CORC

浏览/检索结果: 共47条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli; Weng Jian; Zhao Yunlei
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/22
boomerang and slide-rotational analysis of the sm3 hash function 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar; Shen Yanzhao; Wang Gaoli; Youssef Amr M.
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
pyxis: an active replication approach for enhancing social media services 会议论文
8th International Conference on Active Media Technology, AMT 2012, Macau, China, December 4, 2012 - December 7, 2012
Li Sen; Jin Beihong; Yang Yuwei; Fang Wenjing
收藏  |  浏览/下载:17/0  |  提交时间:2013/09/22
principles of network computing 会议论文
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012, Beijing, China, May 16, 2012 - May 21, 2012
Pan Yicheng
收藏  |  浏览/下载:17/0  |  提交时间:2013/09/22
(pseudo) preimage attack on round-reduced grstl hash function and others 会议论文
19th International Workshop on Fast Software Encryption, FSE 2012, Washington, DC, United states, March 19, 2012 - March 21, 2012
Wu Shuang; Feng Dengguo; Wu Wenling; Guo Jian; Dong Le; Zou Jian
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22
linear weaknesses in t-functions 会议论文
7th International Conference on Sequences and Their Applications, SETA 2012, Waterloo, ON, Canada, June 4, 2012 - June 8, 2012
Shi Tao; Anashin Vladimir; Lin Dongdai
收藏  |  浏览/下载:7/0  |  提交时间:2013/09/22
efficient attribute proofs in anonymous credential using attribute-based cryptography 会议论文
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Zhang Yan; Feng Dengguo
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/22
proving liveness property under strengthened compassion requirements 会议论文
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012, Beijing, China, May 16, 2012 - May 21, 2012
Long Teng; Zhang Wenhui
收藏  |  浏览/下载:7/0  |  提交时间:2013/09/22
a novel bayesian network structure learning algorithm based on maximal information coefficient 会议论文
2012 IEEE 5th International Conference on Advanced Computational Intelligence, ICACI 2012, Nanjing, China, October 18, 2012 - October 20, 2012
Zhang Yinghua; Hu Qiping; Zhang Wensheng; Liu Jin
收藏  |  浏览/下载:25/0  |  提交时间:2013/09/22
derivatives of regular expressions and an application 会议论文
International Workshop on Theoretical Computer Science, WTCS 2012, Auckland, New zealand, February 21, 2012 - February 24, 2012
Chen Haiming; Yu Sheng
收藏  |  浏览/下载:5/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace