电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
1985 WANG Hong, LI Jianhua, LAI Chengzhe
  Identity Based Dynamic Key Management of Airborne Ad Hoc Network
    JEIT   2018 Vol.40 (8): 1985-1991 [Abstract] (167) [HTML 1 KB] [PDF 863 KB] (673)
1723 NIU Zhihua, KONG Deyu
  Algorithm for Computing the k-error Linear Complexity and the Corresponding Error Sequence of 2pn-periodic Sequences over GF(q)
    JEIT   2018 Vol.40 (7): 1723-1730 [Abstract] (71) [HTML 1 KB] [PDF 223 KB] (278)
1
 
    JEIT   0 Vol. (): 1- [Abstract] (29) [HTML 1 KB] [PDF 890 KB] (2)
1066 SONG Huawei, JIN Liang, ZHANG Shengjun
  Physical Layer Authentication Based on Tag Signal
    JEIT   2018 Vol.40 (5): 1066-1071 [Abstract] (92) [HTML 1 KB] [PDF 439 KB] (332)
430 LI Junzhi, GUAN Jie
  A Method of Constructing Impossible Differential Distinguishers Based on Completeness
    JEIT   2018 Vol.40 (2): 430-437 [Abstract] (123) [HTML 1 KB] [PDF 256 KB] (387)
35 Zhang Meng, Xu Maozhi, Hu Zhi, Hou Ying
  On Parameterized Families of Elliptic Curves with Low Embedding Degrees
    JEIT   2018 Vol.40 (1): 35-41 [Abstract] (124) [HTML 1 KB] [PDF 251 KB] (299)
42 MA Shang, LIU Jianfeng, YANG Zeguo, ZHANG Yan, HU Jianhao
  A Method of Generating High Speed and Long Period Pseudo-random Sequence Based on Residue
    JEIT   2018 Vol.40 (1): 42-49 [Abstract] (142) [HTML 1 KB] [PDF 277 KB] (340)
50 XIAO Shuaifang,GUO Yunfei, BAI Huiqing, JIN Liang, HUANG Kaizhi
  Relay Cooperative Secret Key Generation for Quasi-static Channels in Internet of Things
    JEIT   2018 Vol.40 (1): 50-56 [Abstract] (131) [HTML 1 KB] [PDF 501 KB] (499)
57 SHI Quan, HAN Saifei,HUANG Xinming,SUN Ling, XIE Xing, TANG Tianze
  Design of Finite Field FFT for Fully Homomorphic Encryption Based on FPGA
    JEIT   2018 Vol.40 (1): 57-62 [Abstract] (164) [HTML 1 KB] [PDF 2652 KB] (723)
2587 BAI Huiqing, JIN Liang, XIAO Shuaifang, YI Ming*
  Polar Code for Physical Layer Security in Multi-antenna Systems
    JEIT   2017 Vol.39 (11): 2587-2593 [Abstract] (182) [HTML 1 KB] [PDF 326 KB] (565)
2479 XU Hong, SU Penghui, QI Wenfeng
  Impossible Differential Cryptanalysis of Reduced-round SPECK
    JEIT   2017 Vol.39 (10): 2479-2486 [Abstract] (178) [HTML 1 KB] [PDF 334 KB] (510)
1704 GUAN Jie, SHI Tairong, LI Junzhi, ZHANG Pei
  Analysis of MORUS Against Collision Attack
    JEIT   2017 Vol.39 (7): 1704-1710 [Abstract] (190) [HTML 1 KB] [PDF 239 KB] (548)
1219 ZHANG Gang, MENG Wei, ZHANG Tianqi
  Multiuser Communication Scheme Based on Segment Shift Differential Chaos Shift Keying
    JEIT   2017 Vol.39 (5): 1219-1225 [Abstract] (120) [HTML 1 KB] [PDF 303 KB] (473)
1226 DAI Zibin, WANG Zhouchuang, LI Wei, LI Jiamin, Nan Longmei
  Hardware Implementation and Utilization Model Research for Reconfigurable Non-linear Boolean Function
    JEIT   2017 Vol.39 (5): 1226-1232 [Abstract] (175) [HTML 1 KB] [PDF 665 KB] (486)
575 ZANG Hongyan, HUANG Huifang
  Research on Algorithm of Generating S-box Based on Uniform Chaotic System
    JEIT   2017 Vol.39 (3): 575-581 [Abstract] (176) [HTML 1 KB] [PDF 401 KB] (581)
