×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [15]
内容类型
期刊论文 [11]
会议论文 [2]
学位论文 [2]
发表日期
2015 [3]
2014 [1]
2013 [1]
2012 [4]
2011 [2]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Improved Single-Key Attacks on 9-Round AES-192/256
期刊论文
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 卷号: 8540, 页码: 127-146
作者:
Li, Leibo
;
Jia, Keting
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
AES
Block cipher
Meet-in-the-Middle Attack
Differential
characteristic
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
期刊论文
FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 卷号: 9054, 页码: 48-70
作者:
Li, Leibo
;
Jia, Keting
;
Wang, Xiaoyun
;
Dong, Xiaoyang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
Block cipher
Cryptanalysis
Truncated differential
CLEFIA
Camellia
Improved attacks on reduced-round camellia-128/192/256
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 卷号: 9048, 页码: 59-83
作者:
Dong, Xiaoyang
;
Li, Leibo
;
Jia, Keting
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Block cipher
Camellia
Key-dependent attack
Meet-in-the-middle attack
Multiple differential attack
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
会议论文
8th International Conference on Network and System Security (NSS), OCT 15-17, 2014
作者:
Hao, Yonglin
;
Bai, Dongxia
;
Li, Leibo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Improved cryptanalysis of the block cipher KASUMI
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7707 LNCS, 页码: 222-233
作者:
Jia, Keting
;
Li, Leibo
;
Rechberger, Christian
;
Chen, Jiazhe
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/23
Cryptanalysis
Impossible Differential
KASUMI
Low data complexity attack on reduced Camellia-256
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 卷号: 7372 LNCS, 页码: 101-114
作者:
Chen, Jiazhe
;
Li, Leibo
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Block Cipher
Camellia
Cryptanalysis
Low Data Complexity
Meet-in-the-Middle Attack
New impossible differential attacks on Camellia
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 卷号: 7232 LNCS, 页码: 80-96
作者:
Bai, Dongxia
;
Li, Leibo
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Camellia
Cryptanalysis
Impossible Differential
Impossible Differential Attack
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
期刊论文
FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 卷号: 7549, 页码: 90-109
作者:
Liu, Ya
;
Li, Leibo
;
Gu, Dawu
;
Wang, Xiaoyun
;
Liu, Zhiqiang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/23
Block Cipher
Camellia
Impossible Differential Cryptanalysis
Improved impossible differential attacks on reduced-round MISTY1
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 卷号: 7690 LNCS, 页码: 15-27
作者:
Jia, Keting
;
Li, Leibo
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
Block cipher
Cryptanalysis
Impossible differential
MISTY1
New Impossible Differential Cryptanalysis of Reduced-Round Camellia
期刊论文
CRYPTOLOGY AND NETWORK SECURITY, 2011, 卷号: 7092, 页码: 26-39
作者:
Li, Leibo
;
Chen, Jiazhe
;
Jia, Keting
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Camellia
Block Cipher
Impossible Differential
Cryptanalysis
©版权所有 ©2017 CSpace - Powered by
CSpace