中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [54]
中国科学院大学 [10]
数学与系统科学研究院 [7]
国家天文台 [1]
采集方式
OAI收割 [62]
iSwitch采集 [10]
内容类型
期刊论文 [56]
会议论文 [15]
学位论文 [1]
发表日期
2021 [1]
2018 [3]
2017 [1]
2016 [1]
2015 [3]
2014 [3]
更多
学科主题
Computer ... [10]
Informatio... [2]
Computer S... [1]
Engineerin... [1]
筛选
浏览/检索结果:
共72条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
期刊论文
OAI收割
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
作者:
Chen Yu-Ao
;
Gao Xiao-Shan
  |  
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/04/26
Block cipher AES
Boolean equation solving
condition number
hash function SHA-3
Keccak
HHL algorithm
MPKC
polynomial system solving
quantum algorithm
stream cipher Trivum
Security performance analysis of a chaotic stream cipher
期刊论文
OAI收割
NONLINEAR DYNAMICS, 2018, 卷号: 94, 期号: 2, 页码: 1003-1017
作者:
Lin, Zhuosheng
;
Wang, Guangyi
;
Wang, Xiaoyuan
;
Yu, Simin
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2018/11/16
Chosen-ciphertext attack
Chaotic stream cipher
Security performance analysis
Attack complexity
Fault Attack on ACORN v3
期刊论文
OAI收割
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 8, 页码: 1166-1179
作者:
Zhang, Xiaojuan
;
Feng, Xiutao
;
Lin, Dongdai
  |  
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2018/09/08
CAESAR
authenticated cipher
stream cipher
ACORN
fault attack
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:
Lin, Zhuosheng
;
Yu, Simin
;
Feng, Xiutao
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2019/12/13
Chaotic stream cipher
divide-and-conquer attack
chosen-ciphertext attack
improved chaotic encryption algorithm
Encryption algorithm based on Hadoop and non-degenerate high-dimensional discrete hyperchaotic system
期刊论文
OAI收割
ACTA PHYSICA SINICA, 2017, 卷号: 66, 期号: 23, 页码: 14
作者:
Wen He-Ping
;
Yu Si-Min
;
Lu Jin-Hu
  |  
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/07/30
chaotic system
chaotic cipher
Hadoop
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round even-mansour
期刊论文
iSwitch采集
Designs codes and cryptography, 2016, 卷号: 81, 期号: 1, 页码: 109-129
作者:
Guo, Chun
;
Lin, Dongdai
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2019/05/09
Blockcipher
Ideal cipher
Sequential indifferentiability
Correlation intractability
Key-alternating cipher
Iterated even-mansour cipher
Image compression and encryption scheme using fractal dictionary and Julia set
期刊论文
OAI收割
IET IMAGE PROCESSING, 2015, 卷号: 9, 期号: 3, 页码: 173-183
作者:
Sun, Yuanyuan
;
Xu, Rudan
;
Chen, Lina
;
Hu, Xiaopeng
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2016/11/11
data compression
image coding
cryptography
fractals
image reconstruction
image compression
image encryption scheme
fractal dictionary
Julia set
data transmission security
data storage security
multimedia data
compression-encryption scheme
image reconstruction
tiny perturbation
stream cipher encryption
diffusion process
plaintext attack
time consumption reduction
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON
期刊论文
OAI收割
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 卷号: 30, 期号: 6, 页码: 1358-1369
Yu, XL
;
Wu, WL
;
Shi, ZQ
;
Zhang, J
;
Zhang, L
;
Wang, YF
  |  
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2016/12/13
lightweight block cipher
SIMON
linear cryptanalysis
zero-correlation
dual property
Practical-time related-key attack on Hummingbird-2
期刊论文
OAI收割
IET INFORMATION SECURITY, 2015, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ
;
Zhang, B
;
Feng, DG
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2016/12/13
divide and conquer methods
cryptography
practical-time related-key attack
Hummingbird-2
lightweight cipher
MAC functionality
cryptographic notion
combination points
differential equation
internal state bits
divide and conquer strategy
cryptographic S-boxes
The higher-order meet-in-The-middle attack and its application to the Camellia block cipher
期刊论文
OAI收割
Theoretical Computer Science, 2014, 卷号: 527, 页码: 102-122
Lu, Jiqiang (1)
;
Wei, Yongzhuang (2)
;
Kim, Jongsung (4)
;
Pasalic, Enes (5)
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
Cryptology
Block cipher
Camellia
Meet-in-the-middle attack
Integral cryptanalysis