电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
2331 WANG Shang-Ping, Bai Yue, Liu Li-Hua, Chen Juan-Juan
  Strong Designated Verifier Signature Scheme from Multivariate Public Key Cryptosystems
    JEIT   2014 Vol.36 (10): 2331-2335 [Abstract] (1138) [HTML 1 KB] [PDF 216 KB] (782)
2124 Yang Ming, Jin Chen-Hui, Zhang Guo-Shuang
  Evaluation and Application of the Upper Bound  Probability of the Truncated Differential
    JEIT   2014 Vol.36 (9): 2124-2130 [Abstract] (1164) [HTML 1 KB] [PDF 242 KB] (742)
1798 Li Yan-Jun, Wu Wen-Ling, Zheng Xiu-Lin
  Integral Property Analysis on the Structure of SP-GFS
    JEIT   2014 Vol.36 (8): 1798-1803 [Abstract] (1152) [HTML 1 KB] [PDF 287 KB] (719)
1656 Wang Zhong-Xiao, Qi Wen-Feng
  On the Uniqueness of Decomposition of a NFSR into a Cascade Connection of Smaller NFSRs
    JEIT   2014 Vol.36 (7): 1656-1660 [Abstract] (1280) [HTML 1 KB] [PDF 214 KB] (764)
1661 Shen Xuan, Li Rui-Lin, Li Chao, Zhao Guang-Yao
  Differential Analysis of the Nonlinear Functions of SHACAL-2 Algorithm and the Application
    JEIT   2014 Vol.36 (7): 1661-1666 [Abstract] (1193) [HTML 1 KB] [PDF 264 KB] (775)
1667 Zhang Zhao, Wang Hong, Ma Zhi
  Private Database Queries With a Quantum Third Party
    JEIT   2014 Vol.36 (7): 1667-1672 [Abstract] (855) [HTML 1 KB] [PDF 205 KB] (972)
1423 Fu Xiang-Qun, Bao Wan-Su, Shi Jian-Hong, Li Fa-Da
  Public-key Cryptograph Based on the Multi-discrete Logarithm Problem
    JEIT   2014 Vol.36 (6): 1423-1427 [Abstract] (1305) [HTML 1 KB] [PDF 222 KB] (1174)
1520 Luo Wei, Guo Jian-Sheng
  Related-key Rectangle Attack on Eagle-128 Algorithm
    JEIT   2014 Vol.36 (6): 1520-1524 [Abstract] (1113) [HTML 1 KB] [PDF 309 KB] (988)
1215 Xie Zuo-Min, Chen Shao-Zhen, Lu Lin-Zhen
  Impossible Differential Cryptanalysis of 11-Round 3D Cipher
    JEIT   2014 Vol.36 (5): 1215-1220 [Abstract] (1262) [HTML 1 KB] [PDF 357 KB] (762)
828 Guo Rui, Jin Chen-Hui
  On the Pseudorandomness of the Lai-Massey Scheme
    JEIT   2014 Vol.36 (4): 828-833 [Abstract] (1366) [HTML 1 KB] [PDF 232 KB] (868)
650 Li Rui-Fang, Ke Pin-Hui
  The Linear Complexity of a New Class of Generalized Cyclotomic Sequence with Period
    JEIT   2014 Vol.36 (3): 650-654 [Abstract] (1298) [HTML 1 KB] [PDF 191 KB] (722)
74 Liu Guo-Qiang, Jin Chen-Hui
  Investigation on Construction and Differential Property of a Class of Dynamic S-box
    JEIT   2014 Vol.36 (1): 74-81 [Abstract] (1503) [HTML 1 KB] [PDF 260 KB] (1110)
82 Yao Dan-Dan, Zhang Xiao, Wang Zhao, Yao Wang, Qiu Wang-Jie, Zheng Zhi-Ming
  Analysis and Improvement of the Components of SNOW 2.0 Based on Statistical Tests
    JEIT   2014 Vol.36 (1): 82-87 [Abstract] (1350) [HTML 1 KB] [PDF 248 KB] (1176)
88 Li Zhi-Jun, Zeng Yi-Cheng
  A Memristor Chaotic Circuit Based on Wien-bridge Oscillator
    JEIT   2014 Vol.36 (1): 88-93 [Abstract] (1303) [HTML 1 KB] [PDF 412 KB] (1481)
2602 Yue Zhao, Gao Jun-Tao, Xie Jia
  Autocorrelation of the Two-prime Sidel’nikov Sequence
    JEIT   2013 Vol.35 (11): 2602-2607 [Abstract] (1285) [HTML 1 KB] [PDF 252 KB] (916)
2301 Xie Zuo-Min, Chen Shao-Zhen
  Impossible Differential Cryptanalysis of 7-Round ARIR-192
