×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [26]
内容类型
期刊论文 [17]
会议论文 [9]
发表日期
2019 [1]
2018 [2]
2016 [2]
2014 [3]
2013 [3]
2012 [8]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共26条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Dynamically reconfigurable architecture for high-throughput hash function in key-value store
期刊论文
Proceedings - 21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, 2019, 页码: 1964-1970
作者:
Liu, Ke
;
Zhao, Mengying
;
Ju, Lei
;
Jia, Zhiping
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
hash
key-value
reconfigurable
Towards security authentication for IoT devices with lattice-based ZK
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 141-150
作者:
Cai, Jie
;
Jiang, Han
;
Xu, Qiuliang
;
Lv, Guangshi
;
Zhao, Minghao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Hash function
Identification
Lattice-based cryptography
SIS problem
Zero-knowledge
Improved Preimage Attacks on RIPEMD-160 and HAS-160
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 卷号: 12, 期号: 2, 页码: 727-746
作者:
Shen, Yanzhao
;
Wang, Gaoli
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Cryptography
Preimage attack
RIPEMD-160
HAS-160
Differential
meet-in-the-middle
Hash function
A provably-secure and efficient verifier-based anonymous password-authenticated key exchange protocol
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 670-677
作者:
Yang, Xiaoyan
;
Jiang, Han
;
Xu, Qiuliang
;
Hou, Mengbo
;
Wei, Xiaochao
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/16
Anonymous authentication
Authenticated key exchange
Smooth projective hash function
Verifier-based anonymous password-authenticated key exchange
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol
会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:
Yang, Xiaoyan
;
Jiang, Han
;
Xu, Qiuliang
;
Hou, Mengbo
;
Wei, Xiaochao
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/31
Authenticated Key Exchange
anonymous authentication
Smooth Projective
Hash Function
Verifier-Based Anonymous Password-Authenticated Key
Exchange
(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8783, 页码: 90-103
作者:
Wang, Gaoli
;
Shen, Yanzhao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/17
Biclique
Differential meet-in-themiddle attack
HAS-160
Hash function
Preimage attack
RIPEMD-160
Study on RFID authentication technology based on public-key algorithms and HASH function
会议论文
2014 International Conference on Sensors Instrument and Information Technology, ICSIIT 2014, January 18, 2014 - January 19, 2014
作者:
Wang, Chang Quan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/31
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
会议论文
20th International Workshop on Fast Software Encryption (FSE), MAR 11-13, 2013
作者:
Yu, Hongbo
;
Chen, Jiazhe
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
Hash function
Near-collision
SHA-3
Skein
Improved boomerang attacks on SM3
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7959 LNCS, 页码: 251-266
作者:
Bai, Dongxia
;
Yu, Hongbo
;
Wang, Gaoli
;
Wang, Xiaoyun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/23
boomerang attack
cryptanalysis
hash function
SM3
Forward Private RFID Authentication Protocol Based on Universal Hash Function
期刊论文
Journal of information and computational science, 2013, 卷号: 10, 期号: 11, 页码: 3477-3488
作者:
Shujing Gao
;
Hongjun Wang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/23
Radio Frequency Identification
Universal Hash Function
Multiple Input Shift Register
Forward Privacy
Internet of Things
©版权所有 ©2017 CSpace - Powered by
CSpace