Search

Your search keyword '"Shi, Danping"' showing total 122 results

Search Constraints

Start Over You searched for: Author "Shi, Danping" Remove constraint Author: "Shi, Danping"
122 results on '"Shi, Danping"'

Search Results

3. Diving Deep into the Preimage Security of AES-Like Hashing

8. Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY

10. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery

12. Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

13. Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories

14. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging

15. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters

19. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full

20. Ferroic properties of Fe-doped and Cu-doped K0.45Na0.49Li0.06NbO3 ceramics

22. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints

23. New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions

27. Improved Linear Cryptanalysis of Block Cipher BORON.

28. Automatic Demirci–Selçuk Meet-In-The-Middle Attack On SIMON.

30. Error-Tolerant Algebraic Side-Channel Attacks Using BEE

31. Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers

Catalog

Books, media, physical & digital resources