中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
机构
采集方式
内容类型
发表日期
学科主题
筛选

浏览/检索结果: 共72条,第1-10条 帮助

条数/页: 排序方式:
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems 期刊论文  OAI收割
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
作者:  
Chen Yu-Ao;  Gao Xiao-Shan
  |  收藏  |  浏览/下载:10/0  |  提交时间:2021/04/26
Security performance analysis of a chaotic stream cipher 期刊论文  OAI收割
NONLINEAR DYNAMICS, 2018, 卷号: 94, 期号: 2, 页码: 1003-1017
作者:  
Lin, Zhuosheng;  Wang, Guangyi;  Wang, Xiaoyuan;  Yu, Simin;  Lu, Jinhu
  |  收藏  |  浏览/下载:28/0  |  提交时间:2018/11/16
Fault Attack on ACORN v3 期刊论文  OAI收割
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:  
Zhang, Xiaojuan;  Feng, Xiutao;  Lin, Dongdai
  |  收藏  |  浏览/下载:35/0  |  提交时间:2018/09/08
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme 期刊论文  OAI收割
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:  
Lin, Zhuosheng;  Yu, Simin;  Feng, Xiutao;  Lu, Jinhu
  |  收藏  |  浏览/下载:28/0  |  提交时间:2019/12/13
Encryption algorithm based on Hadoop and non-degenerate high-dimensional discrete hyperchaotic system 期刊论文  OAI收割
ACTA PHYSICA SINICA, 2017, 卷号: 66, 期号: 23, 页码: 14
作者:  
Wen He-Ping;  Yu Si-Min;  Lu Jin-Hu
  |  收藏  |  浏览/下载:29/0  |  提交时间:2018/07/30
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round even-mansour 期刊论文  iSwitch采集
Designs codes and cryptography, 2016, 卷号: 81, 期号: 1, 页码: 109-129
作者:  
Guo, Chun;  Lin, Dongdai
收藏  |  浏览/下载:38/0  |  提交时间:2019/05/09
Image compression and encryption scheme using fractal dictionary and Julia set 期刊论文  OAI收割
IET IMAGE PROCESSING, 2015, 卷号: 9, 期号: 3, 页码: 173-183
作者:  
Sun, Yuanyuan;  Xu, Rudan;  Chen, Lina;  Hu, Xiaopeng
收藏  |  浏览/下载:42/0  |  提交时间:2016/11/11
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON 期刊论文  OAI收割
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 卷号: 30, 期号: 6, 页码: 1358-1369
Yu, XL; Wu, WL; Shi, ZQ; Zhang, J; Zhang, L; Wang, YF
  |  收藏  |  浏览/下载:33/0  |  提交时间:2016/12/13
Practical-time related-key attack on Hummingbird-2 期刊论文  OAI收割
IET INFORMATION SECURITY, 2015, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ; Zhang, B; Feng, DG
  |  收藏  |  浏览/下载:23/0  |  提交时间:2016/12/13
The higher-order meet-in-The-middle attack and its application to the Camellia block cipher 期刊论文  OAI收割
Theoretical Computer Science, 2014, 卷号: 527, 页码: 102-122
Lu, Jiqiang (1); Wei, Yongzhuang (2); Kim, Jongsung (4); Pasalic, Enes (5)
  |  收藏  |  浏览/下载:15/0  |  提交时间:2014/12/16