Search results for: Jiqiang Lu
TENCON 2017 - 2017 IEEE Region 10 Conference > 145 - 152
Lecture Notes in Computer Science > Information Security Practice and Experience > Block Ciphers and MACs > 222-232
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Block Ciphers > 279-293
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Symmetric Cryptography: Attacks > 17-31
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Internet Communications Security (WICS 2006) > 466-475
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side-Channel Attacks > 168-185
Lecture Notes in Computer Science > Information Security Applications > Side Channel Attacks > 178-192
Lecture Notes in Computer Science > Security and Cryptography for Networks > Block Ciphers Analysis > 95-110
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – I > 11-26
Lecture Notes in Computer Science > Information Security > Block Ciphers and Hash Functions > 85-100
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 306-318
Designs, Codes and Cryptography > 2015 > 77 > 1 > 11-48
Theoretical Computer Science > 2014 > 527 > Complete > 102-122
Information Processing Letters > 2014 > 114 > 3 > 116-123
Designs, Codes and Cryptography > 2011 > 60 > 2 > 123-143
International Journal of Information Security > 2009 > 8 > 1 > 1-11