电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
2095 Chen Guang-Hua, Zhu Jing-Ming, Liu Ming, Zeng Wei-Min
  Dual-field Modular Multiplication Algorithm and Modular Inversion Algorithm with VLSI Implementation
    JEIT   2010 Vol.32 (9): 2095-2100 [Abstract] (2977) [HTML 1 KB] [PDF 347 KB] (1418)
2249 Sun Yin-Xia, Li Hui, Li Xiao-Qing
  Certificateless Signcryption KEM to Multiple Recipients
    JEIT   2010 Vol.32 (9): 2249-2252 [Abstract] (2779) [HTML 1 KB] [PDF 198 KB] (993)
1948 Deng Miao-Lei, Wang Yu-Lei, Zhou Li-Hua
  Universally Composable Three Party Password-authenticated Key Exchange Protocol
    JEIT   2010 Vol.32 (8): 1948-1952 [Abstract] (3090) [HTML 1 KB] [PDF 228 KB] (845)
1953 Chen Shi-Wei, Jin Chen-Hui
  A New Herding Attack on Hash Functions with Strengthening Merkle-Damagard (MD) Construction
    JEIT   2010 Vol.32 (8): 1953-1955 [Abstract] (2667) [HTML 1 KB] [PDF 176 KB] (833)
1580 Wang Bao-cang①②; Wei Yong-zhuang; Hu Yu-pu
  Public Key Cryptosystem Using Random Knapsacks
    JEIT   2010 Vol.32 (7): 1580-1584 [Abstract] (2514) [HTML 1 KB] [PDF 220 KB] (1474)
821 Du Xiao-ni①②; Yan Tong-jiang; Shi Yong-fang
  Linear Complexity of Generalized Cyclotomic Sequences with Period pm
    JEIT   2010 Vol.32 (4): 821-824 [Abstract] (2756) [HTML 1 KB] [PDF 201 KB] (1040)
737 Zeng Guang; Yang Yang; Han Wen-bao; Fan Shu-qin
  On the Properties of the Minimal Polynomial of σ-LFSR Sequence
    JEIT   2010 Vol.32 (3): 737-741 [Abstract] (3498) [HTML 1 KB] [PDF 234 KB] (1256)
318 Wei Yue-chuan; Li Lin②④; Li Rui-lin; Li Chao①②③
  Differential Fault Analysis on SHACAL-2
    JEIT   2010 Vol.32 (2): 318-322 [Abstract] (2849) [HTML 1 KB] [PDF 207 KB] (1314)
500 Cui Ting,Jin Chen-hui
  Construction of Involution Cauchy-Hadamard Type MDS Matrices
    JEIT   2010 Vol.32 (2): 500-503 [Abstract] (2935) [HTML 1 KB] [PDF 198 KB] (1516)
157 Wang Mei-yi,Tang Xue-hai,Li Chao,Qu Long-jiang①②
  Square Attacks on 3D Cipher
    JEIT   2010 Vol.32 (1): 157-161 [Abstract] (3344) [HTML 1 KB] [PDF 197 KB] (862)
162 Zhu Xue-xiu,Liu Jiu-fen,Zhang Wei-ming
  A Steganographic Algorithm Based on Hamming Code and Wet Paper Code
    JEIT   2010 Vol.32 (1): 162-165 [Abstract] (2780) [HTML 1 KB] [PDF 212 KB] (1746)
2897 Liu Xiang-hui;Zeng Guang;Han Wen-bao
  Research on Linear Complexity of Primitive σ-LFSR Sequences
    JEIT   2009 Vol.31 (12): 2897-2900 [Abstract] (2610) [HTML 1 KB] [PDF 203 KB] (767)
2901 Yuan Yan-bin①②; Zhao Ya-qun; Zheng Xing; Guo Wei
  The Properties of Rotation Symmetric Functions over GF(p)
    JEIT   2009 Vol.31 (12): 2901-2906 [Abstract] (2911) [HTML 1 KB] [PDF 221 KB] (840)
2708 Zheng Bin; Guan Jie
  Differential Characteristic Probability of Added Key on Modulo 2n Operation
    JEIT   2009 Vol.31 (11): 2708-2712 [Abstract] (3049) [HTML 1 KB] [PDF 209 KB] (880)
2713 Li Bin; Wang Xin-mei; Li Xiang-jun
  R-ate Extended to Fqm
    JEIT   2009 Vol.31 (11): 2713-2715 [Abstract] (3283) [HTML 1 KB] [PDF 190 KB] (904)
2385 Hou Hui-fang①②; Liu Guang-qiang; Ji Xin-sheng; Zhang Qiu-wen
  Provable Security Authentication Scheme Based on Public Key for Heterogeneous Wireless Network
    JEIT   2009 Vol.31 (10): 2385-2391 [Abstract] (2691) [HTML 1 KB] [PDF 245 KB] (1089)
2392 Bao Wan-su; Wei Yun; Zhong Pu-cha
  Research on Proxy Ring Signature with Anonymity of the Original Signer
    JEIT   2009 Vol.31 (10): 2392-2396 [Abstract] (2931) [HTML 1 KB] [PDF 217 KB] (868)
2397 Chen Shi-wei;Jin Chen-hui; Li Xi-bin
  Research on the Noise Functions Produced by Macrocosm Approximation of XOR with Addition Modulo 2n
    JEIT   2009 Vol.31 (10): 2397-2401 [Abstract] (2791) [HTML 1 KB] [PDF 201 KB] (770)
2402

Huang Li-lian; Yin Qi-tian

  A Chaos Synchronization Secure Communication System Based on Output Control
    JEIT   2009 Vol.31 (10): 2402-2405 [Abstract] (2720) [HTML 1 KB] [PDF 223 KB] (993)
2406 Zang Yu-liang; Han Wen-bao
  Differential Power Attack on Liner Feedback Shift Register
    JEIT   2009 Vol.31 (10): 2406-2410 [Abstract] (2549) [HTML 1 KB] [PDF 218 KB] (1006)
2205 Li Sheng-qiang; Zhou Liang; Xiao Guo-zhen
  Study on a Class of Whiteman-Generalized Cyclotomic Sequence with Length pq and Order Two
    JEIT   2009 Vol.31 (9): 2205-2208 [Abstract] (2707) [HTML 1 KB] [PDF 189 KB] (883)
2260 Tang Xue-hai; Li Chao①②; Xie Duan-qiang
  Square Bttack on CLEFIA
    JEIT   2009 Vol.31 (9): 2260-2263 [Abstract] (2553) [HTML 1 KB] [PDF 207 KB] (1074)
2283 Wang Wei-qiong①②; Zhou Yu; Xiao Guo-zhen
  Normality of Plateaued Functions
    JEIT   2009 Vol.31 (9): 2283-2286 [Abstract] (2804) [HTML 1 KB] [PDF 192 KB] (996)
1571 Jia Hong-yong①③; Qing Si-han; Gu Li-ze; Yang Yi-xian
  Universally Composable Group Key Exchange Protocol
    JEIT   2009 Vol.31 (7): 1571-1575 [Abstract] (2738) [HTML 1 KB] [PDF 230 KB] (1079)
1433 Hu Bin; Jin Chen-hui; Shi Jian-hong
  Cryptographic Properties of Multi-output Plateaued Functions
    JEIT   2009 Vol.31 (6): 1433-1437 [Abstract] (2692) [HTML 1 KB] [PDF 197 KB] (1141)
1438 Zheng Hao-ran;Zhang Hai-mo;Cui Ting; Du Xiao-qiang
  A New Method for Construction of Orthomorphic Permutations
    JEIT   2009 Vol.31 (6): 1438-1441 [Abstract] (3002) [HTML 1 KB] [PDF 206 KB] (1048)
1442 Gong Mei-jing; Qu Shao-cheng; Wang Xiao-yan
  A Novel Method of Realizing Chaotic Secure Communication by Synchronization of Different Structure
    JEIT   2009 Vol.31 (6): 1442-1444 [Abstract] (3043) [HTML 1 KB] [PDF 207 KB] (973)
1063 Deng Miao-lei; Wang Yu-lei; Zhou Li-hua
  Universally Composable Fair Electronic Payment Protocol
    JEIT   2009 Vol.31 (5): 1063-1066 [Abstract] (2436) [HTML 1 KB] [PDF 233 KB] (1025)
942 Zhang Meng; Zeng Guang; Han Wen-bao; He Kai-cheng
  Trace Representation of Primitive σ-LFSR Sequences and Its Application
    JEIT   2009 Vol.31 (4): 942-945 [Abstract] (2793) [HTML 1 KB] [PDF 205 KB] (1054)
946 Zhang Bin; Wang Qiu-yan; Jin Chen-hui
  Analysis and Correction of Courtois Attack to KeeLoq Cipher
    JEIT   2009 Vol.31 (4): 946-949 [Abstract] (2983) [HTML 1 KB] [PDF 191 KB] (1092)
First page | Prev page | Next page | Last pagePage 4 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech