中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 28)

Items/Page:    Sort:
cryptanalysis of some certificateless signature schemes in the standard model [期刊论文]
International Journal of Applied Mathematics and Statistics, 2013-01-01, 卷号: 36, 期号: 6, 页码: 16-25
Wu Chenhuang; Lin Weidi; Huang Hui; Chen Zhixiong

 
selective opening chosen ciphertext security directly from the ddh assumption [会议论文]
6th International Conference on Network and System Security, NSS 2012, Wuyishan, Fujian, China, November 21, 2012 - November 23, 2012
Liu Shengli; Zhang Fangguo; Chen Kefei

 
related-mode attacks on pmac [会议论文]
2011 International Conference on Instrumentation, Measurement, Circuits and Systems, ICIMCS 2011, Hong Kong, Hong kong, December 12, 2011 - December 13, 2011
Xu Jin; Wen Qiaoyan; Wang Dayin

 
an efficient and provably-secure certificateless signature scheme without bilinear pairings [期刊论文]
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012-01-01, 卷号: 25, 期号: 11, 页码: 1432-1442
He D.; Chen J.; Zhang R.

 
efficient threshold encryption from lossy trapdoor functions [会议论文]
4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, Taipei, Taiwan, November 2
Xie Xiang; Xue Rui; Zhang Rui

 
bcbc: a more efficient mac algorithm [会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liang Bo; Wu Wenling; Zhang Liting
  |  
 
acquiring key privacy from data privacy [会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Zhang Rui
  |  
 
on enumeration of polynomial equivalence classes and their application to mpkc [会议论文]
on enumeration of polynomial equivalence classes and their application to mpkc, 北京, 2010
Lin Dongdai; Faug&#; re Jean-Charles; Perret Ludovic; Wang Tianze
  |  
 
on the security of a bidirectional proxy re-encryption scheme from pkc 2010 [会议论文]
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian; Zhao Yunlei; Hanaoka Goichiro
  |  
 
simple power analysis attacks using chosen message against ecc hardware implementations [会议论文]
World Congress on Internet Security, WorldCIS-2011, London, United kingdom, 2-Feb
Li Huiyun; Wu Keke; Xu Guoqing; Yuan Hai; Luo Peng
  |  
 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace