×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [8]
北京航空航天大学 [2]
西安光学精密机械研究... [2]
西安交通大学 [1]
复旦大学上海医学院 [1]
中国医学科学院 北京... [1]
更多...
内容类型
期刊论文 [11]
会议论文 [4]
发表日期
2019 [1]
2018 [2]
2014 [2]
2013 [3]
2012 [3]
2011 [1]
更多...
学科主题
Telecommun... [1]
数理科学和化学 [1]
物理科学和化学 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 1779-1790
作者:
Wang, Yujue
;
Ding, Yong
;
Wu, Qianhong
;
Wei, Yongzhuang
;
Qin, Bo
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/30
Data privacy
vehicular ad hoc networks
VANET
cloud computing
authentication
auditability
Targeting Endothelial Erk1/2-Akt Axis as a Regeneration Strategy to Bypass Fibrosis during Chronic Liver Injury in Mice
期刊论文
2018, 卷号: 26, 期号: 12, 页码: 2779-2797
作者:
Lao, Yuanxiang
;
Li, Yanyan
;
Zhang, Ping
;
Shao, Qianqian
;
Lin, Weiran
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/01/03
Akt
Erk1/2
hepatic stellate cell
liver fibrosis
liver regeneration
liver sinusoidal endothelial cell
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
期刊论文
IET INFORMATION SECURITY, 2018, 卷号: 12, 页码: 389-397
作者:
Lu, Jiqiang
;
Yap, Wun-She
;
Wei, Yongzhuang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
public key cryptography
private key cryptography
ISO standards
full MISTY1 block cipher
related-key amplified boomerang cryptanalysis
block size
master key
ISO international standard
Japanese CRYPTREC-recommended e-government cipher
European NESSIE selected cipher
cryptographic weakness
data complexity
time complexity
2(87)
33 encryptions
2(60)
5 chosen plaintexts
2(90) weak keys
The higher-order meet-in-The-middle attack and its application to the Camellia block cipher
期刊论文
Theoretical Computer Science, 2014, 卷号: 527, 页码: 102-122
Lu, Jiqiang (1)
;
Wei, Yongzhuang (2)
;
Kim, Jongsung (4)
;
Pasalic, Enes (5)
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2014/12/16
Cryptology
Block cipher
Camellia
Meet-in-the-middle attack
Integral cryptanalysis
A meet-in-the-middle attack on the LBlock cipher
会议论文
2013 IEEE Conference Anthology, ANTHOLOGY 2013, China, January 1, 2013 - January 8, 2013
Wei, Yongzhuang (1)
;
Su, Chongmao (1)
;
Ma, Chunbo (1)
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2014/12/16
weak keys of the full misty1 block cipher for related-key differential cryptanalysis
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lu Jiqiang
;
Yap Wun-She
;
Wei Yongzhuang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Lyapunov methods
Security of data
On the approximation of S-boxes via Maiorana-McFarland functions
期刊论文
IET Information Security, 2013, 卷号: 7, 期号: 2, 页码: 134-143
Wei, Yongzhuang (1)
;
Pasalic, Enes (3)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2014/12/16
A new insight into the impact of different proteases on SILAC quantitative proteome of the mouse liver
期刊论文
PROTEOMICS, 2013, 卷号: 13, 期号: 15
作者:
Ma, Jie
;
Li, Wenbo
;
Lv, Yongzhuang
;
Chang, Cheng
;
Wu, Songfeng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/19
LysC
Quantification
SILAC mouse liver
meet-in-the-middle attack on reduced versions of the camellia block cipher
会议论文
7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7, 2012 - November 9, 2012
Lu Jiqiang
;
Wei Yongzhuang
;
Pasalic Enes
;
Fouque Pierre-Alain
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/09/22
Cryptography
on the construction of cryptographically significant boolean functions using objects in projective geometry spaces
期刊论文
IEEE Transactions on Information Theory, 2012, 卷号: 58, 期号: 10, 页码: 6681-6693
Pasalic Enes
;
Wei Yongzhuang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2012/11/12
©版权所有 ©2017 CSpace - Powered by
CSpace