设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
中国地质文献-英文(2)
SpringerLink电子期刊(304)
GSW全文库(1)
Wiley电子期刊(3)
ProQuest学位论文(10)
Elsevier电子期刊(106)
Springer电子图书(3)
NATURE电子期刊(3)
ACS电子期刊(4)
在“
SpringerLink电子期刊
”中,
命中:
304
条,耗时:0.0109959 秒
在所有数据库中总计命中:
436
条
1.
Weak
Keys
for AEZ, and the External Key Padding Attack
关键词:
AEZ
;
T
weak
able blockcipher
;
Weak
keys
;
Attack
;
External key padding
;
Robustness
刊名:Lecture Notes in Computer Science
出版年:2017
2.
A code-based group signature scheme
作者:
Quentin Alamélou
;
Olivier Blazy
;
Stéphane Cauchie…
关键词:
Code
;
based cryptography
;
Group signature
;
Proof of knowledge
;
Random oracle model
刊名:Designs, Codes and Cryptography
出版年:2017
3.
RSA
Weak
Public
Keys
Available on the Internet
关键词:
RSA
;
Public
keys
;
Weak
ness
;
Vulnerabilities
;
GCD
;
Euclid
;
Internet
;
Common factor
刊名:Lecture Notes in Computer Science
出版年:2016
4.
Cryptanalysis of QTL Block Cipher
关键词:
Cryptography
;
Lightweight block cipher
;
Related
;
key attacks
;
Self
;
similarity cryptanalysis
;
QTL cipher
刊名:Lecture Notes in Computer Science
出版年:2017
5.
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function
关键词:
Cryptography
;
Post
;
quantum computational cryptography
;
Cryptanalysis
;
Asymmetric cipher
;
Matrix power function
刊名:Lecture Notes in Computer Science
出版年:2017
6.
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation
关键词:
Constrained pseudorandom functions
;
Verifiable constrained pseudorandom function
;
Key delegation
;
Indistinguishability obfuscation
刊名:Lecture Notes in Computer Science
出版年:2017
7.
Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer
刊名:Lecture Notes in Computer Science
出版年:2017
8.
Breaking into the
KeyS
tore: A Practical Forgery Attack Against Android KeyStore
关键词:
Android
KeyS
tore
;
Authenticated encryption
;
Integrity
刊名:Lecture Notes in Computer Science
出版年:2016
9.
Weak
Keys
for the Quasi-Cyclic MDPC Public Key Encryption Scheme
关键词:
Quasi
;
cyclic MDPC codes
;
McEliece scheme
;
Rational reconstruction problem
;
Extended euclidean algorithm
刊名:Lecture Notes in Computer Science
出版年:2016
10.
On
Weak
Keys
and Forgery Attacks Against Polynomial-Based MAC Schemes
作者:
Gordon Procter
;
Carlos Cid
关键词:
Universal hashing
;
MAC
;
Galois/Counter Mode
;
Cycling attacks
;
Weak
keys
刊名:Journal of Cryptology
出版年:2015
1
2
3
4
5
6
7
8
9
按检索点细分(304)
题名(23)
关键词(23)
文摘(266)
按出版年细分(304)
2017年(6)
2016年(24)
2015年(23)
2014年(24)
2013年(26)
2012年(21)
2011年(4)
2010年(9)
2009年(11)
2008年(20)
2007年(46)
2006年(30)
2005年(31)
2004年(3)
2003年(5)
2002年(11)
2001年(1)
2000年(6)
2000年及以前(3)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.