咨询与建议

限定检索结果

文献类型

  • 25 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 7 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 9 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 5 篇 cryptography
  • 4 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 security
  • 3 篇 hardware
  • 2 篇 conferences
  • 2 篇 parallel process...
  • 2 篇 computer archite...
  • 2 篇 smart contract
  • 2 篇 semantics
  • 2 篇 software
  • 2 篇 polynomials
  • 2 篇 explosions
  • 2 篇 single cycle t-f...
  • 1 篇 internet of thin...
  • 1 篇 covid-19
  • 1 篇 few
  • 1 篇 tools
  • 1 篇 algebraic method
  • 1 篇 reliability

机构

  • 11 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 school of scienc...
  • 4 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 department of ma...
  • 3 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 huawei
  • 2 篇 institute of mic...
  • 2 篇 data security go...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 international op...
  • 2 篇 college of infor...
  • 2 篇 department of ph...

作者

  • 4 篇 wang yan
  • 3 篇 guan xianglong
  • 3 篇 zhang zhifei
  • 3 篇 chen cui
  • 3 篇 hu yu-pu
  • 3 篇 huang yunyou
  • 3 篇 xiaowei li
  • 3 篇 miao xiuxia
  • 3 篇 ma li
  • 2 篇 jing zhang
  • 2 篇 yuan feng
  • 2 篇 hui yu
  • 2 篇 jing ye
  • 2 篇 yang yang
  • 2 篇 xiaochun ye
  • 2 篇 tang suqin
  • 2 篇 dongrui fan
  • 2 篇 simha sethumadha...
  • 2 篇 weizhi xu
  • 2 篇 da wang

语言

  • 42 篇 英文
  • 2 篇 中文
检索条件"机构=Computer Architecture and Security Technology Laboratory"
44 条 记 录,以下是31-40 订阅
排序:
pbSE: Phase-Based Symbolic Execution
pbSE: Phase-Based Symbolic Execution
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Qixue Xiao Yu Chen Chengang Wu Kang Li Junjie Mao Shize Guo Yuanchun Shi Dept. of Computer Science and Technology Tsinghua University Beijing China Tsinghua University Beijing Beijing CN State Key Laboratory of Computer Architecture Chinese Academy of Sciences Beijing China Dept. of compute Science University of Georgia Georgia USA School of CyberSpace Security Beijing University of Posts and Telecommunications Beijing China
The study of software bugs has long been a key area in software security. Dynamic symbolic execution, in exploring the program's execution paths, finds bugs by analyzing all potential dangerous operations. Due to ... 详细信息
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. Image R. 25(7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 27卷 57-57页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Side-channel vulnerability factor: A metric for measuring information leakage  12
Side-channel vulnerability factor: A metric for measuring in...
收藏 引用
Annual International Symposium on computer architecture, ISCA
作者: John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Laboratory Department of Computer Science Columbia University New York NY USA
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. However there is currently no systematic, ho... 详细信息
来源: 评论
Linear complexity of sequences produced by single cycle T-function
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第4期18卷 123-128页
作者: WANG Yan HU Yu-pu LI Shun-bo YANG Yang Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on ... 详细信息
来源: 评论
Autocorrelation of Sequences Generated by Single Cycle T-Functions
收藏 引用
China Communications 2011年 第5期8卷 144-150页
作者: 王艳 胡予濮 李顺波 杨旸 Ministry of Education Key Laboratory of Computer Networds and Information Security Xidian University Department of Mathematics Xi'an University of Architecture and Technology
Cryptographic properties of the single cycle T-function's output sequences are *** of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated *** Maximum Sidelob... 详细信息
来源: 评论
Silencing Hardware Backdoors
Silencing Hardware Backdoors
收藏 引用
IEEE Symposium on security and Privacy
作者: Adam Waksman Simha Sethumadhavan Computer Architecture and Security Technology Laboratory Department of Computer Science Columbia University New York USA
Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP ... 详细信息
来源: 评论
On the nonlinearity of some T-functions
收藏 引用
Journal of Information and Computational Science 2011年 第11期8卷 2231-2237页
作者: Wang, Yan Hu, Yupu Li, Shunbo Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Single cycle T-functions are newly proposed components in stream cipher. In order to verify if such function is suitable for cipher design, the cryptographic properties of single cycle T-function are discussed. Nonlin... 详细信息
来源: 评论
Cryptanalysis of dragon scheme
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 80-87页
作者: YUAN Feng HU Yu-pu WANG Yan OU Hai-wen Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China Key Laboratory of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ... 详细信息
来源: 评论
security analysis of projected C*- scheme
Security analysis of projected C*- scheme
收藏 引用
International Conference on Multimedia Information Networking and security
作者: Yuan, Feng Hu, Yupu Wang, Yan Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakne... 详细信息
来源: 评论