CORC

浏览/检索结果: 共20条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques 期刊论文
Science China(Information Sciences), 2018, 期号: 09, 页码: 282-284
作者:  Ning WANG;  Xiaoyun WANG;  Keting JIA;  Jingyuan ZHAO
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/11
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 9
作者:  Wang, Ning;  Wang, Xiaoyun;  Jia, Keting;  Zhao, Jingyuan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Impossible differential cryptanalysis of 14-round camellia-192 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9723, 页码: 363-378
作者:  Jia, Keting;  Wang, Ning
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/16
Improved impossible differential attack on reduced-round Lblock 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9558, 页码: 136-152
作者:  Wang, Ning;  Wang, Xiaoyun;  Jia, Keting
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Improved Single-Key Attacks on 9-Round AES-192/256 期刊论文
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 卷号: 8540, 页码: 127-146
作者:  Li, Leibo;  Jia, Keting;  Wang, Xiaoyun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia 期刊论文
FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 卷号: 9054, 页码: 48-70
作者:  Li, Leibo;  Jia, Keting;  Wang, Xiaoyun;  Dong, Xiaoyang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17
Improved attacks on reduced-round camellia-128/192/256 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 卷号: 9048, 页码: 59-83
作者:  Dong, Xiaoyang;  Li, Leibo;  Jia, Keting;  Wang, Xiaoyun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Differential Fault Attack on KASUMI Cipher Used in GSM Telephony 期刊论文
MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 卷号: 2014
作者:  Wang, Zongyue;  Dong, Xiaoyang;  Jia, Keting;  Zhao, Jingyuan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Impossible Differential Attack on Reduced-Round TWINE 会议论文
16th International Conference on Information Security and Cryptology (ICISC), NOV 27-29, 2013
作者:  Zheng, Xuexin;  Jia, Keting
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
Improved cryptanalysis of the block cipher KASUMI 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7707 LNCS, 页码: 222-233
作者:  Jia, Keting;  Li, Leibo;  Rechberger, Christian;  Chen, Jiazhe;  Wang, Xiaoyun
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/23


©版权所有 ©2017 CSpace - Powered by CSpace