电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
2448 Wang Bao-cang; Hu Yu-pu
  Security Analysis of Naccache-Stern Public Key Cryptosystem
    JEIT   2007 Vol.29 (10): 2448-2450 [Abstract] (2878) [HTML 1 KB] [PDF 248 KB] (880)
2451 Wang Jian-hua; Zhang Lan; He Liang-sheng; Xu Yang
  Flaws and Improvement on Constructing Attack Based on Generalized Strand Space Model
    JEIT   2007 Vol.29 (10): 2451-2454 [Abstract] (2540) [HTML 1 KB] [PDF 254 KB] (961)
2529 Lu Rong-bo; He Da-ke; Wang Chang-ji; Miao Xiang-hua
  Cryptanalysis and Improvement of a New Proxy Signature Scheme
    JEIT   2007 Vol.29 (10): 2529-2532 [Abstract] (2536) [HTML 1 KB] [PDF 221 KB] (1125)
2222 Zhu Feng-xiang; Qi Wen-feng
  1-error Linear Complexity of pn-Periodic Sequences over Fp
    JEIT   2007 Vol.29 (9): 2222-2225 [Abstract] (2307) [HTML 1 KB] [PDF 323 KB] (1419)
2026 Liu Jin-long; Xu Zong-ze
  Secret Authentication Codes from Cartesian Authentication Codes
    JEIT   2007 Vol.29 (8): 2026-2028 [Abstract] (2145) [HTML 1 KB] [PDF 196 KB] (913)
1772 Li Yan-jun; Wu Yu-hua; Li Meng-dong; Yang Gang
  Forgery Attack to a Group Signature Scheme
    JEIT   2007 Vol.29 (7): 1772-1774 [Abstract] (3188) [HTML 1 KB] [PDF 230 KB] (1612)
1511 Xie Qi
  Cryptanalysis of an Efficient Group Signature Scheme
    JEIT   2007 Vol.29 (6): 1511-1513 [Abstract] (2260) [HTML 1 KB] [PDF 194 KB] (821)
1173 Wen Feng-tong; Wu Wen-ling; Wen Qiao-yan
  Pseudorandomness of Optimal MISTY-Type Structure
    JEIT   2007 Vol.29 (5): 1173-1176 [Abstract] (2279) [HTML 1 KB] [PDF 223 KB] (847)
888 Xu Chun-xia; Chen Wei-hong
  An Algorithm to Determine the Annihilators of Boolean Function and a Class of Invariants of Algebraic Attacks
    JEIT   2007 Vol.29 (4): 888-891 [Abstract] (2400) [HTML 1 KB] [PDF 255 KB] (824)
699 Zhao Bai-shan; Zhu Yi-sheng
  An Improved Secure Communication System Based on Chaotic Masking
    JEIT   2007 Vol.29 (3): 699-701 [Abstract] (2311) [HTML 1 KB] [PDF 246 KB] (5991)
182 Wang Feng-he; Hu Yu-pu; Wang Chun-xiao
  An Attack and Improve of a Group Signature Scheme Based on Chinese Remainder Theorem
    JEIT   2007 Vol.29 (1): 182-184 [Abstract] (2380) [HTML 1 KB] [PDF 231 KB] (1105)
185 Wang Yan-bo; Zhang Kai-ze; Wang Kai-hua; Duanmu Qing-feng; Lei Feng-yu
  A New Public-Key Cryptosystems on Lucas Sequence
    JEIT   2007 Vol.29 (1): 185-188 [Abstract] (2531) [HTML 1 KB] [PDF 294 KB] (1120)
189 Wang Quan-lai; Han Ji-hong; Wang Ya-di
  Design and Analysis of an Authentication Protocol for Digital Mobile Communication System
    JEIT   2007 Vol.29 (1): 189-192 [Abstract] (2075) [HTML 1 KB] [PDF 308 KB] (983)
193 Zheng Hao-ran; Jin Chen-hui; Shi Jian-hong
  Analysis of a Kind of Balance Feedforward Sequences
    JEIT   2007 Vol.29 (1): 193-196 [Abstract] (2643) [HTML 1 KB] [PDF 256 KB] (1064)
197 Zhang Wen-ying;Wu Chuan-kun
  The Construction of Multi Out-put Hyper Bent Functions
    JEIT   2007 Vol.29 (1): 197-200 [Abstract] (2221) [HTML 1 KB] [PDF 265 KB] (997)
2351 Zhan Ming; Zhang Cui-fang
  A Scheme for Generating Key Sequences Based on Chaotic Control of m Sequence
