×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [120]
内容类型
会议论文 [120]
发表日期
2014 [2]
2013 [4]
2012 [27]
2011 [24]
2010 [21]
2009 [9]
更多...
学科主题
Mathematic... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共120条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Fast symmetric pairing revisited
会议论文
6th International Conference on Pairing-Based Cryptography, Pairing 2013, Beijing, China, November 22, 2013 - November 24, 2013
Zhang, Xusheng (1)
;
Wang, Kunpeng (2)
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2014/12/16
Differential cryptanalysis and linear distinguisher of full-round Zorro
会议论文
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1)
;
Wu, Wenling (1)
;
Guo, Zhiyuan (1)
;
Yu, Xiaoli (1)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Zorro
block cipher
differential cryptanalysis
linear distinguisher
Towards a Secure Certificateless Proxy Re-Encryption Scheme
会议论文
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui
;
Zhang, Zhenfeng
;
Zhang, Jiang
;
Chen, Cheng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
recursive diffusion layers for (lightweight) block ciphers and hash functions
会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao
;
Wang Mingsheng
;
Wu Wenling
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Hardware
Hash functions
Linear transformations
Lyapunov methods
Matrix algebra
Photons
Security of data
Shift registers
boomerang and slide-rotational analysis of the sm3 hash function
会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar
;
Shen Yanzhao
;
Wang Gaoli
;
Youssef Amr M.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2013/09/22
Artificial intelligence
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
会议论文
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin
;
Wang Mingsheng
;
Zhang Bin
;
Li Yongqiang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Clocks
Cryptography
Security of data
Shift registers
Table lookup
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
会议论文
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang
;
Xue Rui
;
Zhang Rui
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Crystal lattices
Quantum theory
Security of data
combined public-key schemes: the case of abe and abs
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/09/22
Concrete construction
tsd: a flexible root of trust for the cloud
会议论文
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chang Dexian
;
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Computer privacy
Digital storage
Ubiquitous computing
cryptanalysis of reduced-round klein block cipher
会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Yu Xiaoli
;
Wu Wenling
;
Li Yanjun
;
Zhang Lei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2013/09/22
Security of data
©版权所有 ©2017 CSpace - Powered by
CSpace