乌鸦 发表于 2025-3-21 16:24:26

书目名称Cryptology and Network Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0240606<br><br>        <br><br>书目名称Cryptology and Network Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0240606<br><br>        <br><br>

eustachian-tube 发表于 2025-3-21 21:22:52

http://reply.papertrans.cn/25/2407/240606/240606_2.png

安装 发表于 2025-3-22 02:39:30

uce a new version of the meet-in-the-middle technique which they call ”2-dimensional meet in the middle (2DMITM)” attack. Their attack is based on applying 2DMITM attack on 8-round GOST 2. times. In this work, we mount an attack with time complexity of 2. using 2. chosen plaintexts instead of the wh

侵略 发表于 2025-3-22 06:36:42

eature mining results, we take advantage of the structural properties of the .-partite graph formed by considering the natural interconnections between objects of different types. We show that the proposed method is straightforward, fast and scalable. The results of the analysis of rogue security so

勋章 发表于 2025-3-22 10:37:24

Mechanische Werkstoffeigenschaften,dy several protocol variants which are extremely flexible allowing different trade-offs on bus load, computational cost and security level. Experimental results are presented on state-of-the-art Infineon TriCore controllers which are contrasted with low end controllers with Freescale S12X cores, all

引水渠 发表于 2025-3-22 13:27:04

http://reply.papertrans.cn/25/2407/240606/240606_6.png

引水渠 发表于 2025-3-22 17:34:22

Improved Linear Analysis on Block Cipher MULTI2cryption key recovery, i.e., in time 2. for . = 8,12,16,20,24. Note that previously, the best linear key-recovery attack was a 20-round attack with time 2. (of 20-round encryptions) and data 2.. As ISO register recommends to use at least 32 rounds, our attacks remain to be theoretical and do not thr

Rebate 发表于 2025-3-23 00:18:00

http://reply.papertrans.cn/25/2407/240606/240606_8.png

能量守恒 发表于 2025-3-23 04:30:19

http://reply.papertrans.cn/25/2407/240606/240606_9.png

态度暖昧 发表于 2025-3-23 08:05:51

LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networksdy several protocol variants which are extremely flexible allowing different trade-offs on bus load, computational cost and security level. Experimental results are presented on state-of-the-art Infineon TriCore controllers which are contrasted with low end controllers with Freescale S12X cores, all
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Cryptology and Network Security; 11th International C Josef Pieprzyk,Ahmad-Reza Sadeghi,Mark Manulis Conference proceedings 2012 Springer-V