    JEIT   2006 Vol.28 (12): 2351-2354 [Abstract] (1810) [HTML 1 KB] [PDF 346 KB] (1334)
2355 Pan Yong-tao; Qi Wen-feng
  Construction of Balanced Correlation-Immune Functions with Highest Degree
    JEIT   2006 Vol.28 (12): 2355-2358 [Abstract] (1806) [HTML 1 KB] [PDF 258 KB] (985)
2359 Han Jian-qun; Zhu Yi-sheng
  A Method of Realizing Chaotic Secure Communication by Using Digital Channel
    JEIT   2006 Vol.28 (12): 2359-2361 [Abstract] (2105) [HTML 1 KB] [PDF 292 KB] (1215)
2127 Zhang Xue-jun; Yu Guo-lin; Zhou Li-hua
  A Collusion-Resistant Asymmetric Public-Key Traitor Tracing Scheme for Multi-channel Services
    JEIT   2006 Vol.28 (11): 2127-2129 [Abstract] (1610) [HTML 1 KB] [PDF 233 KB] (709)
1870 Zhang Shen-ru; Guo Ming
  The Properties of Closed State Evolutive Ring in Random Permutation-Table and Its Application to Block Encryption
    JEIT   2006 Vol.28 (10): 1870-1873 [Abstract] (2063) [HTML 1 KB] [PDF 355 KB] (770)
1714 Wang Cai-fen; Liu Jun-long; Jia Ai-ku; Yu Cheng-zun
  A Forward Secure Secret Sharing
    JEIT   2006 Vol.28 (9): 1714-1716 [Abstract] (1585) [HTML 1 KB] [PDF 170 KB] (1236)
1717 Zhao Yuan-chao; Li Dao-ben
  An Elegant Construction of Re-initializable Hash Chains
    JEIT   2006 Vol.28 (9): 1717-1720 [Abstract] (1769) [HTML 1 KB] [PDF 250 KB] (895)
1412 Zhang Sheng; Xu Guo-ai; Hu Zheng-ming; Yang Yi-xian
  Construction of the One-Off Public Key Based on Identity
    JEIT   2006 Vol.28 (8): 1412-1414 [Abstract] (2070) [HTML 1 KB] [PDF 189 KB] (975)
1415 Qi Chuan-da①②; Wang Nian-ping; Jin Chen-hui
  A New Multi-proxy Multi-signature Scheme
    JEIT   2006 Vol.28 (8): 1415-1417 [Abstract] (1940) [HTML 1 KB] [PDF 191 KB] (899)
1258 Li Ying-dong; Li Shi-qu
  Chrestenson Spectrum and Auto-correlation Function of m-value “Composition” Logical Function and Applications
    JEIT   2006 Vol.28 (7): 1258-1261 [Abstract] (2373) [HTML 1 KB] [PDF 211 KB] (898)
1262 Luo Qi-bin; Zhang Jian
  A New Approach to Generate Chaotic Pseudo-random Sequence
    JEIT   2006 Vol.28 (7): 1262-1265 [Abstract] (1747) [HTML 1 KB] [PDF 303 KB] (2283)
827 Chen Wei; Hu Yun; Yang Yi-xian; Niu Xin-xin
  Application of Correlation Attack in Algorithm Identify
    JEIT   2006 Vol.28 (5): 827-831 [Abstract] (2097) [HTML 1 KB] [PDF 271 KB] (1260)
832 Yu Zhao-ping; Wang Xiao-dong
  On the Construction of Super-Pseudorandom Permutations Based on the Rotation Permutations
    JEIT   2006 Vol.28 (5): 832-835 [Abstract] (1997) [HTML 1 KB] [PDF 232 KB] (900)
707 Peng Jun①②; Liao Xiao-Feng; Okamoto Eiji; Zhang Wei; Li Xue-Ming
  A Block Encryption Algorithm Combined with the Discrete Chaotic Map and Feistel Network
    JEIT   2006 Vol.28 (4): 707-711 [Abstract] (2248) [HTML 1 KB] [PDF 328 KB] (1203)
712 Guo Jin-hui; Li Shi-qu
  Matrix Description on Propagation Characteristic of Boolean Function
    JEIT   2006 Vol.28 (4): 712-716 [Abstract] (1700) [HTML 1 KB] [PDF 314 KB] (865)
First page | Prev page | Next page | Last pagePage 6 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech