中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-7 of 7)

Items/Page:    Sort:
The higher-order meet-in-The-middle attack and its application to the Camellia block cipher [期刊论文]
Theoretical Computer Science, 2014-01-01, 卷号: 527, 页码: 102-122
Lu, Jiqiang (1); Wei, Yongzhuang (2); Kim, Jongsung (4); Pasalic, Enes (5)

 
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes [期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1); Wu, Wenling (2); Wu, Shuang (2); Zou, Jian (2)

 
Systemic threats to hypervisor non-control data [期刊论文]
IET INFORMATION SECURITY, 2013-01-01, 卷号: 7, 期号: 4, 页码: 349-354
Ding, Baozeng; He, Yeping; Wu, Yanjun; Yu, Jiageng

 
improved integral attacks on rijndael [期刊论文]
Journal of Information Science and Engineering, 2011-01-01, 卷号: 27, 期号: 6, 页码: 2031-2045
Li Yan-Jun; Wu Wen-Ling

 
integral attacks on reduced-round aria block cipher [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Li Yanjun; Wu Wenling; Zhang Lei
  |  
 
ciphertext verification security of symmetric encryption schemes [期刊论文]
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009-01-01, 卷号: 52, 期号: 9, 页码: 1617-1631
Hu ZhenYu; Sun FuChun; Jiang JianChun

 
experiences on intrusion tolerance distributed systems [会议论文]
29th Annual International Computer Software and Applications Conference, Edinburgh, SCOTLAND, JUL 26-28,
Feng DG; Xiang J
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace