中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [8]
信息安全国家重点实验... [6]
作者
Content Type
会议论文 [9]
期刊论文 [5]
Issued Date
Language
英语 [7]
中文 [1]
Source
lecture no... [8]
cryptology... [1]
frontiers ... [1]
journal of... [1]
plos one [1]
更多...
Project
Indexed
EI [7]
SCI [2]
CNKI [1]
Spnsorship
int assoc ... [1]
internatio... [1]
korea univ... [1]
ministry o... [1]
national s... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 14)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
[期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1)
;
Wu, Wenling (2)
;
Wu, Shuang (2)
;
Zou, Jian (2)
The Ecology of Medical Care in Beijing
[期刊论文]
PLOS ONE, 2013-01-01, 卷号: 8, 期号: 12
Shao, Shuang
;
Zhao, FeiFei
;
Wang, Jing
;
Feng, Lei
;
Lu, XiaoQin
;
Du, Juan
;
Yan, YuXiang
;
Wang, Chao
;
Fu, YingHong
;
Wu, JingJing
;
Yu, XinWei
;
Khoo, KayKeng
;
Wang, YouXin
;
Wang, Wei
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
[会议论文]
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Sasaki Yu
;
Wang Lei
;
Wu Shuang
;
Wu Wenling
preimage attacks on step-reduced sm3 hash function
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian
;
Wu Wenling
;
Wu Shuang
;
Su Bozhan
;
Dong Le
(pseudo) preimage attack on round-reduced grstl hash function and others
[会议论文]
19th International Workshop on Fast Software Encryption, FSE 2012, Washington, DC, United states, March 19, 2012 - March 21, 2012
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Guo Jian
;
Dong Le
;
Zou Jian
known-key distinguisher on round-reduced 3d block cipher
[会议论文]
12th International Workshop on Information Security Applications, WISA 2011, Jeju Island, Korea, Republic of, August 22, 2011 - August 24, 2011
Dong Le
;
Wu Wenling
;
Wu Shuang
;
Zou Jian
novel method of constructing the zero-sum distinguishers
[期刊论文]
Tongxin Xuebao/Journal on Communications, 2012-01-01, 卷号: 33, 期号: 11, 页码: 91-99
Dong Le
;
Wu Wen-Ling
;
Wu Shuang
;
Zou Jian
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
[期刊论文]
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012-01-01, 卷号: 7658 LNCS, 页码: 776-
Sasaki Yu
;
Wang Lei
;
Wu Shuang
;
Wu Wenling
hyper-sbox view of aes-like permutations: a generalized distinguisher
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Su Bozhan
  |  
new disturbance vector for sha-0 collision
[期刊论文]
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010-01-01, 卷号: 26, 期号: 6, 页码: 2143-2157
Wu Shuang
;
Feng Deng-Guo
;
Wu Wen-Ling
  |  
1
2
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace