CORC

浏览/检索结果: 共26条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Dynamically reconfigurable architecture for high-throughput hash function in key-value store 期刊论文
Proceedings - 21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, 2019, 页码: 1964-1970
作者:  Liu, Ke;  Zhao, Mengying;  Ju, Lei;  Jia, Zhiping
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/11
Towards security authentication for IoT devices with lattice-based ZK 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 141-150
作者:  Cai, Jie;  Jiang, Han;  Xu, Qiuliang;  Lv, Guangshi;  Zhao, Minghao
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Improved Preimage Attacks on RIPEMD-160 and HAS-160 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 卷号: 12, 期号: 2, 页码: 727-746
作者:  Shen, Yanzhao;  Wang, Gaoli
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
A provably-secure and efficient verifier-based anonymous password-authenticated key exchange protocol 期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 670-677
作者:  Yang, Xiaoyan;  Jiang, Han;  Xu, Qiuliang;  Hou, Mengbo;  Wei, Xiaochao
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/16
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol 会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:  Yang, Xiaoyan;  Jiang, Han;  Xu, Qiuliang;  Hou, Mengbo;  Wei, Xiaochao
收藏  |  浏览/下载:16/0  |  提交时间:2019/12/31
(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8783, 页码: 90-103
作者:  Wang, Gaoli;  Shen, Yanzhao
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/17
Study on RFID authentication technology based on public-key algorithms and HASH function 会议论文
2014 International Conference on Sensors Instrument and Information Technology, ICSIIT 2014, January 18, 2014 - January 19, 2014
作者:  Wang, Chang Quan
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/31
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 会议论文
20th International Workshop on Fast Software Encryption (FSE), MAR 11-13, 2013
作者:  Yu, Hongbo;  Chen, Jiazhe;  Wang, Xiaoyun
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
Improved boomerang attacks on SM3 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7959 LNCS, 页码: 251-266
作者:  Bai, Dongxia;  Yu, Hongbo;  Wang, Gaoli;  Wang, Xiaoyun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/23
Forward Private RFID Authentication Protocol Based on Universal Hash Function 期刊论文
Journal of information and computational science, 2013, 卷号: 10, 期号: 11, 页码: 3477-3488
作者:  Shujing Gao;  Hongjun Wang
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/23


©版权所有 ©2017 CSpace - Powered by CSpace