寓言 发表于 2025-3-21 19:23:47

书目名称Information Security and Cryptology -- ICISC 2013影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465381<br><br>        <br><br>书目名称Information Security and Cryptology -- ICISC 2013读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465381<br><br>        <br><br>

pineal-gland 发表于 2025-3-21 21:43:19

http://reply.papertrans.cn/47/4654/465381/465381_2.png

Admire 发表于 2025-3-22 03:00:25

Rebound Attacks on Stribogion is analyzed and a 7.75 round semi free-start collision, 8.75 and 9.75 round semi free-start near collisions are presented along with an example for 4.75 round 50 out of 64 bytes near colliding message pair.

好色 发表于 2025-3-22 05:52:55

http://reply.papertrans.cn/47/4654/465381/465381_4.png

hermetic 发表于 2025-3-22 10:10:45

http://reply.papertrans.cn/47/4654/465381/465381_5.png

笨拙的你 发表于 2025-3-22 13:51:51

Conference proceedings 2014 ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of informat

无法治愈 发表于 2025-3-22 18:16:22

0302-9743re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.978-3-319-12159-8978-3-319-12160-4Series ISSN 0302-9743 Series E-ISSN 1611-3349

GROUP 发表于 2025-3-22 23:28:21

http://reply.papertrans.cn/47/4654/465381/465381_8.png

dapper 发表于 2025-3-23 04:35:35

Impossible Differential Attack on Reduced-Round TWINEdata and memory complexity of attacking 23-round TWINE-80 are . 23-round encryptions, . chosen plaintexts and . blocks respectively. Besides, the impossible differential attack on 24-round TWINE-128 needs . chosen plaintexts, . 24-round encryptions and . blocks of memory.

Limited 发表于 2025-3-23 09:02:44

http://reply.papertrans.cn/47/4654/465381/465381_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology -- ICISC 2013; 16th International C Hyang-Sook Lee,Dong-Guk Han Conference proceedings 2014 Springer In