; He Yeping; Liang Hongliang

 
mediator-free secure policy interoperation of exclusively-trusted multiple domains [会议论文]
4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, AUSTRALIA, APR 21-23,
Wang Xingang; Feng Dengguo; Xu Zhen; Hu Honggang
  |  
 
analysis of zipper as a hash function [会议论文]
4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, AUSTRALIA, APR 21-23,
Lin Pin; Wu Wenling; Wu Chuankun; Qiu Tian
  |  
 
integrating grid with cryptographic computing [会议论文]
2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, PEOPLES R CHINA, APR 11-14,
Jiang ZH; Lin DD; Xu L; Lin L
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace