中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [25]
采集方式
OAI收割 [25]
内容类型
会议论文 [15]
期刊论文 [10]
发表日期
2014 [2]
2013 [7]
2012 [4]
2011 [1]
2010 [1]
2009 [3]
更多
学科主题
Computer S... [2]
Computer S... [1]
Computer S... [1]
Informatio... [1]
筛选
浏览/检索结果:
共25条,第1-10条
帮助
限定条件
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets
会议论文
OAI收割
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1)
;
Wang, Mingsheng (3)
;
Zhang, Bin (1)
;
Wu, Shengbao (1)
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/12/16
Some new weaknesses in the RC4 stream cipher
会议论文
OAI收割
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1)
;
Zhang, Bin (1)
;
Lin, Dongdai (2)
  |  
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
improved key recovery attacks on reduced-round salsa20 and chacha
会议论文
OAI收割
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Shi Zhenqing
;
Zhang Bin
;
Feng Dengguo
;
Wu Wenling
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Security of data
Cryptanalysis of Helix and Phelix revisited
会议论文
OAI收割
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2014/12/16
A Cross-Layer Design Combining of AMC with HARQ for DSRC Systems
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013
Zhang, Gao Yuan
;
Sun, Li Min
;
Wen, Hong
;
Wu, Bin
;
Zhu, Xiping
;
Zhou, Liang
  |  
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2014/12/16
A Quantum Watermark Protocol
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 卷号: 52, 期号: 2, 页码: 504-513
Zhang, Wei-Wei
;
Gao, Fei
;
Liu, Bin
;
Jia, Heng-Yue
;
Wen, Qiao-Yan
;
Chen, Hui
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
Quantum computation
Quantum information
Quantum watermarking
cube cryptanalysis of lblock with noisy leakage
会议论文
OAI收割
15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, November 28, 2012 - November 30, 2012
Li Zhenqi
;
Zhang Bin
;
Yao Yuan
;
Lin Dongdai
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Geometry
Security of data
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
会议论文
OAI收割
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin
;
Wang Mingsheng
;
Zhang Bin
;
Li Yongqiang
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Clocks
Cryptography
Security of data
Shift registers
Table lookup
A watermark strategy for quantum images based on quantum fourier transform
期刊论文
OAI收割
Quantum Information Processing, 2013, 卷号: 12, 期号: 2, 页码: 793-803
Zhang, Wei-Wei (1)
;
Gao, Fei (1)
;
Liu, Bin (1)
;
Wen, Qiao-Yan (1)
;
Chen, Hui (3)
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
Quantum information
Quantum computation
Quantum watermarking
Quantum fourier transform
efficient quantum private comparison employing single photons and collective detection
期刊论文
OAI收割
Quantum Information Processing, 2012, 页码: 40919
Liu Bin
;
Gao Fei
;
Jia Heng-yue
;
Huang Wei
;
Zhang Wei-wei
;
Wen Qiao-yan
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2012/11/12