CORC

浏览/检索结果: 共38条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Accurate estimation of the full differential distribution for general Feistel structures 会议论文
11th International Conference on Information Security and Cryptology, Inscrypt 2015, Beijing, China, November 1, 2015 - November 3, 2015
作者:  Chen, Jiageng*;  Miyaji, Atsuko;  Su, Chunhua;  Teh, Je Sen
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/23
Differential Privacy for Collaborative Filtering Recommender Algorithm 会议论文
ACM International Workshop on Security and Privacy Analytics (IWSPA), MAR 11, 2016
作者:  Zhu, Xue;  Sun, Yuqing
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/31
Improbable Differential Attacks on Reduced FOX64 会议论文
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE), Xian, PEOPLES R CHINA, DEC 12-13, 2015
作者:  Zhang, C;  Qu, ZY;  Yu, ZD
收藏  |  浏览/下载:3/0  |  提交时间:2017/01/18
Dynamie modeling of an ostraciiform robotic fish based on angle of attack theory 会议论文
Wang, Wei; Xie, Guangming; Shi, Hong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Improved Davies-Murphy's attack on des revisited 会议论文
6th International Symposium on Foundations and Practice of Security, FPS 2013, La Rochelle, France, October 21, 2013 - October 22, 2013
Lu, Yi (1); Desmedt, Yvo (2)
收藏  |  浏览/下载:19/0  |  提交时间:2014/12/16
Reflection cryptanalysis of PRINCE-like ciphers 会议论文
20th International Workshop on Fast Software Encryption, FSE 2013, Singapore, Singapore, March 11, 2013 - March 13, 2013
Soleimany, Hadi (1); Blondeau, Cé; line (1); Yu, Xiaoli (2); Wu, Wenling (2); Nyberg, Kaisa (1); Zhang, Huiling (2); Zhang, Lei (2); Wang, Yanfeng (2)
收藏  |  浏览/下载:14/0  |  提交时间:2014/12/16
Differential cryptanalysis and linear distinguisher of full-round Zorro 会议论文
12th International Conference on Applied Cryptography and Network Security, ACNS 2014, Lausanne, Switzerland, June 10, 2014 - June 13, 2014
Wang, Yanfeng (1); Wu, Wenling (1); Guo, Zhiyuan (1); Yu, Xiaoli (1)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique 会议论文
8th International Conference on Network and System Security (NSS), OCT 15-17, 2014
作者:  Hao, Yonglin;  Bai, Dongxia;  Li, Leibo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
Impossible Differential Attack on Reduced-Round TWINE 会议论文
16th International Conference on Information Security and Cryptology (ICISC), NOV 27-29, 2013
作者:  Zheng, Xuexin;  Jia, Keting
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
Integral attacks on reduced-round PRESENT 会议论文
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Wu, Shengbao (1); Wang, Mingsheng (3)
收藏  |  浏览/下载:9/0  |  提交时间:2014/12/16


©版权所有 ©2017 CSpace - Powered by CSpace