设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
中国地质文献-英文(1)
SpringerLink电子期刊(3623)
GSW全文库(1)
Wiley电子期刊(53)
ProQuest学位论文(211)
Elsevier电子期刊(1000)
Springer电子图书(17)
NATURE电子期刊(14)
ACS电子期刊(44)
在“
SpringerLink电子期刊
”中,
命中:
3,623
条,耗时:0.0499428 秒
在所有数据库中总计命中:
4,964
条
1.
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-
Key
Attacks
关键词:
Related
;
key
attacks
;
Public
;
key
encryption
;
Cramer
;
Shoup cryptosystem
刊名:Lecture Notes in Computer Science
出版年:2017
2.
A Tool Kit for Partial
Key
Exposure
Attacks
on RSA
关键词:
(Multi
;
Prime) RSA
;
Partial
key
exposure
;
Lattices
;
Coppersmith’s methods
刊名:Lecture Notes in Computer Science
出版年:2017
3.
Improving algebraic
attacks
on stream ciphers based on linear feedback shift register over
\(\mathbb {F}_{2^k}\)
作者:
Sondre Rønjom
关键词:
Cryptography
;
Spectral immunity
;
Algebraic
attacks
刊名:Designs, Codes and Cryptography
出版年:2017
4.
Joint data and
key
distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
作者:
Céline Blondeau
;
Kaisa Nyberg
关键词:
Iterated block cipher
;
Linear attack
;
Known plaintext
;
Distinct known plaintext
;
Key
variance
;
Statistical model
刊名:Designs, Codes and Cryptography
出版年:2017
5.
An anonymous and secure authentication and
key
agreement scheme for session initiation protocol
作者:
Hao Lin
;
Fengtong Wen
;
Chunxia Du
关键词:
Authentication
;
Session Initiation Protocol (SIP)
;
Security
attacks
;
User anonymity
;
The elliptic curve discrete logarithm problem
刊名:Multimedia Tools and Applications
出版年:2017
6.
An improved arbitrated quantum signature protocol based on the
key
-controlled chained CNOT encryption
作者:
Long Zhang
;
Hong-Wei Sun
;
Ke-Jia Zhang
;
Heng-Yue Jia
关键词:
Arbitrated quantum signature
;
Chained CNOT operations
;
Forgery
attacks
;
Disavowal
attacks
刊名:Quantum Information Processing
出版年:2017
7.
An anonymous two-factor authenticated
key
agreement scheme for session initiation protocol using elliptic curve cryptography
作者:
Yanrong Lu
;
Lixiang Li
;
Haipeng Peng
;
Yixian Yang
关键词:
Authenticated
key
agreement
;
Two
;
factor
;
Smart cards
;
Session initiation protocol
刊名:Multimedia Tools and Applications
出版年:2017
8.
Transposition of AES
Key
Schedule
关键词:
AES
;
Key
schedule
;
Meet
;
in
;
the
;
middle
;
Related
;
key
;
Differentials
;
MixColumns
刊名:Lecture Notes in Computer Science
出版年:2017
9.
Improved
Key
Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
关键词:
RSA
;
Key
;
recovery
;
Side channel attack
;
EM algorithm
刊名:Lecture Notes in Computer Science
出版年:2017
10.
Network Coding Signature Schemes Against Related-
Key
Attacks
in the Random Oracle Model
关键词:
Network coding signature
;
Related
;
key
attack
;
Co
;
CDH assumption
;
Bilinear groups
刊名:Lecture Notes in Computer Science
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(3623)
题名(192)
关键词(149)
文摘(3032)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.