×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [6]
中国科学院大学 [3]
山东大学 [3]
华中师范大学 [1]
内容类型
期刊论文 [8]
会议论文 [5]
发表日期
2017 [1]
2016 [2]
2013 [1]
2012 [1]
2010 [2]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Variable message encryption through blockcipher compression function
期刊论文
Concurrency Computation, 2017, 卷号: 29, 期号: 7, 页码: -
作者:
Chen, Jiageng
;
Mazumder, Rashed*
;
Miyaji, Atsuko
;
Su, Chunhua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/23
blockcipher
collision resistance and preimage resistance
ideal and weak cipher model
constrained device
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round even-mansour
期刊论文
Designs codes and cryptography, 2016, 卷号: 81, 期号: 1, 页码: 109-129
作者:
Guo, Chun
;
Lin, Dongdai
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/05/09
Blockcipher
Ideal cipher
Sequential indifferentiability
Correlation intractability
Key-alternating cipher
Iterated even-mansour cipher
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
期刊论文
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 卷号: 10031, 页码: 455-483
作者:
Wang, Lei
;
Guo, Jian
;
Zhang, Guoyan
;
Zhao, Jingyuan
;
Gu, Dawu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Tweakable blockcipher
Full security
Ideal blockcipher
Tweak-dependent
key
Attacking and fixing the CS mode
会议论文
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Sui, Han (1)
;
Wu, Wenling (1)
;
Zhang, Liting (1)
;
Wang, Peng (2)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2014/12/16
3kf9: enhancing 3gpp-mac beyond the birthday bound
会议论文
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Zhang Liting
;
Wu Wenling
;
Sui Han
;
Wang Peng
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2013/09/22
Security of data
Optimal Tweakable Blockcipher based on Dual MISTY-Type Structure
会议论文
2nd International Conference on Future Networks (ICFN 2010), JAN 22-24, 2010
作者:
Wen, Fengtong
;
Yin, Lizi
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/31
cryptography
block cipher
tweakable block cipher
MISTY-TYPE structure
Optimal tweakable blockcipher based on dual MISTY-Type structure
期刊论文
2nd International Conference on Future Networks, ICFN 2010, 2010, 页码: 39-41
作者:
Wen, Fengtong
;
Yin, Lizi
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/26
Block cipher
Cryptography
MISTY-TYPE structure
Tweakable block cipher
一种基于分组密码的hash函数
期刊论文
软件学报, 2009, 卷号: 20, 期号: 3, 页码: 682-691
林品
;
吴文玲
;
武传坤
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2010/08/20
分组密码
hash函数
碰撞攻击
前像攻击
第二前像攻击
blockcipher
hashfunction
collisionattack
pre-imageattack
secondpre-imageattack block cipher
hash function
collision attack
pre-image attack
second pre-image attack
hctr: a variable-input-length enciphering mode
会议论文
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P
;
Feng DG
;
Wu WL
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2011/07/28
blockcipher
tweakable blockcipher
disk sector encryption
modes of operation
symmetric encryption
on the security of tweakable modes of operation: tbc and tae
会议论文
8th International Conference on Information Security, Singapore, SINGAPORE, SEP 20-23,
Wang P
;
Feng DG
;
Wu WL
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/07/28
blockcipher
tweakable blockcipher
modes of operation
symmetric encryption
authenticated encryption
©版权所有 ©2017 CSpace - Powered by
CSpace