中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [16]
信息安全国家重点实验... [7]
计算机科学国家重点实... [2]
作者
Content Type
会议论文 [15]
期刊论文 [10]
Issued Date
Language
英语 [17]
Source
lecture no... [8]
quantum in... [2]
science in... [2]
internatio... [1]
internatio... [1]
更多...
Project
Indexed
EI [13]
SCI [7]
其他 [1]
Spnsorship
ieee infor... [2]
concordia ... [1]
int assoc ... [1]
minist inf... [1]
national n... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 25)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets
[会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1)
;
Wang, Mingsheng (3)
;
Zhang, Bin (1)
;
Wu, Shengbao (1)
Some new weaknesses in the RC4 stream cipher
[会议论文]
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1)
;
Zhang, Bin (1)
;
Lin, Dongdai (2)
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems
[期刊论文]
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013-01-01
Zhang, Gao Yuan
;
Sun, Li Min
;
Wen, Hong
;
Wu, Bin
;
Zhu, Xiping
;
Zhou, Liang
A watermark strategy for quantum images based on quantum fourier transform
[期刊论文]
Quantum Information Processing, 2013-01-01, 卷号: 12, 期号: 2, 页码: 793-803
Zhang, Wei-Wei (1)
;
Gao, Fei (1)
;
Liu, Bin (1)
;
Wen, Qiao-Yan (1)
;
Chen, Hui (3)
A Quantum Watermark Protocol
[期刊论文]
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013-01-01, 卷号: 52, 期号: 2, 页码: 504-513
Zhang, Wei-Wei
;
Gao, Fei
;
Liu, Bin
;
Jia, Heng-Yue
;
Wen, Qiao-Yan
;
Chen, Hui
Cryptanalysis of Helix and Phelix revisited
[会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
[会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin
;
Wang Mingsheng
;
Zhang Bin
;
Li Yongqiang
improved key recovery attacks on reduced-round salsa20 and chacha
[会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
cube cryptanalysis of lblock with noisy leakage
[会议论文]
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi
;
Zhang Bin
;
Yao Yuan
;
Lin Dongdai
a new variant of time memory trade-off on the improvement of thing and ying's attack
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi
;
Lu Yao
;
Wang Wenhao
;
Zhang Bin
;
Lin Dongdai
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace