电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
717 Yuan Dan-shou; Rong Meng-tian
  Reconfigurable and Fast Finite Field Multiplier Architecture
    JEIT   2006 Vol.28 (4): 717-720 [Abstract] (2103) [HTML 1 KB] [PDF 507 KB] (762)
721 Zhu Can-yan; Zheng Yu-fan
  Researching on Performances of an Invertible Nonlinear Chaotic Communication System
    JEIT   2006 Vol.28 (4): 721-727 [Abstract] (1913) [HTML 1 KB] [PDF 403 KB] (1044)
404 Wang Qing-xian;Sun Shi-xin
  Fast Arithmetic in Generalized Optimal Extension Fields
    JEIT   2006 Vol.28 (3): 404-406 [Abstract] (1731) [HTML 1 KB] [PDF 809 KB] (1059)
407 Wang Qing-long; Yang Bo
  A Complete Asymmetric Public-Key Traitor Tracing Scheme
    JEIT   2006 Vol.28 (3): 407-409 [Abstract] (1794) [HTML 1 KB] [PDF 206 KB] (929)
410 Jin Chen-hui; Yang Yang; Qi Chuan-da
  A Related-Key Attack on Chaotic Stream Ciphers
    JEIT   2006 Vol.28 (3): 410-414 [Abstract] (2152) [HTML 1 KB] [PDF 403 KB] (1207)
247 Zhang Hua; Chen Zhi-xiong; Xiao Guo-zhen
  A Pairing-Based Group Key Agreement Protocol and Its Analysis
    JEIT   2006 Vol.28 (2): 247-251 [Abstract] (1843) [HTML 1 KB] [PDF 545 KB] (756)
252 Chen Dan; Luo Xin; Wang Yu-min
  A Steganography Preserving the Property of the Histogram for JPEG Images
    JEIT   2006 Vol.28 (2): 252-256 [Abstract] (1904) [HTML 1 KB] [PDF 848 KB] (968)
147 Li Hui; Ma Chun-guang; Yang Yi-xian
  A Mixed Mechanism Mutual Authentication Protocol for TETRA
    JEIT   2006 Vol.28 (1): 147-150 [Abstract] (1863) [HTML 1 KB] [PDF 189 KB] (1472)
151 Zhang Chuan-rong①②; Fu Xiao-tong; Xiao Guo-zhen
  Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes
    JEIT   2006 Vol.28 (1): 151-153 [Abstract] (1774) [HTML 1 KB] [PDF 146 KB] (1088)
1737 Tian Zi-jian; Wang Ji-lin; Wu Yun-xia
  A Dynamic Anonymous Authentication Scheme with Identity Escrow
    JEIT   2005 Vol.27 (11): 1737-1740 [Abstract] (1640) [HTML 1 KB] [PDF 239 KB] (1095)
1741 Mi Liang
  The Performance Analysis of Chaotic Frequency-Hopping Sequences
    JEIT   2005 Vol.27 (11): 1741-1744 [Abstract] (1881) [HTML 1 KB] [PDF 226 KB] (1087)
1745 Zhang Wen-fang①②; He Da-ke①②; Wang Xiao-min; Zheng Yu①②
  A New RSA Threshold Group Signature Scheme Based on Modified Shamir’s Secret Sharing Solution
    JEIT   2005 Vol.27 (11): 1745-1749 [Abstract] (2076) [HTML 1 KB] [PDF 268 KB] (1074)
1639 Zhao Sheng-mei; Li Fei;Zheng Bao-yu
  The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack
    JEIT   2005 Vol.27 (10): 1639-1642 [Abstract] (2020) [HTML 1 KB] [PDF 212 KB] (1251)
1643 Yan Tao; Du Xing-min; Ru Le
  Study on Iterative Decoding of Turbo Codes with Extrinsic Information in Different Versions
    JEIT   2005 Vol.27 (10): 1643-1646 [Abstract] (2059) [HTML 1 KB] [PDF 275 KB] (1190)
1459 Zhao YuanChao;Li DaoBen
  The Enhanced Methods of User Identity's Confidentiality in Mobile Communication
    JEIT   2005 Vol.27 (9): 1459-1462 [Abstract] (1642) [HTML 1 KB] [PDF 795 KB] (819)
1463 Gu LiZe;Zhang Sheng;Yang YiXian
  A New Proxy Signature Scheme
    JEIT   2005 Vol.27 (9): 1463-1466 [Abstract] (1961) [HTML 1 KB] [PDF 643 KB] (820)
1470 Zhang WeiMing;Yao Kai;Li ShiQu
  Computing Correlation Coefficients of Bluetooth Combiner
    JEIT   2005 Vol.27 (9): 1470-1475 [Abstract] (2003) [HTML 1 KB] [PDF 1166 KB] (959)
1476 Xie Qi①②;Yu XiuYuan;Wang JiLin
  A secure and Efficient (t, n) Multisecret Sharing Authenticating Scheme
    JEIT   2005 Vol.27 (9): 1476-1478 [Abstract] (1679) [HTML 1 KB] [PDF 290 KB] (835)
1127 Gao Jun-tao; Hu Yu-pu; Dong Li-hua 
  A New Generalized Self-shrinking Generator on GF(q)
    JEIT   2005 Vol.27 (7): 1127-1130 [Abstract] (1740) [HTML 1 KB] [PDF 795 KB] (810)
870 Wang Nian-ping; Jin Chen-hui; Li Yun-qiang
  The Differential Provable Security Analysis of a Kind of Unbalanced Feistel Networks
    JEIT   2005 Vol.27 (6): 870-873 [Abstract] (2052) [HTML 1 KB] [PDF 985 KB] (1096)
699 Wei Yong-zhuang①②; Gao Jun-tao; Hu Yu-pu
  New Construction of Cryptographic Functions Satisfying PC(l) of Order k
    JEIT   2005 Vol.27 (5): 699-702 [Abstract] (1619) [HTML 0 KB] [PDF 1032 KB] (751)
703 Yan Sen-lin
  Theoretical Model and Its Numerical Simulation in Chaos Shift Keying Secure Communciation System with Dual-ring Erbium-Doped Fiber Lasers
    JEIT   2005 Vol.27 (5): 703-706 [Abstract] (1702) [HTML 0 KB] [PDF 1014 KB] (819)
608 Wu Qian-hong; Wang Ji-lin;Yuan Su-chun;Wang Yu-min
  Publicly Verifiable Encryption for ElGamal/RSA Encryption
    JEIT   2005 Vol.27 (4): 608-611 [Abstract] (2147) [HTML 1 KB] [PDF 1076 KB] (943)
612 Chen Yuan; Dong Qing-kuan; Xiao Guo-zhen
  Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption
    JEIT   2005 Vol.27 (4): 612-616 [Abstract] (1825) [HTML 1 KB] [PDF 1378 KB] (918)
617 Xiao Juan; Wang Lin①②; Deng Li-zhao
  Density Evolution Method and Threshold Decision for Irregular LDPC Codes
    JEIT   2005 Vol.27 (4): 617-620 [Abstract] (1897) [HTML 1 KB] [PDF 923 KB] (936)
621 Jiang Zheng-tao; Pang Liao-jun; Wang Yu-min
  An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages
    JEIT   2005 Vol.27 (4): 621-624 [Abstract] (1732) [HTML 1 KB] [PDF 909 KB] (892)
625 Zhou Xuan; Li Chao①②③
  Auto-correlation Function of Generalized Jacobi Sequences
    JEIT   2005 Vol.27 (4): 625-628 [Abstract] (1841) [HTML 1 KB] [PDF 797 KB] (710)
666 Xiao Qing-hua; Ping Ling-di; Pan Xue-zeng
  A Highly Efficient Secure Electronic Auction Protocol with Full Anonymity and Fairness
    JEIT   2005 Vol.27 (4): 666-669 [Abstract] (1900) [HTML 1 KB] [PDF 955 KB] (1038)
235 Chen Yan-ling; Chen Lu-sheng; Fu Fang-wei
  Security Cryptanalysis of Two Group Signature Schemes
    JEIT   2005 Vol.27 (2): 235-238 [Abstract] (1710) [HTML 1 KB] [PDF 1175 KB] (935)
119 Zhang Wen-ying①②; Wu Chuan-kun; Huang Xiao-ying; Li Shi-qu
  Generalized Vector Bent Functions
    JEIT   2005 Vol.27 (1): 119-122 [Abstract] (1824) [HTML 1 KB] [PDF 1014 KB] (915)
First page | Prev page | Next page | Last pagePage 7 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech