nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A better bound for implicit factorization problem with shared middle bits
|
Wang, Shixiong |
|
2017 |
61 |
3 |
p. 1-10 |
artikel |
2 |
An adaptive system for detecting malicious queries in web attacks
|
Dong, Ying |
|
2018 |
61 |
3 |
p. 1-16 |
artikel |
3 |
A real-time inversion attack on the GMR-2 cipher used in the satellite phones
|
Hu, Jiao |
|
2018 |
61 |
3 |
p. 1-18 |
artikel |
4 |
A systematic framework to understand central bank digital currency
|
Yao, Qian |
|
2018 |
61 |
3 |
p. 1-8 |
artikel |
5 |
Attacking OpenSSL ECDSA with a small amount of side-channel information
|
Wang, Wenbo |
|
2017 |
61 |
3 |
p. 1-14 |
artikel |
6 |
Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication
|
Youn, Taek-Young |
|
2017 |
61 |
3 |
p. 1-11 |
artikel |
7 |
Construction of rotation symmetric bent functions with maximum algebraic degree
|
Zhang, Wenying |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
8 |
Countering JPEG anti-forensics based on noise level estimation
|
Zeng, Hui |
|
2017 |
61 |
3 |
p. 1-14 |
artikel |
9 |
Efficient and secure outsourcing of bilinear pairings with single server
|
Dong, Min |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
10 |
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
|
Zhou, Ping |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
11 |
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
|
Zhang, Kai |
|
2017 |
61 |
3 |
p. 1-13 |
artikel |
12 |
Impossible differential attack on Simpira v2
|
Zong, Rui |
|
2017 |
61 |
3 |
p. 1-13 |
artikel |
13 |
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
|
Li, Wei |
|
2018 |
61 |
3 |
p. 1-13 |
artikel |
14 |
Improved automatic search of impossible differentials for camellia with FL/FL−1 layers
|
Ding, Yaoling |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
15 |
Improved cryptanalysis of step-reduced SM3
|
Shen, Yanzhao |
|
2017 |
61 |
3 |
p. 1-2 |
artikel |
16 |
Improved meet-in-the-middle attacks on reduced-round Piccolo
|
Liu, Ya |
|
2017 |
61 |
3 |
p. 1-13 |
artikel |
17 |
More permutation polynomials with differential uniformity six
|
Tu, Ziran |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
18 |
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
|
Zhao, Xinjie |
|
2018 |
61 |
3 |
p. 1-3 |
artikel |
19 |
Orthogonalized lattice enumeration for solving SVP
|
Zheng, Zhongxiang |
|
2018 |
61 |
3 |
p. 1-15 |
artikel |
20 |
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
|
Li, Dongmei |
|
2018 |
61 |
3 |
p. 1-9 |
artikel |
21 |
Protecting white-box cryptographic implementations with obfuscated round boundaries
|
Xu, Tao |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
22 |
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
|
Wang, An |
|
2017 |
61 |
3 |
p. 1-11 |
artikel |
23 |
Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
|
Wu, Haiqin |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
24 |
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
|
Sun, Lixue |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
25 |
Several classes of negabent functions over finite fields
|
Wu, Gaofei |
|
2017 |
61 |
3 |
p. 1-3 |
artikel |
26 |
Similar operation template attack on RSA-CRT as a case study
|
Xu, Sen |
|
2018 |
61 |
3 |
p. 1-17 |
artikel |
27 |
Three new infinite families of bent functions
|
Wang, Libo |
|
2017 |
61 |
3 |
p. 1-14 |
artikel |
28 |
Verifiable random functions with Boolean function constraints
|
Wang, Qianwen |
|
2018 |
61 |
3 |
p. 1-3 |
artikel |