×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [19]
内容类型
会议论文 [16]
期刊论文 [3]
发表日期
2014 [3]
2013 [3]
2012 [5]
2011 [2]
2010 [2]
2009 [1]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE
会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Yanfeng (1)
;
Wu, Wenling (1)
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2014/12/16
Reflection cryptanalysis of PRINCE-like ciphers
会议论文
20th International Workshop on Fast Software Encryption, FSE 2013, Singapore, Singapore, March 11, 2013 - March 13, 2013
Soleimany, Hadi (1)
;
Blondeau, Cé
;
line (1)
;
Yu, Xiaoli (2)
;
Wu, Wenling (2)
;
Nyberg, Kaisa (1)
;
Zhang, Huiling (2)
;
Zhang, Lei (2)
;
Wang, Yanfeng (2)
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2014/12/16
Differential cryptanalysis and linear distinguisher of full-round Zorro
会议论文
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1)
;
Wu, Wenling (1)
;
Guo, Zhiyuan (1)
;
Yu, Xiaoli (1)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Zorro
block cipher
differential cryptanalysis
linear distinguisher
recursive diffusion layers for (lightweight) block ciphers and hash functions
会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao
;
Wang Mingsheng
;
Wu Wenling
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Hardware
Hash functions
Linear transformations
Lyapunov methods
Matrix algebra
Photons
Security of data
Shift registers
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
会议论文
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1)
;
Wu, Hongjun (2)
;
Huang, Tao (2)
;
Wang, Mingsheng (4)
;
Wu, Wenling (1)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
Attacking and fixing the CS mode
会议论文
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1)
;
Wu, Wenling (1)
;
Zhang, Liting (1)
;
Wang, Peng (2)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/12/16
trcbc: another look at cbc-mac
期刊论文
Information Processing Letters, 2012, 卷号: 112, 期号: 7, 页码: 302-307
Zhang Liting
;
Wu Wenling
;
Wang Peng
;
Liang Bo
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2012/11/12
3kf9: enhancing 3gpp-mac beyond the birthday bound
会议论文
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Zhang Liting
;
Wu Wenling
;
Sui Han
;
Wang Peng
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2013/09/22
Security of data
biclique cryptanalysis of reduced-round piccolo block cipher
会议论文
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng
;
Wu Wenling
;
Yu Xiaoli
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/09/22
Security of data
Security systems
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 卷号: 7658 LNCS, 页码: 776-
Sasaki Yu
;
Wang Lei
;
Wu Shuang
;
Wu Wenling
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2013/09/17
©版权所有 ©2017 CSpace - Powered by
CSpace