    JEIT   2013 Vol.35 (10): 2301-2306 [Abstract] (1882) [HTML 1 KB] [PDF 270 KB] (917)
2532 Zhang Shao-Wu, Zheng Lei
  Walsh Distribution of Multiplied by Constant Operation on Modulo 2n
    JEIT   2013 Vol.35 (10): 2532-2535 [Abstract] (1503) [HTML 1 KB] [PDF 206 KB] (1248)
2536 Fu Li-Shi, Jin Chen-Hui
  The Cryptographic Weakness of Lai-Massey Scheme with an  Affine but not Orthomorphic Bijection σ
    JEIT   2013 Vol.35 (10): 2536-2540 [Abstract] (1677) [HTML 1 KB] [PDF 317 KB] (885)
1940 Liu Xiang-Hui, Han Wen-Bao, Quan Jian-Xiao
  A New Lattice Reduction Algorithm Based on Genetic Strategy
    JEIT   2013 Vol.35 (8): 1940-1945 [Abstract] (2024) [HTML 1 KB] [PDF 251 KB] (1370)
1946 Zhong Zhou, Jin Liang, Huang Kai-Zhi, Bai Hui-Qing, Yi Ming
  Decoding Algorithm for Reducing Security Gap of LDPC Codes Based on Two-dimensional Information Correction
    JEIT   2013 Vol.35 (8): 1946-1951 [Abstract] (1430) [HTML 1 KB] [PDF 262 KB] (1035)
1365 Niu Zhi-Hua, Ye Fei, Xin Ming-Jun, Wang Chao
  The Research and Analysis of the Excellent 2n Periodic Binary Sequence Based on Cat Swarm Optimization
    JEIT   2013 Vol.35 (6): 1365-1370 [Abstract] (1984) [HTML 1 KB] [PDF 242 KB] (1599)
1371 Dong Jun, Zhang Guang-Jun, Yao Hong, Wang Jue
  Function Projective Synchronization and Parameter Identification of  Different Fractional-order Hyper-chaotic Systems
    JEIT   2013 Vol.35 (6): 1371-1375 [Abstract] (1794) [HTML 1 KB] [PDF 256 KB] (942)
1376 Ye Mao, Hu Xue-Xian, Liu Wen-Fen
  Password Authenticated Key Exchange Protocol in the Three Party Setting Based on Lattices
    JEIT   2013 Vol.35 (6): 1376-1381 [Abstract] (1631) [HTML 1 KB] [PDF 237 KB] (1284)
1516 Guo Jian-Sheng, Luo Wei, Zhang Lei, Guo Yuan-Bo
  Impossible Differential Cryptanalysis of LBlock Code
    JEIT   2013 Vol.35 (6): 1516-1519 [Abstract] (1609) [HTML 1 KB] [PDF 181 KB] (1294)
303 Xu Xin-Long, Han Wen-Bao
  A Single Key Attack on Reduced-round KASUMI-based f9 Algorithm
    JEIT   2013 Vol.35 (2): 303-309 [Abstract] (1432) [HTML 1 KB] [PDF 311 KB] (802)
2881 Ke Pin-Hui, Li Rui-Fang, Zhang Sheng-Yuan
  Analysis of the Linear Complexity and the Autocorrelation of a Class of d-ary Generalized Cyclotomic Sequence
    JEIT   2012 Vol.34 (12): 2881-2884 [Abstract] (1636) [HTML 1 KB] [PDF 198 KB] (788)
2353 Yi Yun-Hui, Zhu Chang-Hua, Pei Chang-Xing, Quan Dong-Xiao
  Quantum Private Information Retrieval Based on Polarization Rotation
    JEIT   2012 Vol.34 (10): 2353-2357 [Abstract] (1690) [HTML 1 KB] [PDF 253 KB] (779)
2358 Xiong Xiao-Wen, Wei Ai-Guo, Zhang Zhi-Jun
  Construction of Rotation Symmetric Boolean Functions with Good Cryptographic Properties
    JEIT   2012 Vol.34 (10): 2358-2362 [Abstract] (1614) [HTML 1 KB] [PDF 199 KB] (4949)
2156 Xue Shuai, Qi Wen-Feng
  Research on the Best Linear Approximation of Addition Modulo 2n
    JEIT   2012 Vol.34 (9): 2156-2160 [Abstract] (1572) [HTML 1 KB] [PDF 197 KB] (808)
2161 Zhan Ying-Jie, Guan Jie, Ding Lin, Zhang Zhong-Ya
  Related-key Impossible Differential Attack on Reduced Round LBlock
    JEIT   2012 Vol.34 (9): 2161-2166 [Abstract] (2023) [HTML 1 KB] [PDF 207 KB] (916)
First page | Prev page | Next page | Last pagePage 2 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech