中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
机构
  • 软件研究所 [15]
采集方式
内容类型
  • 会议论文 [15]
发表日期
学科主题
筛选

浏览/检索结果: 共15条,第1-10条 帮助

限定条件                    
条数/页: 排序方式:
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets 会议论文  OAI收割
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1); Wang, Mingsheng (3); Zhang, Bin (1); Wu, Shengbao (1)
  |  收藏  |  浏览/下载:9/0  |  提交时间:2014/12/16
Some new weaknesses in the RC4 stream cipher 会议论文  OAI收割
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1); Zhang, Bin (1); Lin, Dongdai (2)
  |  收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
improved key recovery attacks on reduced-round salsa20 and chacha 会议论文  OAI收割
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing; Zhang Bin; Feng Dengguo; Wu Wenling
  |  收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
Cryptanalysis of Helix and Phelix revisited 会议论文  OAI收割
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)
  |  收藏  |  浏览/下载:16/0  |  提交时间:2014/12/16
cube cryptanalysis of lblock with noisy leakage 会议论文  OAI收割
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi; Zhang Bin; Yao Yuan; Lin Dongdai
  |  收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators 会议论文  OAI收割
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin; Wang Mingsheng; Zhang Bin; Li Yongqiang
  |  收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
applying time-memory-data trade-off to plaintext recovery attack 会议论文  OAI收割
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Zhang Bin; Lu Yao; Zou Jing; Lin Dongdai
  |  收藏  |  浏览/下载:17/0  |  提交时间:2013/09/22
a new variant of time memory trade-off on the improvement of thing and ying's attack 会议论文  OAI收割
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi; Lu Yao; Wang Wenhao; Zhang Bin; Lin Dongdai
  |  收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
separating ne from some nonuniform nondeterministic complexity classes 会议论文  OAI收割
15th Annual International Conference on Computing and Combinatorics, COCOON 2009, Niagara Falls, NY, United states, 37450
Fu Bin; Li Angsheng; Zhang Liyu
  |  收藏  |  浏览/下载:7/0  |  提交时间:2011/03/20
an improved fast correlation attack on stream ciphers 会议论文  OAI收割
15th International Workshop on Selected Areas in Cryptography, SAC 2008, Sackville, NB, Canada, August 14,
Zhang Bin; Feng Dengguo
  |  收藏  |  浏览/下载:8/0  |  提交时间:2011/06/13