中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 24)

Items/Page:    Sort:
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets [会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)

 
Integral attacks on reduced-round PRESENT [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Wu, Shengbao (1); Wang, Mingsheng (3)

 
Leaked-state-forgery attack against the authenticated encryption algorithm ALE [会议论文]
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1); Wu, Hongjun (2); Huang, Tao (2); Wang, Mingsheng (4); Wu, Wenling (1)

 
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators [会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang

 
recursive diffusion layers for (lightweight) block ciphers and hash functions [会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling

 
on annihilators in fewer variables: basic theory and applications [期刊论文]
Chinese Journal of Electronics, 2013-01-01, 卷号: 22, 期号: 3, 页码: 489-494
Jiao Lin; Wang Mingsheng; Li Yongqiang; Liu Meicheng

 
automatic search of truncated impossible differentials for word-oriented block ciphers [会议论文]
13th International Conference on Cryptology in India, INDOCRYPT 2012, Kolkata, India, December 9, 2012 - December 12, 2012
Wu Shengbao; Wang Mingsheng

 
a probabilistic secret sharing scheme for a compartmented access structure [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Yu Yuyin; Wang Mingsheng

 
on general factorizations for n-d polynomial matrices [期刊论文]
Circuits, Systems, and Signal Processing, 2010-01-01, 期号: 1, 页码: 40557
Liu Jinwang; Li Dongmei; Wang Mingsheng
  |  
 
on ea-equivalence of certain permutations to power mappings [期刊论文]
Designs, Codes, and Cryptography, 2010-01-01, 期号: 1, 页码: 40554
Li Yongqiang; Wang Mingsheng
  |  
 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace