Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lei Zhang 0012
@article{DBLP:journals/iet-ifs/LiWZZ19, author = {Lingchen Li and Wenling Wu and Lei Zhang and Yafei Zheng}, title = {New method to describe the differential distribution table for large S-boxes in {MILP} and its application}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {5}, pages = {479--485}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5284}, doi = {10.1049/IET-IFS.2018.5284}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiWZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWZ019, author = {Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang}, title = {The Relationship between the Construction and Solution of the {MILP} Models and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2019}, url = {https://eprint.iacr.org/2019/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangW17, author = {Lei Zhang and Wenling Wu}, title = {Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {3}, pages = {121--128}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2015.0433}, doi = {10.1049/IET-IFS.2015.0433}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWZ17a, author = {Lingchen Li and Wenling Wu and Lei Zhang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Improved Automatic Search Tool for Bit-Oriented Block Ciphers and Its Applications}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {502--508}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_43}, doi = {10.1007/978-3-319-89500-0\_43}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiWZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WuZY15, author = {Wenling Wu and Lei Zhang and Xiaoli Yu}, title = {The DBlock family of block ciphers}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {3}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1007/s11432-014-5219-0}, doi = {10.1007/S11432-014-5219-0}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WuZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SoleimanyBYWNZZ15, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {718--744}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9175-4}, doi = {10.1007/S00145-013-9175-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SoleimanyBYWNZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/0012W14, author = {Lei Zhang and Wenling Wu}, title = {Differential analysis of the Extended Generalized Feistel Networks}, journal = {Inf. Process. Lett.}, volume = {114}, number = {12}, pages = {723--727}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.07.001}, doi = {10.1016/J.IPL.2014.07.001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/0012W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuWZZD13, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {LHash: {A} Lightweight Hash Function}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {291--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_19}, doi = {10.1007/978-3-319-12087-4\_19}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuWZZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, editor = {Shiho Moriai}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {71--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_5}, doi = {10.1007/978-3-662-43933-3\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LinWW013, author = {Li Lin and Wenling Wu and Yanfeng Wang and Lei Zhang}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {203--223}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_13}, doi = {10.1007/978-3-319-12160-4\_13}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LinWW013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWZZD13, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, title = {LHash: {A} Lightweight Hash Function (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2013}, url = {http://eprint.iacr.org/2013/867}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuWZZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangWYZ12, author = {Yanfeng Wang and Wenling Wu and Xiaoli Yu and Lei Zhang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Security on LBlock against Biclique Cryptanalysis}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_1}, doi = {10.1007/978-3-642-35416-8\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangWZW11, author = {Liting Zhang and Wenling Wu and Lei Zhang and Peng Wang}, title = {{CBCR:} {CBC} {MAC} with rotating transformations}, journal = {Sci. China Inf. Sci.}, volume = {54}, number = {11}, pages = {2247--2255}, year = {2011}, url = {https://doi.org/10.1007/s11432-011-4289-5}, doi = {10.1007/S11432-011-4289-5}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangWZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WuZ11, author = {Wenling Wu and Lei Zhang}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {LBlock: {A} Lightweight Block Cipher}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {327--344}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_19}, doi = {10.1007/978-3-642-21554-4\_19}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/WuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YuWLZ11, author = {Xiaoli Yu and Wenling Wu and Yanjun Li and Lei Zhang}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Cryptanalysis of Reduced-Round {KLEIN} Block Cipher}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {237--250}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_18}, doi = {10.1007/978-3-642-34704-7\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YuWLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiWZ11, author = {Yanjun Li and Wenling Wu and Lei Zhang}, editor = {Souhwan Jung and Moti Yung}, title = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {28--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_3}, doi = {10.1007/978-3-642-27890-7\_3}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wu011, author = {Wenling Wu and Lei Zhang}, title = {LBlock: {A} Lightweight Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2011}, url = {http://eprint.iacr.org/2011/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wu011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangWWZWL10, author = {Liting Zhang and Wenling Wu and Peng Wang and Lei Zhang and Shuang Wu and Bo Liang}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: {PGV} Model Revisited}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {250--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_14}, doi = {10.1007/978-3-642-13858-4\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiWZ10, author = {Yanjun Li and Wenling Wu and Lei Zhang}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {Integral Attacks on Reduced-Round {ARIA} Block Cipher}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {19--29}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_2}, doi = {10.1007/978-3-642-12827-1\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Yongwha Chung and Moti Yung}, title = {Full-Round Differential Attack on {TWIS} Block Cipher}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {234--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_17}, doi = {10.1007/978-3-642-17955-6\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, title = {Some Observations on {TWIS} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2010}, url = {http://eprint.iacr.org/2010/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangWZL09, author = {Liting Zhang and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {A note on Cook's elastic block cipher}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {380--383}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533110}, doi = {10.1145/1533057.1533110}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangWZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWZ09, author = {Lei Zhang and Wenling Wu and Liting Zhang}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Proposition of Two Cipher Structures}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {215--229}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_16}, doi = {10.1007/978-3-642-16342-5\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuZZZ09, author = {Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block Cipher}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {17--31}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_4}, doi = {10.1007/978-3-642-11145-7\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WuZZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZZZ09, author = {Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang}, title = {Security Analysis of the {GF-NLFSR} Structure and Four-Cell Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2009}, url = {http://eprint.iacr.org/2009/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangZW08, author = {Lei Zhang and Wentao Zhang and Wenling Wu}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {216--229}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_16}, doi = {10.1007/978-3-540-70500-0\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangWPKY08, author = {Lei Zhang and Wenling Wu and Je Hong Park and Bonwook Koo and Yongjin Yeom}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Improved Impossible Differential Attacks on Large-Block Rijndael}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {298--315}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_21}, doi = {10.1007/978-3-540-85886-7\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangWPKY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuZZ08, author = {Wenling Wu and Lei Zhang and Wentao Zhang}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {442--456}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_29}, doi = {10.1007/978-3-642-04159-4\_29}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WuZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangZWF07, author = {Wentao Zhang and Lei Zhang and Wenling Wu and Dengguo Feng}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Related-Key Differential-Linear Attacks on Reduced {AES-192}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {73--85}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_7}, doi = {10.1007/978-3-540-77026-8\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangZWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangWZF06, author = {Wentao Zhang and Wenling Wu and Lei Zhang and Dengguo Feng}, editor = {Eli Biham and Amr M. Youssef}, title = {Improved Related-Key Impossible Differential Attacks on Reduced-Round {AES-192}}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {15--27}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_2}, doi = {10.1007/978-3-540-74462-7\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangWZF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.