CORC

浏览/检索结果: 共7条,第1-7条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 卷号: 28, 期号: 4, 页码: 1237-1245
Wang, MQ; Zhang, ZF; Chen, C
收藏  |  浏览/下载:28/0  |  提交时间:2016/12/09
差分和线性分析的代数自动化方法 学位论文
博士, 北京: 中国科学院研究生院, 2014
吴生宝
收藏  |  浏览/下载:43/0  |  提交时间:2014/05/29
Some new weaknesses in the RC4 stream cipher 会议论文
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Lv, Jing (1); Zhang, Bin (1); Lin, Dongdai (2)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
a ciphertext policy attribute-based encryption scheme without pairings 会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Zhang Jiang; Zhang Z.
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
a real-time key recovery attack on the lightweight stream cipher a2u2 会议论文
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing; Feng Xiutao; Feng Dengguo; Wu Chuankun
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
cryptanalysis of an identity based broadcast encryption scheme without random oracles 期刊论文
Information Processing Letters, 2011, 卷号: 111, 期号: 10, 页码: 461-464
Wang Xu An; Weng Jian; Yang Xiaoyuan; Yang Yanjiang
收藏  |  浏览/下载:14/0  |  提交时间:2011/10/10
efficient unidirectional proxy re-encryption 会议论文
3rd International Conference on Cryptology in Africa, AFRICACRYPT 2010, Stellenbosch, South africa, May 3, 201
Chow Sherman S. M.; Weng Jian; Yang Yanjiang; Deng Robert H.
收藏  |  浏览/下载:16/0  |  提交时间:2011/03/31


©版权所有 ©2017 CSpace - Powered by CSpace