標(biāo)題: Titlebook: Information Security and Cryptology - ICISC 2011; 14th International C Howon Kim Conference proceedings 2012 Springer-Verlag Berlin Heidelb [打印本頁(yè)] 作者: 使沮喪 時(shí)間: 2025-3-21 19:49
書目名稱Information Security and Cryptology - ICISC 2011影響因子(影響力)
書目名稱Information Security and Cryptology - ICISC 2011影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology - ICISC 2011網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology - ICISC 2011網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology - ICISC 2011被引頻次
書目名稱Information Security and Cryptology - ICISC 2011被引頻次學(xué)科排名
書目名稱Information Security and Cryptology - ICISC 2011年度引用
書目名稱Information Security and Cryptology - ICISC 2011年度引用學(xué)科排名
書目名稱Information Security and Cryptology - ICISC 2011讀者反饋
書目名稱Information Security and Cryptology - ICISC 2011讀者反饋學(xué)科排名
作者: 尖牙 時(shí)間: 2025-3-21 21:28
Analysis of Trivium Using Compressed?Right?Hand?Side?Equationsons and binary decision diagrams, our new representation allows a very efficient conjunction of a large number of separate equations. We apply our new technique to the stream cipher . and variants of . reduced in size. By merging all equations into one single constraint, manageable in size and proce作者: antiquated 時(shí)間: 2025-3-22 02:13 作者: 鞭打 時(shí)間: 2025-3-22 05:21 作者: SSRIS 時(shí)間: 2025-3-22 09:25
An Efficient Leakage Characterization Method for Profiled Power Analysis Attackscy of characterization in profiling. In order to accurately characterize signals and noises in different times, a large number of power traces is usually needed in profiling. However, a large number of power traces is not always available. In this case, the accuracy of characterization is rapidly de作者: 步履蹣跚 時(shí)間: 2025-3-22 16:06
Correcting Errors in Private Keys Obtained from Cold Boot Attacksems and the standard RSA from its erroneous value. The proposed algorithm achieves almost the square root complexity of search space size. More precisely, the private key of the DL based system with 160-bit key size can be recovered in 2. exponentiations while the complexity of the exhaustive search作者: accessory 時(shí)間: 2025-3-22 17:06 作者: Tincture 時(shí)間: 2025-3-23 00:18
Fully Secure Unidirectional Identity-Based Proxy Re-encryptionby Bob’s secret key. Identity-based proxy re-encryption (IB-PRE) is the development of identity-based encryption and proxy re-encryption, where ciphertexts are transformed from one identity to another. In this paper, we propose two novel unidirectional identity-based proxy re-encryption schemes, whi作者: BLANC 時(shí)間: 2025-3-23 05:15
Detecting Parasite P2P Botnet in ,-like Networks through Quasi-periodicity Recognition if an attacker exploits the common P2P applications’ protocol to build the network and communicate. In this paper, we analyze two potential command and control mechanisms for ., we then identify the quasi periodical pattern of the request packets caused by . sending requests to search for the Botma作者: 暴露他抗議 時(shí)間: 2025-3-23 07:19 作者: 艱苦地移動(dòng) 時(shí)間: 2025-3-23 12:05
Weaknesses in Current RSA Signature Schemestire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Though PKCS#1 states that there are no known attacks ag作者: Definitive 時(shí)間: 2025-3-23 16:16
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cr strongly depends on the accuracy of underlying side-channel leakage characterization. Known leakage characterization models do not always apply into the real scenarios as they are working on some unrealistic assumptions about the leaking devices. In light of this, we propose a back propagation neur作者: genuine 時(shí)間: 2025-3-23 20:24 作者: Indicative 時(shí)間: 2025-3-24 02:16 作者: Cardioplegia 時(shí)間: 2025-3-24 02:40
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves0 bits security strength. It provably satisfies the non-delegatability and signer ambiguity properties. The construction method is a combination of the Schnorr signature and the elliptic curve Diffie-Hellman problem.作者: 晚間 時(shí)間: 2025-3-24 08:08 作者: decode 時(shí)間: 2025-3-24 13:10
