Showing
1 - 7
results of
7
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - 胡红钢
Search Results - 胡红钢
Showing
1 - 7
results of
7
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
基于椭圆曲线中配对的密码学研究综述
by
WANG, Bei
,
Hong-Gang, HU
,
王 辈
,
胡红钢
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
2
Loading…
利用K-Means LSH加速求解格中的最短向量问题
by
Yue-Qi, JIN
,
Hong-Gang, HU
,
金悦祺
,
胡红钢
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
3
Loading…
基于SincNet 的侧信道攻击
by
CHEN, Ping
,
WANG, Ping
,
Gao-Feng, DONG
,
Hong-Gang, HU
,
陈平
,
汪平
,
董高峰
,
胡红钢
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
4
Loading…
Bent函数构造方法研究
by
Xiao-Long, YANG
,
Hong-Gang, HU
,
杨小龙
,
胡红钢
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
5
Loading…
一种针对侧信道建模攻击中数据不平衡的新方法
by
WANG, Ping
,
Meng-Ce, ZHENG
,
Jie-Hui, NAN
,
Zhi-Min, LUO
,
Hong-Gang, HU
,
汪平
,
郑梦策
,
南杰慧
,
罗志敏
,
胡红钢
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
6
Loading…
分组密码结构抗Simon量子算法攻击研究
by
Yi-Yuan, LUO
,
Hai-Lun, YAN
,
WANG, Lei
,
Hong-Gang, HU
,
Xue-Jia, LAI
,
罗宜元
,
闫海伦
,
王磊
,
胡红钢
,
来学嘉
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
7
Loading…
针对真实RFID标签的侧信道攻击
by
Li, DAI
,
Gao-Feng, DONG
,
Hong-Gang, HU
,
YU Neng-Hai
,
戴立
,
董高峰
,
胡红钢
,
俞能海
Published in
Journal of Cryptologic Research
Get full text
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Full Text
7 results
7
Format
Articles
7 results
7
Journal Title
Journal Of Cryptologic Research
7 results
7
密码学报
7 results
7
Subjects
Algorithms
4 results
4
Cryptography
3 results
3
Machine Learning
3 results
3
Power Consumption
2 results
2
Power Management
2 results
2
Security
2 results
2
Artificial Neural Networks
1 results
1
Block Cipher Structure
1 results
1
Boolean
1 results
1
Boolean Bent Functions
1 results
1
Boolean Functions
1 results
1
Classification
1 results
1
Cluster Analysis
1 results
1
Clustering
1 results
1
Combinatorial Analysis
1 results
1
Computational Efficiency
1 results
1
Computing Time
1 results
1
Conditional Generative Adversarial Network
1 results
1
Curves
1 results
1
Data Augmentation
1 results
1
Year of Publication
From:
To:
Source
Publicly Available Content Database
7 results
7