论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions |
王明生 |
2012 |
|
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers |
王明生 |
2012 |
|
Security on LBlock against Biclique Cryptanalysis |
汪艳凤 |
2012 |
|
Inner-Product Lossy Trapdoor Functions and Applications |
谢翔 |
2012 |
|
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting |
谢翔 |
2012 |
|
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound |
张立廷 |
2012 |
|
An New Anti-SPA Algorithm of NAF Scalar Multiplication used in ECC |
罗鹏 |
2012 |
|
功耗分析攻击中的功耗余数据相关性模型 |
罗鹏 |
2012 |
|
基于静态贝叶斯博弈的蠕虫攻防策略绩效评估 |
刘玉岭 |
2012 |
|
基于关联度的汉藏多词单元等价单位抽取方法 |
诺明花 |
2012 |
|
基于维基百科和模式聚类的实体关系抽取方法 |
张苇如 |
2012 |
|
受限路网中基于全局学习机制的在线轨迹预测 |
徐怀野 |
2012 |
|
SegT:一个实用的藏文分词系统 |
刘汇丹 |
2012 |
|
云计算环境中基于访问量和依赖性评价的数据分配算法 |
孙熙领 |
2012 |
|
虚拟机确定性执行重放的模型分析和实现方法 |
于佳耕 |
2012 |
|
一种领域专家文献自动收集系统 |
廖晓峰 |
2012 |
|
一种Hadoop小文件存储和读取的方法 |
张春明 |
2012 |
|
一种并发程序原子性错误的检测方法及工具 |
李潇 |
2012 |
|
Hestus:一种海量异构物联网数据存储模型及其实现 |
何凤成 |
2012 |
|
TSD: A Flexible Root of Trust for the Cloud |
常德显 |
2012 |
|
A New Efficient Property-based Attestation Protocol Based on Elliptic Curves |
初晓博 |
2012 |
|
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher |
汪艳凤 |
2012 |
|
TrCBC: Another look at CBC-MAC |
张立廷 |
2012 |
|
(Pseudo) Preimage Attack on Round-Reduced Grostl Hash Function and Others |
吴双 |
2012 |
|
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack |
李振琦 |
2012 |
|
A New Variant of Time memory Trade-Off on the Improvement of Thing and Ying's Attack |
李振琦 |
2012 |
|
高阶差分视角下的积分攻击 |
董乐 |
2012 |
|
构造零和区分器的新方法 |
董乐 |
2012 |
|
Transmission Technique towards Seamless Handover for NGEO Satellite Networks |
Wang,L |
2011 |
CHINA COMMUNICATIONS |
Updating preconditioner for iterative method in time domain simulation of power systems |
Wang,K |
2011 |
SCIENCE CHINA-TECHNOLOGICAL SCIENCES |