设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(9)
CNKI学位论文(10)
知网期刊论文(62)
在“
SpringerLink电子期刊
”中,
命中:
48
条,耗时:小于0.01 秒
在所有数据库中总计命中:
81
条
1.
Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks
关键词:
Tuak
;
Keccak
;
Side
;
channel analysis
;
Authentication and key agreement
;
UMTS
;
LTE
;
USIM cards
刊名:Lecture Notes in Computer Science
出版年:2017
2.
Linear Structures: Applications to Cryptanalysis of Round-Reduced
Keccak
关键词:
Cryptanalysis
;
SHA
3 ;
Keccak
;
Preimage attacks
;
Zero
;
sum distinguishers
刊名:Lecture Notes in Computer Science
出版年:2016
3.
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced
Keccak
Sponge Function
关键词:
Keccak
;
SHA
3 ;
Sponge function
;
Cube attack
刊名:Lecture Notes in Computer Science
出版年:2015
4.
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced
Keccak
- \(f\) Permutation
关键词:
SHA
;
3
;
Keccak
;
Internal differential
;
Boomerang
;
Practical
;
complexity distinguisher
刊名:Lecture Notes in Computer Science
出版年:2015
5.
Improved Practical Attacks on Round-Reduced
Keccak
作者:
Itai Dinur (1)
Orr Dunkelman (1) (2)
Adi Shamir (1)
关键词:
Cryptanalysis
;
SHA
3 ;
Keccak
;
Collision
;
Near
;
collision
;
Practical attack
刊名:Journal of Cryptology
出版年:2014
6.
Improved indifferentiability security bound for the JH mode
作者:
Dustin Moody
;
Souradyuti Paul
;
Daniel Smith-Tone
关键词:
Indifferentiability
;
Security
;
Hash functions
;
JH mode of operation
刊名:Designs, Codes and Cryptography
出版年:2016
7.
Rotational Cryptanalysis of Round-Reduced
Keccak
作者:
Pawe? Morawiecki (16) (18)
Josef Pieprzyk (17)
Marian Srebrny (16) (18)
关键词:
Preimage attack
;
Keccak
;
Rotational cryptanalysis
;
SHA
3
刊名:Lecture Notes in Computer Science
出版年:2014
8.
A Cryptographic Analysis of UMTS/LTE AKA
关键词:
Security proof
;
\(\mathsf {AKA}\)
;
protocol
;
\(\mathsf {TUAK}\)
;
\(\mathsf {MILENAGE}\)
刊名:Lecture Notes in Computer Science
出版年:2016
9.
Efficient and First-Order DPA Resistant Implementations of
Keccak
作者:
Begül Bilgin (19) (20)
Joan Daemen (17)
Ventzislav Nikov (18)
Svetla Nikova (19)
Vincent Rijmen (19)
Gilles Van Assche (17)
关键词:
Keccak
;
Side
;
channel attacks
;
Threshold implementation
刊名:Lecture Notes in Computer Science
出版年:2014
10.
Towards Evaluating DPA Countermeasures for
Keccak
K1012ECCAK on a Real ASIC
关键词:
Duplex construction
;
SpongeWrap
;
Threshold implementation
;
Side
;
channel attacks
;
DPA
;
Low
;
area hardware
;
ASIC
刊名:Lecture Notes in Computer Science
出版年:2015
1
2
3
4
5
按检索点细分(48)
题名(19)
关键词(23)
文摘(43)
按出版年细分(48)
2017年(1)
2016年(4)
2015年(9)
2014年(14)
2013年(10)
2012年(9)
2011年(1)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.