中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [6]
信息安全国家重点实验... [6]
基础软件国家工程研究... [2]
作者
Content Type
会议论文 [10]
期刊论文 [3]
学位论文 [1]
Issued Date
Language
英语 [7]
Source
lecture no... [4]
chinese jo... [2]
2011 ieee ... [1]
internatio... [1]
proceeding... [1]
更多...
Project
Indexed
EI [11]
SCI [1]
SCI,EI [1]
Spnsorship
national s... [2]
acm sigsac [1]
china comp... [1]
chinese ac... [1]
ieee beiji... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 14)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Yang Shuguo
;
Zhou Yongbin
;
Liu Jiye
;
Chen Danyang
an efficient leakage characterization method for profiled power analysis attacks
[会议论文]
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zhang Hailong
;
Zhou Yongbin
;
Feng Dengguo
an new anti-spa algorithm of naf scalar multiplication used in ecc
[期刊论文]
International Journal of Advancements in Computing Technology, 2012-01-01, 卷号: 4, 期号: 20, 页码: 692-700
Luo Peng
;
Feng Dengguo
;
Zhou Yongbin
generic side-channel distinguisher based on kolmogorov-smirnov test: explicit construction and practical evaluation
[期刊论文]
Chinese Journal of Electronics, 2012-01-01, 卷号: 21, 期号: 3, 页码: 548-553
Liu Jiye
;
Zhou Yongbin
;
Yang Shuguo
;
Feng Dengguo
an instruction-level software simulation approach to resistance evaluation of cryptographic implementations against power analysis attacks
[会议论文]
2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011, Shanghai, China, 10-Jun-02
Li Jiantang
;
Zhou Yongbin
;
Liu Jiye
;
Zhang Hailong
  |  
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes
[会议论文]
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na
;
Zhou Yongbin
  |  
how to characterize side-channel leakages more accurately?
[会议论文]
7th International Conference on Information Security Practice and Experience, ISPEC 2011, Guangzhou, China, 30-May-20
Liu Jiye
;
Zhou Yongbin
;
Han Yang
;
Li Jiantang
;
Yang Shuguo
;
Feng Dengguo
  |  
measuring the effectiveness of dpa attacks- from the perspective of distinguishers statistical characteristics
[会议论文]
2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, Chengdu, China, 44021
Huang Jingang
;
Zhou Yongbin
;
Liu Jiye
  |  
fault propagation pattern based dfa on feistel ciphers, with application to camellia
[会议论文]
10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010, Bradford, United kingdom, 37436
Chen Haining
;
Zhou Yongbin
;
Wu Wenling
;
Wang Na
  |  
controlling data disclosure in computational pir protocols
[学位论文]
, 2010-01-01
Shang Ning
;
Ghinita Gabriel
;
Zhou Yongbin
;
Bertino Elisa
  |  
1
2
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace