CORC

浏览/检索结果: 共6条,第1-6条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
a real-time key recovery attack on the lightweight stream cipher a2u2 会议论文
11th International Conference on Cryptology and Network Security, CANS 2012, Darmstadt, Germany, December 12, 2012 - December 14, 2012
Shi Zhenqing; Feng Xiutao; Feng Dengguo; Wu Chuankun
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
the initialization stage analysis of zuc v1.5 会议论文
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya China, 2011
Zhou Chunfang; Feng Xiutao; Lin Dongdai
收藏  |  浏览/下载:9/0  |  提交时间:2013/10/08
loiss: a byte-oriented stream cipher 会议论文
3rd International Workshop on Coding and Cryptology, IWCC 2011, Qingdao, China, 30-May-20
Feng Dengguo; Feng Xiutao; Zhang Wentao; Fan Xiubin; Wu Chuankun
收藏  |  浏览/下载:28/0  |  提交时间:2011/10/10
linear approximations of addition modulo 2n-1 会议论文
18th International Workshop on Fast Software Encryption, FSE 2011, Lyngby, Denmark, 1-Feb
Zhou Chunfang; Feng Xiutao; Wu Chuankun
收藏  |  浏览/下载:16/0  |  提交时间:2011/10/10
The initialization stage analysis of ZUC v1.5 会议论文
10th International Conference on Cryptography and Network Security, CANS 2011, December 10, 2011 - December 12, 2011
作者:  Zhou, Chunfang;  Feng, Xiutao;  Lin, Dongdai
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31
a byte-based guess and determine attack on sosemanuk 会议论文
16th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, Singapore, Singapore, 40882
Feng Xiutao; Liu Jun; Zhou Zhaocun; Wu Chuankun; Feng Dengguo
收藏  |  浏览/下载:14/0  |  提交时间:2011/03/31


©版权所有 ©2017 CSpace - Powered by CSpace