×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [43]
软件研究所 [37]
清华大学 [5]
大连理工大学 [5]
衡阳师范学院 [4]
武汉大学 [4]
更多...
内容类型
期刊论文 [82]
会议论文 [28]
学位论文 [2]
发表日期
2021 [1]
2019 [4]
2018 [3]
2017 [4]
2016 [10]
2015 [6]
更多...
学科主题
Computer S... [3]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共112条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantum Algorithm for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 40
作者:
Chen Yu-Ao
;
Gao Xiao-Shan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/04/26
Block cipher AES
Boolean equation solving
condition number
hash function SHA-3
Keccak
HHL algorithm
MPKC
polynomial system solving
quantum algorithm
stream cipher Trivum
A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble
期刊论文
INTERNATIONAL JOURNAL OF NONLINEAR SCIENCES AND NUMERICAL SIMULATION, 2019, 卷号: 20, 页码: 167-177
作者:
Wang, Xing-Yuan
;
Li, Zhi-Ming
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/02
Logistic mapping
block confusion
stream cipher
block cipher
image encryption
Boomerang connectivity table revisited application to skinny and aes
期刊论文
IACR Transactions on Symmetric Cryptology, 2019, 卷号: 2019, 期号: 1, 页码: 118-141
作者:
Song L.
;
Qin X.
;
Hu L.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
AES
Block cipher
Boomerang attack
Boomerang connectivity table
Sandwich attack
SKINNY
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
期刊论文
Science China(Information Sciences), 2019, 期号: 03, 页码: 19-30
作者:
Rui ZONG
;
Xiaoyang DONG
;
Xiaoyun WANG
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
related-tweakey impossible di?erential attack
tweakable block cipher
Deoxys-BC-256
tweakey schedule
MILP
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 卷号: 62, 期号: 3
作者:
Zong, Rui
;
Dong, Xiaoyang
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
related-tweakey impossible differential attack
tweakable block cipher
Deoxys-BC-256
tweakey schedule
MILP
SFN: A new lightweight block cipher
期刊论文
Microprocessors and Microsystems, 2018, 卷号: 60, 页码: 138-150
作者:
Li, Lang*
;
Liu, Botao*
;
Zhou, Yimeng
;
Zou, Yi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/24
Lightweight
Block cipher
SP network
Feistel network
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
期刊论文
IET INFORMATION SECURITY, 2018, 卷号: 12, 页码: 389-397
作者:
Lu, Jiqiang
;
Yap, Wun-She
;
Wei, Yongzhuang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
public key cryptography
private key cryptography
ISO standards
full MISTY1 block cipher
related-key amplified boomerang cryptanalysis
block size
master key
ISO international standard
Japanese CRYPTREC-recommended e-government cipher
European NESSIE selected cipher
cryptographic weakness
data complexity
time complexity
2(87)
33 encryptions
2(60)
5 chosen plaintexts
2(90) weak keys
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
An optimized DNA based encryption scheme with enforced secure key distribution
期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 卷号: 20, 页码: 3119-3130
作者:
Zhang, Yunpeng
;
Liu, Xin
;
Ma, Yongqiang
;
Cheng, Liang-Chieh
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
DNA base sequence
Block cipher
Data security
Maximum length matching
Symmetric encryption
Hamming code
DNA cryptography
Meet-in-the-Middle Attack on 11-Round 3D Block Cipher
期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 卷号: 28, 页码: 19-28
作者:
Li, Rongjia[1]
;
Jin, Chenhui[1]
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/04/24
Block cipher
3D
meet-in-the-middle
©版权所有 ©2017 CSpace - Powered by
CSpace