6,831 to 6,840 of 7,954 Results
Oct 1, 2020 -
COVID-19 Statistics in China
Markdown Text - 6.3 KB -
MD5: 85dbd5683945bb500a2eadf29e40ce59
|
Oct 1, 2020 -
COVID-19 Statistics in China
PNG Image - 16.9 KB -
MD5: 37b7a14d84dc165248c70aa1bb238a6e
|
Sep 9, 2020 - HE Huajun
He, Huajun; Sum, Tze Chien, 2020, "Replication Data for: Halide Perovskite Nanocrystals for Multiphoton Applications", https://doi.org/10.21979/N9/OOTXQG, DR-NTU (Data), V1
Halide perovskite nanocrystals (NCs) are a unique class of NCs with novel properties distinct from traditional semiconductor NCs. These exceptional properties of defect tolerance, large absorption coefficients, high brightness, and narrow emission linewidths stem from their atypi... |
RAR Archive - 1.9 MB -
MD5: 2a48beff9e42e091a6896fb7d20f1bb3
|
Aug 2, 2020 - Wang Haoyang
Thomas Peyrin; Haoyang Wang, 2020, "Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers", https://doi.org/10.21979/N9/X0P4YG, DR-NTU (Data), V1
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers. In this work, we propose the MALICIOUS f... |
Aug 2, 2020 -
Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Python Source Code - 7.7 KB -
MD5: 7dade11177a0dc6971f98f3acbe76d31
|
Aug 2, 2020 -
Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Markdown Text - 492 B -
MD5: bb0ce85ce5d10cdcecdc298b87a96bcc
|
Aug 2, 2020 -
Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Python Source Code - 4.7 KB -
MD5: 80400590c7f34863437c54385066c8ee
|
Aug 2, 2020 - Wang Haoyang
Zhenzhen Bao; Ling Ding; Jian Guo; Haoyang Wang; Wenying Zhang, 2020, "Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes", https://doi.org/10.21979/N9/JYECIO, DR-NTU (Data), V1
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 roun... |
Aug 2, 2020 -
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Plain Text - 1.9 MB -
MD5: 8b15a424c205e15866b10be52306478a
|
