中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 60)

Items/Page:    Sort:
Differential analysis of the Extended Generalized Feistel Networks [期刊论文]
Information Processing Letters, 2014-01-01, 卷号: 114, 期号: 12, 页码: 723-727
Zhang, Lei (1); Wu, Wenling (1)

 
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes [期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1); Wu, Wenling (2); Wu, Shuang (2); Zou, Jian (2)

 
Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE [会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Yanfeng (1); Wu, Wenling (1)

 
Reflection cryptanalysis of PRINCE-like ciphers [会议论文]
20th International Workshop on Fast Software Encryption, FSE 2013, Singapore, Singapore, March 11, 2013 - March 13, 2013
Soleimany, Hadi (1); Blondeau, Cé; line (1); Yu, Xiaoli (2); Wu, Wenling (2); Nyberg, Kaisa (1); Zhang, Huiling (2); Zhang, Lei (2); Wang, Yanfeng (2)

 
Differential cryptanalysis and linear distinguisher of full-round Zorro [会议论文]
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1); Wu, Wenling (1); Guo, Zhiyuan (1); Yu, Xiaoli (1)

 
Attacking and fixing the CS mode [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1); Wu, Wenling (1); Zhang, Liting (1); Wang, Peng (2)

 
Leaked-state-forgery attack against the authenticated encryption algorithm ALE [会议论文]
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1); Wu, Hongjun (2); Huang, Tao (2); Wang, Mingsheng (4); Wu, Wenling (1)

 
improved key recovery attacks on reduced-round salsa20 and chacha [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling

 
recursive diffusion layers for (lightweight) block ciphers and hash functions [会议论文]
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling

 
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks [会议论文]
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Sasaki Yu; Wang Lei; Wu Shuang; Wu Wenling

 

1 2 3 4 5 6 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace