电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
2259 Hai Xin, Tang Xue-Hai, Li Chao
  The Meet-in-the-middle Attacks on Zodiac
    JEIT   2012 Vol.34 (9): 2259-2262 [Abstract] (1709) [HTML 1 KB] [PDF 205 KB] (941)
2273 Gao Guang-Pu, Liu Wen-Fen
  The Notes on the Linear Structures of Rotation Symmetric Boolean Functions
    JEIT   2012 Vol.34 (9): 2273-2276 [Abstract] (1530) [HTML 1 KB] [PDF 186 KB] (821)
1911 Li Lei, Han Wen-Bao, Wang Zheng
  The Research of Parameters Selection on the Model of Time-memory-data Trade-off Attack to A5/1
    JEIT   2012 Vol.34 (8): 1911-1916 [Abstract] (1535) [HTML 1 KB] [PDF 224 KB] (627)
1917 Li Kai, Huang Xiao-Ying, Teng Ji-Hong, Li Zhen-Hua
  A Quantum Secure Direct Communication Scheme Based on Einstein-Podolsky-Rosen (EPR) Sequence
    JEIT   2012 Vol.34 (8): 1917-1922 [Abstract] (1563) [HTML 1 KB] [PDF 224 KB] (1057)
1923 Zhou Jian-Qin, Liu Jun
  On the 3 error Sequence Distribution of 2n-periodic Binary Sequences
    JEIT   2012 Vol.34 (8): 1923-1927 [Abstract] (1407) [HTML 1 KB] [PDF 201 KB] (692)
802 You Wei, Qi Wen-Feng
  Construction of Several Classes of Single-cycle Polynomials over Z/(pn)
    JEIT   2012 Vol.34 (4): 802-806 [Abstract] (1586) [HTML 1 KB] [PDF 224 KB] (821)
807 Li Shun-Bo, Hu Yu-Pu, Wang Yan
  Distinguishing Attack on Stream Cipher HC-256′
    JEIT   2012 Vol.34 (4): 807-811 [Abstract] (1526) [HTML 1 KB] [PDF 225 KB] (1074)
694 Su Chong-Mao, Wei Yong-Zhuang, Ma Chun-Bo
  Meet-in-the-middle Attack on 10-round Reduced 3D Block Cipher
    JEIT   2012 Vol.34 (3): 694-697 [Abstract] (2128) [HTML 1 KB] [PDF 220 KB] (987)
758 Hu Da-Liang, Zeng Guang, Han Wen-Bao, Tan Gang-Min
  An Interval Vector Based Research on the Primitive σ-LFSR Sequences
    JEIT   2012 Vol.34 (3): 758-762 [Abstract] (1548) [HTML 1 KB] [PDF 237 KB] (644)
446 Yang Xian-Wen, Li Zheng
  New Seven-element Joint Sparse Form for Pairs of Integers and Its Applications
    JEIT   2012 Vol.34 (2): 446-450 [Abstract] (1615) [HTML 1 KB] [PDF 241 KB] (824)
227 Cui Ting, Jin Chen-Hui
  Construction of Zero-correlation Linear Hull for CLEFIA-like Structure with SPN Round Functions
    JEIT   2012 Vol.34 (1): 227-230 [Abstract] (2185) [HTML 1 KB] [PDF 203 KB] (739)
2929 Sun Jin, Hu Yu-Pu
  Identity-based Broadcast Encryption Scheme Against Selective Opening Attack
    JEIT   2011 Vol.33 (12): 2929-2934 [Abstract] (1732) [HTML 1 KB] [PDF 266 KB] (763)
2588 Zheng Lei, Zhang Shao-Wu, Zhang Zhong-Ya
  Differential Characteristic Probability of Multiplied by Constant Operation on Modulo 2n
    JEIT   2011 Vol.33 (11): 2588-2593 [Abstract] (2292) [HTML 1 KB] [PDF 252 KB] (772)
2328 Luo Xiao-Jian, Hu Bin, Hao Shan-Shan, Zhang Chong
  The Stability of Output Sequences of Single Cycle T-function
    JEIT   2011 Vol.33 (10): 2328-2333 [Abstract] (2052) [HTML 1 KB] [PDF 252 KB] (610)
1908 Zhang Xuan, Wen Qiao-Yan, Qin Jing
  Constructions of Binary Sequences with Almost Optimal Autocorrelation Magnitude
    JEIT   2011 Vol.33 (8): 1908-1912 [Abstract] (2006) [HTML 1 KB] [PDF 216 KB] (688)
