Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Tingting Cui"'
Publikováno v:
Applied Soft Computing. 69:357-367
Due to the important role in analyzing the structure and function of complex networks, community detection has attracted increasing attention in the past years. Multi-objective evolutionary algorithms (MOEAs) have shown promising performance in commu
Publikováno v:
Cryptography and Communications. 10:755-776
Integral attack is one of the most powerful tools in the field of symmetric ciphers. In order to reduce the time complexity of original integral one, Wang et al. firstly proposed a statistical integral distinguisher at FSE’16. However, they don’t
Publikováno v:
Cryptography and Communications. 10:195-209
Integral attack, as a powerful technique in the cryptanalysis field, has been widely utilized to evaluate the security of block ciphers. Integral distinguisher is based on balanced property on output with probability one. To obtain a distinguisher co
Publikováno v:
Science China Information Sciences. 62
Multiple differential cryptanalysis is one of the extensions of classic differential cryptanalysis. In this paper, we present a generic automatic search method for clustering multiple differentials on a target block cipher. Our search method has two
Publikováno v:
Selected Areas in Cryptography – SAC 2018 ISBN: 9783030109691
SAC
SAC
Reduced-round AES has been a popular underlying primitive to design new cryptographic schemes and thus its security including distinguishing properties deserves more attention. At Crypto’16, a key-dependent integral distinguisher on 5-round AES was
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::467fc307ee04f31c30ff0d84c2896ac1
https://doi.org/10.1007/978-3-030-10970-7_7
https://doi.org/10.1007/978-3-030-10970-7_7
Publikováno v:
Designs, Codes and Cryptography. 81:523-540
The multidimensional linear cryptanalysis and the multidimensional zero-correlation linear cryptanalysis have been widely used in the attacks on block ciphers. In the multidimensional linear cryptanalysis with $$\chi ^2$$ź2-method and the multidimen
Publikováno v:
Journal of International Students, Vol 8, Iss 1, Pp 194–214-194–214 (2018)
This study used a consensual qualitative research method to explore academic adaptation experiences of international students (N = 13) from East Asia countries at a U.S. university. The analysis yielded five domains from the data (challenges, feeling
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44f5176ad7e0610c555a27ca6abd6876
Publikováno v:
ADKDD@KDD
Online advertising auctions constitute an important source of revenue for search engines such as Google and Bing, as well as social networks such as Facebook, LinkedIn and Twitter. We study the problem of setting the optimal reserve price in a Genera
Publikováno v:
2017 36th Chinese Control Conference (CCC).
This paper studies the stability of event-triggered control systems subject to Denial-of-Service attacks. An improved method is provided to increase frequency and duration of the DoS attacks where closed-loop stability is not destroyed. A two-mode sw
Publikováno v:
Information Security and Privacy ISBN: 9783319600543
ACISP (1)
ACISP (1)
Advanced Encryption Standard (AES), published by NIST, is widely used in data encryption algorithms, hash functions, authentication encryption schemes and so on. Studying distinguishing attacks on (reduced round) AES can help designers and cryptanaly
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f525b8def6684b30c0649ed4557474e8
https://doi.org/10.1007/978-3-319-60055-0_21
https://doi.org/10.1007/978-3-319-60055-0_21