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbitntion of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researchers often focus on a theoretical solution for a specific problem. In this paper, we take a first step towards the synthetic approach o作者: cipher 時(shí)間: 2025-3-24 17:46 作者: AND 時(shí)間: 2025-3-24 22:42 作者: 名詞 時(shí)間: 2025-3-25 02:54 作者: 軍火 時(shí)間: 2025-3-25 04:36 作者: tolerance 時(shí)間: 2025-3-25 11:12 作者: Awning 時(shí)間: 2025-3-25 13:02
Florian Mendel,Tomislav Nad,Martin Schl?fferand object (of desire) often represent a co-dependent oppositional pairing. In order to understand Kristeva’s point it is necessary that we recognize ‘subject’ and ‘object’ not only as opposed locations or two halves of a logical model, but also as supposedly discrete and complete identities in and 作者: 費(fèi)解 時(shí)間: 2025-3-25 18:50 作者: opportune 時(shí)間: 2025-3-25 21:24 作者: URN 時(shí)間: 2025-3-26 02:26 作者: 催眠 時(shí)間: 2025-3-26 05:50
Juliane Kr?mer,Dmitry Nedospasov,Jean-Pierre SeifertEmbedded in these three words though is a deterministic, economic assumption that technology has now enhanced learning, and will continue to do so. In a market-driven, capitalist society this is a ‘trouble free’, economically focused discourse which suggests there is no need for further debate about作者: 高歌 時(shí)間: 2025-3-26 09:48
Shuguo Yang,Yongbin Zhou,Jiye Liu,Danyang Chenork. Situated within the framework of critical theory and works of Ivan Illich, it develops the idea that pre-publication networks offer higher education a bottom-up, decentralized networked learning alternative to business-modelled e-learning and technology-enhanced learning. The theoretical part o作者: chlorosis 時(shí)間: 2025-3-26 14:00
Keita Emura,Atsuko Miyaji,Kazumasa Omotetects’ have taken centre stage on the global design platform, playing the role of individual geniuses. The spotlight of attention has been on the design and the designer, but the society in which these projects are realised is often left in the dark. The chapter recognises that such imbalance is als作者: 門窗的側(cè)柱 時(shí)間: 2025-3-26 19:02 作者: 鑲嵌細(xì)工 時(shí)間: 2025-3-26 21:58
Haibo Tian,Xiaofeng Chen,Zhengtao Jiang,Yusong Du because it involves doc- tors from a wide range of the traditional medical specialities including vascular surgery, angiology, diabetology, haematology and radiology. The treatment of these patients also varies largely with local circumstances and national traditions. CLI therefore seemed a particu作者: Multiple 時(shí)間: 2025-3-27 01:25
Kyung Chul Jeong,Dong Hoon Lee,Daewan Hanideological developments occurring within the law schools over the past forty years solely through the prism of modern conservatism. As a result, political scientists have ignored the political struggles of one of the most important legal reform movements of the 1980s and overlooked the hope for lef作者: 放牧 時(shí)間: 2025-3-27 07:32
Yi Lu,Serge Vaudenay,Willi Meier,Liping Ding,Jianchun Jiangideological developments occurring within the law schools over the past forty years solely through the prism of modern conservatism. As a result, political scientists have ignored the political struggles of one of the most important legal reform movements of the 1980s and overlooked the hope for lef作者: 沖突 時(shí)間: 2025-3-27 11:25
Yusong Du,Fangguo Zhang,Meicheng LiuZamzam et al., Ann Vasc Surg 21(4):458–463, 2007; Anderson et al., Circulation 127(13):1425–1443, 2013). Before revascularization can be performed, a thorough but efficient diagnostic approach is warranted. The diagnostic process begins with an initial clinical evaluation to assess for the presence 作者: 惡意 時(shí)間: 2025-3-27 15:25
