Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A better bound for implicit factorization problem with shared middle bits Wang, Shixiong
2017
61 3 p. 1-10
artikel
2 An adaptive system for detecting malicious queries in web attacks Dong, Ying
2018
61 3 p. 1-16
artikel
3 A real-time inversion attack on the GMR-2 cipher used in the satellite phones Hu, Jiao
2018
61 3 p. 1-18
artikel
4 A systematic framework to understand central bank digital currency Yao, Qian
2018
61 3 p. 1-8
artikel
5 Attacking OpenSSL ECDSA with a small amount of side-channel information Wang, Wenbo
2017
61 3 p. 1-14
artikel
6 Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication Youn, Taek-Young
2017
61 3 p. 1-11
artikel
7 Construction of rotation symmetric bent functions with maximum algebraic degree Zhang, Wenying
2017
61 3 p. 1-3
artikel
8 Countering JPEG anti-forensics based on noise level estimation Zeng, Hui
2017
61 3 p. 1-14
artikel
9 Efficient and secure outsourcing of bilinear pairings with single server Dong, Min
2017
61 3 p. 1-3
artikel
10 Efficient flush-reload cache attack on scalar multiplication based signature algorithm Zhou, Ping
2017
61 3 p. 1-3
artikel
11 Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability Zhang, Kai
2017
61 3 p. 1-13
artikel
12 Impossible differential attack on Simpira v2 Zong, Rui
2017
61 3 p. 1-13
artikel
13 Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs Li, Wei
2018
61 3 p. 1-13
artikel
14 Improved automatic search of impossible differentials for camellia with FL/FL−1 layers Ding, Yaoling
2017
61 3 p. 1-3
artikel
15 Improved cryptanalysis of step-reduced SM3 Shen, Yanzhao
2017
61 3 p. 1-2
artikel
16 Improved meet-in-the-middle attacks on reduced-round Piccolo Liu, Ya
2017
61 3 p. 1-13
artikel
17 More permutation polynomials with differential uniformity six Tu, Ziran
2017
61 3 p. 1-3
artikel
18 Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers Zhao, Xinjie
2018
61 3 p. 1-3
artikel
19 Orthogonalized lattice enumeration for solving SVP Zheng, Zhongxiang
2018
61 3 p. 1-15
artikel
20 Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation Li, Dongmei
2018
61 3 p. 1-9
artikel
21 Protecting white-box cryptographic implementations with obfuscated round boundaries Xu, Tao
2017
61 3 p. 1-3
artikel
22 Right or wrong collision rate analysis without profiling: full-automatic collision fault attack Wang, An
2017
61 3 p. 1-11
artikel
23 Secure and efficient k-nearest neighbor query for location-based services in outsourced environments Wu, Haiqin
2017
61 3 p. 1-3
artikel
24 Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation Sun, Lixue
2017
61 3 p. 1-3
artikel
25 Several classes of negabent functions over finite fields Wu, Gaofei
2017
61 3 p. 1-3
artikel
26 Similar operation template attack on RSA-CRT as a case study Xu, Sen
2018
61 3 p. 1-17
artikel
27 Three new infinite families of bent functions Wang, Libo
2017
61 3 p. 1-14
artikel
28 Verifiable random functions with Boolean function constraints Wang, Qianwen
2018
61 3 p. 1-3
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland