中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Items/Page:    Sort:
preimage attacks on step-reduced sm3 hash function [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian; Wu Wenling; Wu Shuang; Su Bozhan; Dong Le

 
on the resistance of boolean functions against fast algebraic attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Du Yusong; Zhang Fangguo; Liu Meicheng

 
autodunt: dynamic latent dependence analysis for detection of zero day vulnerability [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Chen Kai; Lian Yifeng; Zhang Yingjun

 
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo; Zhou Yongbin; Liu Jiye; Chen Danyang

 
synthetic linear analysis: improved attacks on cubehash and rabbit [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Lu Yi; Vaudenay Serge; Meier Willi; Ding Liping; Jiang Jianchun

 
an efficient leakage characterization method for profiled power analysis attacks [会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong; Zhou Yongbin; Feng Dengguo

 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace