×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [16]
华南理工大学 [4]
深圳先进技术研究院 [2]
武汉大学 [2]
西安交通大学 [1]
山东大学 [1]
更多...
内容类型
会议论文 [27]
发表日期
2014 [3]
2013 [2]
2012 [3]
2011 [4]
2010 [2]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共27条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets
会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1)
;
Wang, Mingsheng (3)
;
Zhang, Bin (1)
;
Wu, Shengbao (1)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
Some new weaknesses in the RC4 stream cipher
会议论文
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1)
;
Zhang, Bin (1)
;
Lin, Dongdai (2)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z(pq)
会议论文
9th China International Conference on Information Security and Cryptology (Inscrypt), Guangzhou, PEOPLES R CHINA, 2014-01-01
-
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/03
Whiteman generalized cyclotomy
Generalized cyclotomic sequences
Pseudo-random sequences
Stream cipher
improved key recovery attacks on reduced-round salsa20 and chacha
会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Security of data
Cryptanalysis of Helix and Phelix revisited
会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2014/12/16
on the probability distribution of the carry cells of stream ciphers f-fcsr-h v2 and f-fcsr-h v3
会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Song Haixin
;
Fan Xiubin
;
Wu Chuankun
;
Feng Dengguo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2013/09/22
Automata theory
Cryptography
Cytology
Markov processes
Probability distributions
Security of data
synthetic linear analysis: improved attacks on cubehash and rabbit
会议论文
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Lu Yi
;
Vaudenay Serge
;
Meier Willi
;
Ding Liping
;
Jiang Jianchun
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Security of data
a real-time key recovery attack on the lightweight stream cipher a2u2
会议论文
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing
;
Feng Xiutao
;
Feng Dengguo
;
Wu Chuankun
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Network security
Recovery
the initialization stage analysis of zuc v1.5
会议论文
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya China, 2011
Zhou Chunfang
;
Feng Xiutao
;
Lin Dongdai
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/10/08
ZUC –
initialization –
chosen
IV attack –
differential trail
loiss: a byte-oriented stream cipher
会议论文
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo
;
Feng Xiutao
;
Zhang Wentao
;
Fan Xiubin
;
Wu Chuankun
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2011/10/10
Algebra
Shift registers
©版权所有 ©2017 CSpace - Powered by
CSpace