2612 WANG Xu, JIN Liang, SONG Huawei, HUANG Kaizhi
  Physical Layer Secret Key Capacity Based on Wireless Channel Parameters
    JEIT   2016 Vol.38 (10): 2612-2618 [Abstract] (302) [HTML 1 KB] [PDF 1381 KB] (523)
1928 DONG Le, ZOU Jian, WU Wenling, DU Jiao
  Rebound Attack on the Feistel-SPS Structure
    JEIT   2016 Vol.38 (8): 1928-1934 [Abstract] (275) [HTML 1 KB] [PDF 414 KB] (605)
1406 WANG Shangping, YU Xiaojuan, ZHANG Yaling
  Revocable Key-policy Attribute-based Encryption Scheme with Two Revocation Lists
    JEIT   2016 Vol.38 (6): 1406-1411 [Abstract] (226) [HTML 1 KB] [PDF 251 KB] (705)
1158 HAN Dandan, MIN Lequan, ZHAO Geng
  Application of 8-dimensional Generalized Synchronization System in Pseudorandom Number Generator
    JEIT   2016 Vol.38 (5): 1158-1165 [Abstract] (244) [HTML 1 KB] [PDF 1295 KB] (536)
841 WANG Dong, LI Yongcheng, BAI Bo, WANG Manxi
  Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks
    JEIT   2016 Vol.38 (4): 841-847 [Abstract] (287) [HTML 1 KB] [PDF 369 KB] (922)
848 FU Lishi, JIN Chenhui
  Impossible Differential Cryptanalysis on 13-round MIBS-80
    JEIT   2016 Vol.38 (4): 848-855 [Abstract] (264) [HTML 1 KB] [PDF 269 KB] (571)
735 YU Simin, Lü Jinhu, LI Chengqing
  Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications
    JEIT   2016 Vol.38 (3): 735-752 [Abstract] (614) [HTML 1 KB] [PDF 11486 KB] (2708)
303 KE Pinhui, YE Zhifan, CHANG Zuling
  Autocorrelation Distribution of Binary Generalized Legendre-Sidelnikov Sequences
    JEIT   2016 Vol.38 (2): 303-309 [Abstract] (234) [HTML 1 KB] [PDF 229 KB] (464)
135 LI Yunqiang, ZHANG Xiaoyong, WANG Ailan
  Distribution Characteristics of the AES-128 Biclique Structure
    JEIT   2016 Vol.38 (1): 135-140 [Abstract] (325) [HTML 1 KB] [PDF 6540 KB] (1116)
2845 Guo Jian-sheng, Cui Jing-yi, Luo Wei, Liu Yi-peng
  Related-key Rectangle Attack on MD-64
    JEIT   2015 Vol.37 (12): 2845-2851 [Abstract] (294) [HTML 1 KB] [PDF 315 KB] (556)
2691 张习勇, 祁应红, 高光普, 李玉娟
  A New Method for Evaluation of Hamming Weight and Nonlinearity of Rotation-symmetric Boolean Functions
    JEIT   2015 Vol.37 (11): 2691-2696 [Abstract] (318) [HTML 1 KB] [PDF 238 KB] (717)
2490 Du Xiao-ni, Wang Guo-hui, Wei Wan-yin
  Linear Complexity of Binary Generalized Cyclotomic Sequences of Order Four with Period 2p2
    JEIT   2015 Vol.37 (10): 2490-2494 [Abstract] (285) [HTML 1 KB] [PDF 184 KB] (584)
1971 Yan Ying-jian, Yang Chang-sheng, Li Wei, Zhang Li-chao
  Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher
    JEIT   2015 Vol.37 (8): 1971-1977 [Abstract] (511) [HTML 1 KB] [PDF 394 KB] (1080)
417 Guo Rui, Jin Chen-Hui
  Integral Cryptanalysis of Reduced Round FOX64
    JEIT   2015 Vol.37 (2): 417-422 [Abstract] (379) [HTML 1 KB] [PDF 239 KB] (512)
2744 Ma Hong-Yang, Wang Shu-Mei, Fan Xing-Kui
  A Robust Security Communication Protocol for Wireless Network Based on Quantum Teleportation
    JEIT   2014 Vol.36 (11): 2744-2749 [Abstract] (1051) [HTML 1 KB] [PDF 303 KB] (906)
First page | Prev page | Next page | Last pagePage 1 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech