CORC

浏览/检索结果: 共112条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
基于时空维度分析的网络安全态势预测方法 期刊论文
计算机研究与发展, 2014, 卷号: 51, 期号: 8, 页码: 1681-1694
刘玉岭; 冯登国; 连一峰; 陈恺; 吴迪
收藏  |  浏览/下载:18/0  |  提交时间:2014/12/16
大数据安全与隐私保护 期刊论文
计算机学报, 2014, 卷号: 37, 期号: 1, 页码: 246-258
冯登国; 张敏; 李昊
收藏  |  浏览/下载:139/0  |  提交时间:2014/12/16
recursive diffusion layers for (lightweight) block ciphers and hash functions 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao; Wang Mingsheng; Wu Wenling
收藏  |  浏览/下载:16/0  |  提交时间:2013/09/22
improved key recovery attacks on reduced-round salsa20 and chacha 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/22
云计算核心技术研究综述 期刊论文
小型微型计算机系统, 2013, 卷号: 34, 期号: 11, 页码: 2417-2424
张建华; 吴恒; 张文博
收藏  |  浏览/下载:13/0  |  提交时间:2014/12/16
Systemic threats to hypervisor non-control data 期刊论文
IET INFORMATION SECURITY, 2013, 卷号: 7, 期号: 4, 页码: 349-354
Ding, Baozeng; He, Yeping; Wu, Yanjun; Yu, Jiageng
收藏  |  浏览/下载:24/0  |  提交时间:2014/12/16
weak keys of the full misty1 block cipher for related-key differential cryptanalysis 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lu Jiqiang; Yap Wun-She; Wei Yongzhuang
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22
cube cryptanalysis of lblock with noisy leakage 会议论文
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators 会议论文
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting 会议论文
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang; Xue Rui; Zhang Rui
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace