论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions
|
王明生
|
2012
|
|
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers
|
王明生
|
2012
|
|
Security on LBlock against Biclique Cryptanalysis
|
汪艳凤
|
2012
|
|
Inner-Product Lossy Trapdoor Functions and Applications
|
谢翔
|
2012
|
|
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
|
谢翔
|
2012
|
|
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
|
张立廷
|
2012
|
|
An New Anti-SPA Algorithm of NAF Scalar Multiplication used in ECC
|
罗鹏
|
2012
|
|
功耗分析攻击中的功耗余数据相关性模型
|
罗鹏
|
2012
|
|
基于静态贝叶斯博弈的蠕虫攻防策略绩效评估
|
刘玉岭
|
2012
|
|
基于关联度的汉藏多词单元等价单位抽取方法
|
诺明花
|
2012
|
|
基于维基百科和模式聚类的实体关系抽取方法
|
张苇如
|
2012
|
|
受限路网中基于全局学习机制的在线轨迹预测
|
徐怀野
|
2012
|
|
SegT:一个实用的藏文分词系统
|
刘汇丹
|
2012
|
|
云计算环境中基于访问量和依赖性评价的数据分配算法
|
孙熙领
|
2012
|
|
虚拟机确定性执行重放的模型分析和实现方法
|
于佳耕
|
2012
|
|
一种领域专家文献自动收集系统
|
廖晓峰
|
2012
|
|
一种Hadoop小文件存储和读取的方法
|
张春明
|
2012
|
|
一种并发程序原子性错误的检测方法及工具
|
李潇
|
2012
|
|
Hestus:一种海量异构物联网数据存储模型及其实现
|
何凤成
|
2012
|
|
TSD: A Flexible Root of Trust for the Cloud
|
常德显
|
2012
|
|
A New Efficient Property-based Attestation Protocol Based on Elliptic Curves
|
初晓博
|
2012
|
|
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher
|
汪艳凤
|
2012
|
|
TrCBC: Another look at CBC-MAC
|
张立廷
|
2012
|
|
(Pseudo) Preimage Attack on Round-Reduced Grostl Hash Function and Others
|
吴双
|
2012
|
|
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack
|
李振琦
|
2012
|
|
A New Variant of Time memory Trade-Off on the Improvement of Thing and Ying's Attack
|
李振琦
|
2012
|
|
高阶差分视角下的积分攻击
|
董乐
|
2012
|
|
构造零和区分器的新方法
|
董乐
|
2012
|
|
Transmission Technique towards Seamless Handover for NGEO Satellite Networks
|
Wang,L
|
2011
|
CHINA COMMUNICATIONS
|
Updating preconditioner for iterative method in time domain simulation of power systems
|
Wang,K
|
2011
|
SCIENCE CHINA-TECHNOLOGICAL SCIENCES
|