122 results on '"Shi, Danping"'
Search Results
2. The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher
3. Diving Deep into the Preimage Security of AES-Like Hashing
4. Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra
5. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
6. The impact of long-term aspirin use on the patients undergoing shoulder arthroplasty
7. A retrospective analysis of the incidence of postoperative delirium and the importance of database selection for its definition
8. Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY
9. Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY
10. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
11. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
12. Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
13. Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
14. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging
15. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters
16. Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
17. Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
18. Security analysis of Subterranean 2.0
19. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full
20. Ferroic properties of Fe-doped and Cu-doped K0.45Na0.49Li0.06NbO3 ceramics
21. Higher expression of cation transport regulator-like protein 1 (CHAC1) predicts of poor outcomes in uveal melanoma (UM) patients
22. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints
23. New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions
24. Convolutional Neural Network Based Side-Channel Attacks with Customized Filters
25. Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
26. Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging
27. Improved Linear Cryptanalysis of Block Cipher BORON.
28. Automatic Demirci–Selçuk Meet-In-The-Middle Attack On SIMON.
29. Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full $$\mathsf {MORUS}$$
30. Error-Tolerant Algebraic Side-Channel Attacks Using BEE
31. Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers
32. Improved Linear Cryptanalysis of Block Cipher BORON
33. New Properties of the Double Boomerang Connectivity Table
34. Automatic Demirci–Selçuk Meet-In-The-Middle Attack On SIMON
35. Temperature dependent of thermal expansion and ferroelectric properties for BiAlO3-modified BaTiO3 lead-free ceramics
36. Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
37. Na0.5K0.5NbO3 and 0.9Na0.5K0.5NbO3–0.1Bi0.5Na0.5TiO3 nanocrystalline powders synthesized by low-temperature solid-state reaction
38. Giant dielectric permittivity and non-linear electrical behavior in CaCu3Ti4O12 varistors from the molten-salt synthesized powder
39. Polaron relaxation and non-ohmic behavior in CaCu3Ti4O12 ceramics with different cooling methods
40. Incidence and risk factors associated with hospital-acquired pressure ulcers following total hip arthroplasty: A retrospective nationwide inpatient sample database study
41. Oxygen vacancy-related dielectric relaxation and electrical conductivity in La-doped Ba(Zr0.9Ti0.1)O3 ceramics
42. Dielectric Properties and Defect Chemistry of WO3-Doped K0.5Na0.5NbO3 Ceramics
43. High-temperature impedance spectroscopy of BaFe0.5Nb0.5O3 ceramics doped with Bi0.5Na0.5TiO3
44. Error-Tolerant Algebraic Side-Channel Attacks Using BEE
45. Incidence and Risk Factors of Hospital-Acquired Pressure Ulcers Following Total Hip Arthroplasty: A Retrospective Nationwide Inpatient Sample Database Study
46. Dielectric and non-Ohmic properties of CaCu3Ti4O12 ceramics modified with NiO, SnO2, SiO2, and Al2O3 additives
47. Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
48. On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
49. Lightweight Iterative MDS Matrices: How Small Can We Go?
50. On the Complexity of Impossible Differential Cryptanalysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.