中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 25)

Items/Page:    Sort:
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets [会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)

 
Some new weaknesses in the RC4 stream cipher [会议论文]
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1); Zhang, Bin (1); Lin, Dongdai (2)

 
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems [期刊论文]
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013-01-01
Zhang, Gao Yuan; Sun, Li Min; Wen, Hong; Wu, Bin; Zhu, Xiping; Zhou, Liang

 
A watermark strategy for quantum images based on quantum fourier transform [期刊论文]
Quantum Information Processing, 2013-01-01, 卷号: 12, 期号: 2, 页码: 793-803
Zhang, Wei-Wei (1); Gao, Fei (1); Liu, Bin (1); Wen, Qiao-Yan (1); Chen, Hui (3)

 
A Quantum Watermark Protocol [期刊论文]
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013-01-01, 卷号: 52, 期号: 2, 页码: 504-513
Zhang, Wei-Wei; Gao, Fei; Liu, Bin; Jia, Heng-Yue; Wen, Qiao-Yan; Chen, Hui

 
Cryptanalysis of Helix and Phelix revisited [会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)

 
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators [会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang

 
improved key recovery attacks on reduced-round salsa20 and chacha [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling

 
cube cryptanalysis of lblock with noisy leakage [会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai

 
a new variant of time memory trade-off on the improvement of thing and ying's attack [会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Lu Yao; Wang Wenhao; Zhang Bin; Lin Dongdai

 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace