CORC

浏览/检索结果: 共40条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Automatic search method for multiple differentials and its application on MANTIS 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 卷号: 62, 期号: 3
作者:  Chen, Shiyao;  Liu, Ru;  Cui, Tingting;  Wang, Meiqin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
On the cryptanalysis of Fridrich's chaotic image encryption scheme 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 132, 页码: 150-154
作者:  Xie, Eric Yong;  Li, Chengqing;  Yu, Simin;  Lu, Jinhu
收藏  |  浏览/下载:15/0  |  提交时间:2018/07/30
Impossible Differential Analysis on Round-Reduced PRINCE 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 卷号: 33, 期号: 4, 页码: 1041-1053
作者:  Ding, Yao-Ling;  Zhao, Jing-Yuan;  Li, Lei-Bo;  Yu, Hong-Bo
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Linear hull attack on round-reduced simeck with dynamic key-guessing techniques 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9723, 页码: 409-424
作者:  Qin, Lingyue;  Chen, Huaifeng;  Wang, Xiaoyun
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/16
Cryptanalysis of Midori128 Using Impossible Differential Techniques 期刊论文
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 卷号: 10060, 页码: 1-12
作者:  Chen, Zhan;  Chen, Huaifeng;  Wang, Xiaoyun
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17
Improved impossible differential attack on reduced-round Lblock 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9558, 页码: 136-152
作者:  Wang, Ning;  Wang, Xiaoyun;  Jia, Keting
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes 期刊论文
IET INFORMATION SECURITY, 2015, 卷号: 9, 页码: 277-283
作者:  Dong, Le;  Wang, Yanling;  Wu, Wenling;  Zou, Jian
收藏  |  浏览/下载:9/0  |  提交时间:2019/11/21
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia 期刊论文
FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 卷号: 9054, 页码: 48-70
作者:  Li, Leibo;  Jia, Keting;  Wang, Xiaoyun;  Dong, Xiaoyang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis 期刊论文
INFORMATION SECURITY, ISC 2015, 2015, 卷号: 9290, 页码: 141-157
作者:  Sun, Siwei;  Hu, Lei;  Wang, Meiqin;  Yang, Qianqian;  Qiao, Kexin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/17
On the second derivative of some kinds of Bent functions 其他
2014-01-01
Zhang, Xinyang; Zhou, Meng
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/16


©版权所有 ©2017 CSpace - Powered by CSpace