×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [13]
内容类型
会议论文 [13]
发表日期
2013 [1]
2012 [1]
2011 [5]
2010 [3]
2008 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
recursive diffusion layers for (lightweight) block ciphers and hash functions
会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao
;
Wang Mingsheng
;
Wu Wenling
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/09/22
Hardware
Hash functions
Linear transformations
Lyapunov methods
Matrix algebra
Photons
Security of data
Shift registers
integral distinguishers of jh and gr?stl-512
会议论文
Journal of Electronics (China)
Li Yanjun
;
Wu Wenling
;
Dong Le
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/09/22
Key wordsHash function –
SHA
3 candidates –
Integral distinguisher –
JH –
Gr?stl
a universal distributed model for password cracking
会议论文
2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011, Guilin, Guangxi, China, July 10, 2
Zou Jing
;
Lin Dong-Dai
;
Mi Guo-Cui
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/10/08
Hash functions
Learning systems
collision attack for the hash function extended md4
会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Gaoli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/10/08
Hash functions
general construction of chameleon all-but-one trapdoor functions
会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Liu Shengli
;
Lai Junzuo
;
Deng Robert H.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/10/10
Hash functions
Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256,320}*
会议论文
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Wang Gaoli
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2011/10/10
Hash functions
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/10/10
Efficiency
Hash functions
practical rebound attack on 12-round cheetah-256
会议论文
12th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 02-04,
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/03/31
Hash function
collision attack
rebound attack
message modification
Cheetah-256
SHA-3 candidates
cryptanalysis of mame compression function
会议论文
2010 International Conference on Computer Design and Applications, ICCDA 2010, Qinhuangdao, Hebei, China, 37432
Xue Yu
;
Wu Wenling
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/03/31
Computer hardware
Hash functions
near-collisions on the reduced-round compression functions of skein and blake
会议论文
Cryptology and Network Security 9th International Conference, CANS 2010, Kuala Lumpur Malaysia, 2010
Su Bozhan
;
Wu Wenling
;
Wu Shuang
;
Dong Le
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2011/03/31
Hash function
Near
collision
SHA
3 candidates
Skein
BLAKE
©版权所有 ©2017 CSpace - Powered by
CSpace