Yu Chen,Liqun Chen,Zongyang Zhangpelvic or upper thigh level, a venous DSA should be done in order to take lumen reconstructing measures into consideration if there are no contraindications for these examinations. If these measures are impossible (surgically or respectively radiological interventionally) and a lysis treatment canno作者: TRACE 時(shí)間: 2025-3-27 19:57 作者: 敵手 時(shí)間: 2025-3-27 22:58 作者: 友好 時(shí)間: 2025-3-28 03:01 作者: agenda 時(shí)間: 2025-3-28 08:00 作者: 不能逃避 時(shí)間: 2025-3-28 13:01
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves0 bits security strength. It provably satisfies the non-delegatability and signer ambiguity properties. The construction method is a combination of the Schnorr signature and the elliptic curve Diffie-Hellman problem.作者: 會(huì)議 時(shí)間: 2025-3-28 18:34 作者: amputation 時(shí)間: 2025-3-28 21:54 作者: Ingenuity 時(shí)間: 2025-3-28 23:30 作者: triptans 時(shí)間: 2025-3-29 06:31 作者: badinage 時(shí)間: 2025-3-29 08:36 作者: reflection 時(shí)間: 2025-3-29 14:22
Florian Mendel,Tomislav Nad,Martin Schl?ffer opposes the ego by ‘draw[ing] me to the place where meaning collapses’. While the subject/object structure makes logical meaning possible, the abject produces, or is otherwise comprehensible as, an uncanny effect of horror, threatening the logical certainty of either the subject/object or self/not-作者: unstable-angina 時(shí)間: 2025-3-29 18:07 作者: 琺瑯 時(shí)間: 2025-3-29 21:02
Yong Qiao,Yuexiang Yang,Jie He,Bo Liu,Yingzhi Zengto reveal the educational and subcultural implications that this shift may entail. The aim of this chapter is to examine how the widening of graffiti milieu, whether enabled or facilitated by the pervasive presence of the Internet, introduces networked learning into the graffiti community; what extr作者: 花爭(zhēng)吵 時(shí)間: 2025-3-29 23:54
Kai Chen,Yifeng Lian,Yingjun Zhangto reveal the educational and subcultural implications that this shift may entail. The aim of this chapter is to examine how the widening of graffiti milieu, whether enabled or facilitated by the pervasive presence of the Internet, introduces networked learning into the graffiti community; what extr作者: 不能和解 時(shí)間: 2025-3-30 06:13 作者: Repetitions 時(shí)間: 2025-3-30 10:14
Shuguo Yang,Yongbin Zhou,Jiye Liu,Danyang Chen arrives at the conclusion that if learners would only embrace this more anarchical medium, appreciating writing for pre-publication as a process of open-ended discovery rather than product delivery, then the networked learning approach to knowledge creation and dissemination could become an excitin作者: 飲料 時(shí)間: 2025-3-30 15:22 作者: debble 時(shí)間: 2025-3-30 18:49 作者: 來(lái)就得意 時(shí)間: 2025-3-30 21:46 作者: 拖網(wǎng) 時(shí)間: 2025-3-31 03:01 作者: 蛛絲 時(shí)間: 2025-3-31 05:48 作者: Allowance 時(shí)間: 2025-3-31 13:05 作者: vasculitis 時(shí)間: 2025-3-31 16:44
Yu Chen,Liqun Chen,Zongyang Zhangpoorly or not trainable patients as well as an accompanying treatment form [1, 5, 14–17, 21, 23, 24, 29]. In the case of arterial circulatory disorders a reduced blood fluidity is often observed [1,4, 12, 13] in the form of an increased erythrocyte and platelet aggregation with the formation of slud作者: DEAF 時(shí)間: 2025-3-31 21:30
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software power trace into a string depending on the Hamming weights of the opcodes. After this, the patterns of the dummy operations are identified. The last step is to use a string matching algorithm to find these patterns and to align the power traces..We have started our analysis with two microcontroller作者: 通情達(dá)理 時(shí)間: 2025-4-1 00:36 作者: 用肘 時(shí)間: 2025-4-1 05:25 作者: 禍害隱伏 時(shí)間: 2025-4-1 08:40
Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Crity and accuracy of proposed attacks, we perform a series of experiments and carry out a detailed comparative study of them in multiple scenarios, with twelve typical attacks using mainstream power leakage characterization attacks, the results of which are measured by quantitative metrics such as SR作者: 舞蹈編排 時(shí)間: 2025-4-1 11:05 作者: 高歌 時(shí)間: 2025-4-1 16:42