中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Items/Page:    Sort:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes [期刊论文]
Frontiers of Computer Science, 2014-01-01, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1); Wu, Wenling (2); Wu, Shuang (2); Zou, Jian (2)

 
BOMM算法的密码学性质 [期刊论文]
软件学报, 2012-01-01, 卷号: 23, 期号: 7, 页码: 1899-1907
杨笑; 范修斌; 武传坤; 余玉银; 冯秀涛
  |  
 
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables [会议论文]
The Sixth International Conference on Information Security Practice and Experience Conference (ISPEC 2010), Seoul, Korea, 2010-5-12~2010-05-13
Lin Xu; Dongdai Lin; Xin Li
  |  
 
a new efficient algorithm for computing all low degree annihilators of sparse polynomials with a high number of variables [会议论文]
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Xu Lin; Lin Dongdai; Li Xin
  |  
 
quadratic equations from a kind of s-boxes [会议论文]
10th International Workshop on Information Security Applications, Busan, SOUTH KOREA, AUG 25-27,
Xie Jia; Cao Weiwei; Wang TianZe

 
construction and enumeration of boolean functions with maximum algebraic immunity [期刊论文]
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009-01-01, 卷号: 52, 期号: 1, 页码: 32-40
Zhang WenYing; Wu ChuanKun; Liu XiangZhong

 
Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers [期刊论文]
Journal of Automation and Information Sciences, 2009-01-01, 卷号: 41, 期号: 2, 页码: 67-80
S.A. Pometun
  |  
 
strategies on algebraic attacks using sat solvers [会议论文]
9th International Conference for Young Computer Scientists, Zhangjiajie, PEOPLES R CHINA, NOV 18-21,
Chen Baiqiang
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace