an improved simple power attack against camellia s key schedule
LIU Shuanggen1;2;NI Haiying2;HU Yupu1;LIAO Yunyan2 1. Key Laboratory of Computer Network and Information Security of Ministry of Education;Xidian University;Xi’an 710071;Shaanxi;China; 2. College of Computer Information Engineering;Jiangxi Normal University;Nanchang 330022;Jiangxi;China
..............page:591-594
..............page:595-599
..............page:600-604
..............page:513-518
..............page:519-522
A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology
CHEN Lu1;ZHANG Huanguo1;2;ZHANG Liqiang1;LI Song1;CAI Liang3 1. School of Computer;Wuhan University/Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan 430072;Hubei;China; 2. State Key Laboratory of Software Engineering;Wuhan University;Wuhan 430072;Hubei;China; 3. Department of Information Security;Information Engineering University;Zhengzhou 450004;Henan;China
..............page:523-527
..............page:528-532
..............page:533-538
..............page:539-546
..............page:547-552
..............page:553-556
..............page:557-561
..............page:562-566
..............page:567-571
..............page:572-576
..............page:577-581
..............page:605-608
..............page:609-614
..............page:615-620
Attribute-Based Re-Encryption Scheme in the Standard Model
GUO Shanqing1;ZENG Yingpei2;WEI Juan1;XU Qiuliang1 1. School of Computer Science and Technology;Shandong University;Jinan 250101;Shandong;China; 2. State Key Laboratory of Novel Software Technology;Nanjing University;Nanjing 210093;Jiangsu;China
..............page:621-625
..............page:626-630
..............page:631-635
..............page:636-640
..............page:582-586
..............page:587-590