中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
信息安全国家重点实... [12]
软件所图书馆 [11]
计算机科学国家重点实... [2]
基础软件国家工程研究... [2]
多媒体通信和网络工程... [1]
作者
张茹 [1]
Content Type
会议论文 [16]
期刊论文 [12]
Issued Date
Language
英语 [12]
中文 [6]
Source
lecture no... [9]
ruan jian ... [3]
2nd intern... [1]
advances i... [1]
beijing yo... [1]
更多...
Project
Indexed
EI [18]
EI,ACM [1]
EI,IEEE,SC... [1]
SCI [1]
Spnsorship
academia s... [1]
fundamenta... [1]
ieee test ... [1]
institute ... [1]
int assoc ... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 28)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
cryptanalysis of some certificateless signature schemes in the standard model
[期刊论文]
International Journal of Applied Mathematics and Statistics, 2013-01-01, 卷号: 36, 期号: 6, 页码: 16-25
Wu Chenhuang
;
Lin Weidi
;
Huang Hui
;
Chen Zhixiong
selective opening chosen ciphertext security directly from the ddh assumption
[会议论文]
6th International Conference on Network and System Security, NSS 2012, Wuyishan, Fujian, China, November 21, 2012 - November 23, 2012
Liu Shengli
;
Zhang Fangguo
;
Chen Kefei
related-mode attacks on pmac
[会议论文]
2011 International Conference on Instrumentation, Measurement, Circuits and Systems, ICIMCS 2011, Hong Kong, Hong kong, December 12, 2011 - December 13, 2011
Xu Jin
;
Wen Qiaoyan
;
Wang Dayin
an efficient and provably-secure certificateless signature scheme without bilinear pairings
[期刊论文]
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012-01-01, 卷号: 25, 期号: 11, 页码: 1432-1442
He D.
;
Chen J.
;
Zhang Ru(张茹)
efficient threshold encryption from lossy trapdoor functions
[会议论文]
4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, Taipei, Taiwan, November 2
Xie Xiang
;
Xue Rui
;
Zhang Rui
bcbc: a more efficient mac algorithm
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo
;
Wu Wenling
;
Zhang Liting
  |  
acquiring key privacy from data privacy
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  
on enumeration of polynomial equivalence classes and their application to mpkc
[会议论文]
on enumeration of polynomial equivalence classes and their application to mpkc, 北京, 2010
Lin Dongdai
;
Faug
;
re Jean-Charles
;
Perret Ludovic
;
Wang Tianze
  |  
on the security of a bidirectional proxy re-encryption scheme from pkc 2010
[会议论文]
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian
;
Zhao Yunlei
;
Hanaoka Goichiro
  |  
simple power analysis attacks using chosen message against ecc hardware implementations
[会议论文]
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun
;
Wu Keke
;
Xu Guoqing
;
Yuan Hai
;
Luo Peng
  |  
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace