×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [2]
重庆大学 [2]
北京航空航天大学 [2]
中国农业科学院 [2]
软件研究所 [2]
清华大学 [1]
更多...
内容类型
期刊论文 [14]
会议论文 [2]
发表日期
2019 [2]
2018 [3]
2016 [1]
2015 [1]
2014 [2]
2013 [3]
更多...
学科主题
evolutiona... [2]
genetics &... [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Involutory differentially 4-uniform permutations from known constructions
期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
作者:
Fu, Shihui
;
Feng, Xiutao
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2019/03/05
Involution
Differentially 4-uniform permutation
Nonlinearity
Permutation
Algebraic degree
06E30
14G50
94A60
Advanced encryption standard based on key dependent S-Box cube
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 552-558
作者:
Seghier, Athmane
;
Li, Jianxin
;
Sun, Da Zhi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
cryptography
polynomials
active S-Box
original AES
advanced encryption standard
key dependent S-Box cube
encryption algorithm
cryptanalysis attacks
static parameters
substitution box
sensitive parameters
encryption key
interchangeable S-Boxes
statistical properties
cryptographic randomness properties
random rotations
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 卷号: 48, 期号: 12, 页码: 3349-3358
作者:
Zhang, Tong
;
Chen, C. L. Philip
;
Chen, Long
;
Xu, Xiangmin
;
Hu, Bin
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2019/01/08
Boolean function
I-Ching
I-Ching operators 23 (ICOs)
periodic iterated function (PIF)
substitution box (S-Box)
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes
期刊论文
CHINESE PHYSICS B, 2018, 卷号: 27
作者:
Zhang, Xuan-Ping
;
Guo, Rui
;
Chen, Heng-Wei
;
Zhao, Zhong-Meng
;
Wang, Jia-Yin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
S-box
synchronous substitution and diffusion
image encryption
crack
Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes
会议论文
ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018-01-01
作者:
Seghier, Athmane
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Boolean functions
Substitution-Boxes
Linear Redundancy
Finite Field
Fitness function
S-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithm
期刊论文
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2016, 卷号: 27, 页码: 232-241
作者:
Tian, Ye
;
Lu, Zhimao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/09
substitution boxes (S-boxes)
multiple cryptographic criteria
six-dimensional compound hyperchaotic map
artificial bee colony algorithm (ABC)
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes
期刊论文
IET INFORMATION SECURITY, 2015, 卷号: 9, 页码: 277-283
作者:
Dong, Le
;
Wang, Yanling
;
Wu, Wenling
;
Zou, Jian
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/11/21
SP transformation
linear cryptanalysis
15-round near-collision attacks
file organisation
hash functions
Matyas-Meyer-Oseas
single substitution permutation functions
4-branch type-2 GFN
linear layer
S-boxes layer
SP-layers
cryptography
double SP-functions
substitution permutation transformation
block ciphers
subkey XOR
single SP-function
15-round 4-branch type-2 generalised Feistel networks
rebound attack techniques
known-key distinguishers
differential cryptanalysis
Miyaguchi-Preneel compression function modes
hashing modes
near-collision attacks
An efficient chaotic image encryption based on alternate circular S-boxes
期刊论文
NONLINEAR DYNAMICS, 2014, 卷号: 78, 期号: [db:dc_citation_issue], 页码: 359-369
作者:
Zhang, Xuanping
;
Mao, Yanbin
;
Zhao, Zhongmeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/03
S-box
Chaotic map
Image encryption
Substitution
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
期刊论文
Frontiers of Computer Science, 2014, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1)
;
Wu, Wenling (2)
;
Wu, Shuang (2)
;
Zou, Jian (2)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
known-key
block cipher
generalized Feistel scheme
type-1
rebound attack
integral distinguisher
algebraic degree
The Fate of Arabidopsis thaliana Homeologous CNSs and Their Motifs in the Paleohexaploid Brassica rapa
期刊论文
GENOME BIOLOGY AND EVOLUTION, 2013, 卷号: 5, 期号: 4, 页码: 646-660
作者:
Subramaniam, Sabarinath
;
Wang, Xiaowu
;
Freeling, Michael
;
Pires, J. Chris
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/04/17
conserved noncoding sequence
CNS
fractionation
mutagenesis
deletion
G-box
PIL5
Arabidopsis
Brassica rapa
©版权所有 ©2017 CSpace - Powered by
CSpace