1761 Guo Rui, Jin Chen-Hui
  Two Cryptographic Properties of Strong Security Tweakable Enciphering Scheme
    JEIT   2011 Vol.33 (7): 1761-1764 [Abstract] (2113) [HTML 1 KB] [PDF 197 KB] (692)
1765 Luo Xiao-Jian, Hu Bin
  k-error Linear Complexity of Output Sequences of Single Cycle T-function
    JEIT   2011 Vol.33 (7): 1765-1769 [Abstract] (2223) [HTML 1 KB] [PDF 219 KB] (675)
1198 Chen Xiao-Jun, Li Zan, Bai Bao-Ming, Pan Wei, Chen Qing-Hua
  A New Complexity Metric of Chaotic Pseudorandom Sequences Based on Fuzzy Entropy
    JEIT   2011 Vol.33 (5): 1198-1203 [Abstract] (2540) [HTML 1 KB] [PDF 407 KB] (925)
1266 Sun Jin, Hu Yu-Pu
  Identity-based Broadcast Encryption Scheme Using the New Techniques for Dual System Encryption
    JEIT   2011 Vol.33 (5): 1266-1270 [Abstract] (2262) [HTML 1 KB] [PDF 239 KB] (1349)
854 Cui Ting, Jin Chen-Hui
  Research and Application for Characteristic Vectors of Two Kinds of Diffusion Structures
    JEIT   2011 Vol.33 (4): 854-857 [Abstract] (2318) [HTML 1 KB] [PDF 231 KB] (897)
284 Xiong Xiao-Wen, Qu Long-Jiang, Li Chao
  On Axtended Algebraic Immunity of Boolean Functions
    JEIT   2011 Vol.33 (2): 284-288 [Abstract] (2827) [HTML 1 KB] [PDF 217 KB] (836)
185 Zhao Lu, Wen Qiao-Yan
  Stability of Joint 2-adic Complexity of Multi-periodic Sequence
    JEIT   2011 Vol.33 (1): 185-189 [Abstract] (2664) [HTML 1 KB] [PDF 237 KB] (970)
190 Chang Ya-Qin, Jin Chen-Hui
  Linear Distinguishing Attack on Shannon Algorithm
    JEIT   2011 Vol.33 (1): 190-193 [Abstract] (2361) [HTML 1 KB] [PDF 183 KB] (1042)
194 Cui Ting, Jin Chen-Hui
  A Construction Method of Impossible Difference for (2n,r,t)_GFNSP Overall Structure
    JEIT   2011 Vol.33 (1): 194-198 [Abstract] (2413) [HTML 1 KB] [PDF 209 KB] (733)
223 Jia Yan-Yan, Hu Yu-Pu, Yang Wen-Feng, Gao Jun-Tao
  Linear Cryptanalysis of 2-round Trivium with Multiple Approximations
    JEIT   2011 Vol.33 (1): 223-227 [Abstract] (3308) [HTML 1 KB] [PDF 239 KB] (1112)
228 Liu Dan, Pei Chang-Xing, Quan Dong-Xiao
  Measurement Bases Impact on the Security of BB84 Protocol
    JEIT   2011 Vol.33 (1): 228-230 [Abstract] (1983) [HTML 1 KB] [PDF 188 KB] (1273)
2925 Jia Yan-Yan, Hu Yu-Pu, Gao Jun-Tao
  Guess-and-determine Attack on the Bit-search Generator
    JEIT   2010 Vol.32 (12): 2925-2929 [Abstract] (2777) [HTML 1 KB] [PDF 211 KB] (777)
2790 Zhang Peng, Li Rui-Lin, Li Chao
  New Square Attack on Zodiac
    JEIT   2010 Vol.32 (11): 2790-2794 [Abstract] (2908) [HTML 1 KB] [PDF 258 KB] (818)
2516 Tang Xue-Hai, Li Chao, Wang Mei-Yi, Qu Long-Jiang
  Impossible Differential Attack on 3D Cipher
    JEIT   2010 Vol.32 (10): 2516-2520 [Abstract] (3073) [HTML 1 KB] [PDF 265 KB] (1136)
2521 Li Xue-Lian, Hu Yu-Pu, Gao Jun-Tao
  The Lower Bounds on the Second Order Nonlinearity of Bent Functions and Semi-bent Functions
    JEIT   2010 Vol.32 (10): 2521-2525 [Abstract] (2960) [HTML 1 KB] [PDF 232 KB] (927)
First page | Prev page | Next page | Last pagePage 3 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech