×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [23]
山东大学 [9]
北京大学 [1]
兰州大学 [1]
深圳先进技术研究院 [1]
华中师范大学 [1]
更多...
内容类型
会议论文 [38]
发表日期
2016 [2]
2015 [1]
2014 [6]
2013 [4]
2012 [3]
2011 [4]
更多...
学科主题
Computer S... [1]
engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共38条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Accurate estimation of the full differential distribution for general Feistel structures
会议论文
11th International Conference on Information Security and Cryptology, Inscrypt 2015, Beijing, China, November 1, 2015 - November 3, 2015
作者:
Chen, Jiageng*
;
Miyaji, Atsuko
;
Su, Chunhua
;
Teh, Je Sen
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/23
Differential attack
GFS
Differential distribution
LBlock
TWINE
Differential Privacy for Collaborative Filtering Recommender Algorithm
会议论文
ACM International Workshop on Security and Privacy Analytics (IWSPA), MAR 11, 2016
作者:
Zhu, Xue
;
Sun, Yuqing
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Recommendation
Collaborative Filtering
Inference Attack
Differential
Privacy
Improbable Differential Attacks on Reduced FOX64
会议论文
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE), Xian, PEOPLES R CHINA, DEC 12-13, 2015
作者:
Zhang, C
;
Qu, ZY
;
Yu, ZD
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/18
FOX cipher
improbable differential attack
Impossible differential attack
Dynamie modeling of an ostraciiform robotic fish based on angle of attack theory
会议论文
Wang, Wei
;
Xie, Guangming
;
Shi, Hong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Improved Davies-Murphy's attack on des revisited
会议论文
6th International Symposium on Foundations and Practice of Security, FPS 2013, La Rochelle, France, October 21, 2013 - October 22, 2013
Lu, Yi (1)
;
Desmedt, Yvo (2)
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2014/12/16
Reflection cryptanalysis of PRINCE-like ciphers
会议论文
20th International Workshop on Fast Software Encryption, FSE 2013, Singapore, Singapore, March 11, 2013 - March 13, 2013
Soleimany, Hadi (1)
;
Blondeau, Cé
;
line (1)
;
Yu, Xiaoli (2)
;
Wu, Wenling (2)
;
Nyberg, Kaisa (1)
;
Zhang, Huiling (2)
;
Zhang, Lei (2)
;
Wang, Yanfeng (2)
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2014/12/16
Differential cryptanalysis and linear distinguisher of full-round Zorro
会议论文
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1)
;
Wu, Wenling (1)
;
Guo, Zhiyuan (1)
;
Yu, Xiaoli (1)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
Zorro
block cipher
differential cryptanalysis
linear distinguisher
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
会议论文
8th International Conference on Network and System Security (NSS), OCT 15-17, 2014
作者:
Hao, Yonglin
;
Bai, Dongxia
;
Li, Leibo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Impossible Differential Attack on Reduced-Round TWINE
会议论文
16th International Conference on Information Security and Cryptology (ICISC), NOV 27-29, 2013
作者:
Zheng, Xuexin
;
Jia, Keting
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
TWINE
Lightweight block cipher
Impossible differential attack
Integral attacks on reduced-round PRESENT
会议论文
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Wu, Shengbao (1)
;
Wang, Mingsheng (3)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/12/16
©版权所有 ©2017 CSpace - Powered by
CSpace