CORC

浏览/检索结果: 共120条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Fast symmetric pairing revisited 会议论文
6th International Conference on Pairing-Based Cryptography, Pairing 2013, Beijing, China, November 22, 2013 - November 24, 2013
Zhang, Xusheng (1); Wang, Kunpeng (2)
收藏  |  浏览/下载:14/0  |  提交时间:2014/12/16
Differential cryptanalysis and linear distinguisher of full-round Zorro 会议论文
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1); Wu, Wenling (1); Guo, Zhiyuan (1); Yu, Xiaoli (1)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
Towards a Secure Certificateless Proxy Re-Encryption Scheme 会议论文
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui; Zhang, Zhenfeng; Zhang, Jiang; Chen, Cheng
收藏  |  浏览/下载:13/0  |  提交时间:2014/12/16
recursive diffusion layers for (lightweight) block ciphers and hash functions 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
boomerang and slide-rotational analysis of the sm3 hash function 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar; Shen Yanzhao; Wang Gaoli; Youssef Amr M.
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators 会议论文
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting 会议论文
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang; Xue Rui; Zhang Rui
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
combined public-key schemes: the case of abe and abs 会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/22
tsd: a flexible root of trust for the cloud 会议论文
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chang Dexian; Chu Xiaobo; Qin Yu; Feng Dengguo
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
cryptanalysis of reduced-round klein block cipher 会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Yu Xiaoli; Wu Wenling; Li Yanjun; Zhang Lei
收藏  |  浏览/下载:5/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace