电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
146 Wang Lei; Zhu Yue-fei
  Framework and Researching Content of Distributed Cryptography
    JEIT   2005 Vol.27 (1): 146-149 [Abstract] (2045) [HTML 1 KB] [PDF 1247 KB] (1123)
155 Peng Gen-peng; Liu Chang-shu; Li Zhi-hua
  The Hybrid Pipelining Implementation of AES in the Feedback Mode Based on CPLD/FPGA
    JEIT   2005 Vol.27 (1): 155-157 [Abstract] (1963) [HTML 1 KB] [PDF 839 KB] (1484)
1990 Li Na; Chen Wei-hong
  A New System of Multivariate Quadratic Equations for Rijndael
    JEIT   2004 Vol.26 (12): 1990-1995 [Abstract] (1531) [HTML 1 KB] [PDF 813 KB] (767)
1996 Huang Zhen-jie①②; Hao Yan-hua; Wang Yu-min
  Nominative Signature and Nominative Proxy Signature
    JEIT   2004 Vol.26 (12): 1996-2001 [Abstract] (1785) [HTML 1 KB] [PDF 783 KB] (765)
1778 Liu Bin; Tong Sheng; Bai Bao-ming
  Algebraic Construction of Low-Density Parity-Check Codes without Short Cycles
    JEIT   2004 Vol.26 (11): 1778-1782 [Abstract] (1650) [HTML 1 KB] [PDF 1136 KB] (743)
1783 Dong Li-hua①②;Zeng Yong; Hu Yu-pu①②
  A Fast Cryptanalysis of the Generalized Self-shrinking Sequences
    JEIT   2004 Vol.26 (11): 1783-1786 [Abstract] (1636) [HTML 1 KB] [PDF 906 KB] (745)
1787 Niu Zhi-hua; Bai En-jian; Xiao Guo-zhen
  On the Expected Value of the Linear Complexity and the k-Error Linear Complexity of Periodic Sequences
    JEIT   2004 Vol.26 (11): 1787-1791 [Abstract] (1870) [HTML 1 KB] [PDF 899 KB] (916)
1668 Wang Ru-chuan①②; Huang Liang-jun;Hu Tao; Sun Zhi-xin
  The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology
    JEIT   2004 Vol.26 (10): 1668-1674 [Abstract] (1839) [HTML 1 KB] [PDF 1513 KB] (1350)
1395 Jin Jun-e; Li Chao①②; Wu Yi
  Construction and Properties of Balance Feedforword Sequences
    JEIT   2004 Vol.26 (9): 1395-1400 [Abstract] (1765) [HTML 1 KB] [PDF 646 KB] (1005)
1401 Xie Kun; Lei Min; Feng Zheng-jin
  A New Method for Improving the Encryption Property of the Chaotic System
    JEIT   2004 Vol.26 (9): 1401-1406 [Abstract] (1889) [HTML 1 KB] [PDF 1039 KB] (784)
1407 Chen Zhi-xian; Wang Ru-chuan①②; Wang Shao-di; Sun Zhi-xin
  A Secure Transport Model of Mobile Agent Based on Hybrid Encryption
    JEIT   2004 Vol.26 (9): 1407-1412 [Abstract] (1941) [HTML 1 KB] [PDF 1363 KB] (997)
1282 Ma Wei-ju; Feng Deng-guo; Wu Zhi-ping; Zhang Bin
  Cryptanalysis on a Kind of Keystream Generator
    JEIT   2004 Vol.26 (8): 1282-1287 [Abstract] (1792) [HTML 1 KB] [PDF 1264 KB] (932)
1288 Zhang Fu-tai; Shi Jun; Wang Yu-min
  Information-Theoretical Secure Verifiable Secret Sharing on Vector Space Access Structures
    JEIT   2004 Vol.26 (8): 1288-1293 [Abstract] (1993) [HTML 1 KB] [PDF 1304 KB] (703)
1294 Sun Jiao; Du Xing-min; Song Heng
  A Chaotic Sequence Generation Model Based on ANFIS
    JEIT   2004 Vol.26 (8): 1294-1299 [Abstract] (1643) [HTML 1 KB] [PDF 1296 KB] (811)
1340 Li Yan-ping; Zhang Jian-zhong
  A New Fair Multi-party Exchange Protocol
    JEIT   2004 Vol.26 (8): 1340-1344 [Abstract] (1857) [HTML 1 KB] [PDF 1149 KB] (770)
1045 Pan Zhi-bo;Zheng Bao-yu;Wu Meng
  Study on a Key Update Mechanism for Secure Multicast Based on Time Stream
    JEIT   2004 Vol.26 (7): 1045-1052 [Abstract] (1790) [HTML 1 KB] [PDF 1813 KB] (1149)
1053 Li Yuan-zheng
  A Security Multicast Scheme with the Hierarchical Group Key Management
    JEIT   2004 Vol.26 (7): 1053-1056 [Abstract] (1648) [HTML 1 KB] [PDF 1040 KB] (1031)
1057 Weng Yi-fang;Weng Li-juan;Zhang Lei
  Research on Chaotic Synchronized Secure Communication Schemes to Improve Security
    JEIT   2004 Vol.26 (7): 1057-1063 [Abstract] (2049) [HTML 1 KB] [PDF 1576 KB] (992)
912 Zhou Xuan; Li Chao①②
  Differential Analysis and Modification of the Key-Dependent S-Boxes of Twofish
    JEIT   2004 Vol.26 (6): 912-916 [Abstract] (1969) [HTML 1 KB] [PDF 1145 KB] (943)
1005 He Ye-feng; Zhang Jian-zhong
  A Dynamic Secret Sharing Scheme Based on Factorization and Discrete Logarithms
    JEIT   2004 Vol.26 (6): 1005-1008 [Abstract] (1677) [HTML 1 KB] [PDF 745 KB] (924)
556 Hu Cheng-jun①②; Zheng Yuan; Lǚ Shu-wang; Shen Chang-xiang
  Formal Specification of Security Protocols
    JEIT   2004 Vol.26 (4): 556-561 [Abstract] (1647) [HTML 1 KB] [PDF 1340 KB] (640)
562 Chen Xiao-feng; Wang Ji-lin; Wang Yu-min
  Signature Schemes Based on Extended XTR System
    JEIT   2004 Vol.26 (4): 562-567 [Abstract] (1657) [HTML 1 KB] [PDF 1113 KB] (497)
435 Wang Ji-lin; Mao Jian; Wang Yu-min
  An Unconditional Anonymous Sign-Cryption Algorithm
    JEIT   2004 Vol.26 (3): 435-439 [Abstract] (1913) [HTML 1 KB] [PDF 925 KB] (790)
65 Duo Lei; Li Chao①②
  The Inverse Square Attack of Rijndael Cipher
    JEIT   2004 Vol.26 (1): 65-71 [Abstract] (1784) [HTML 1 KB] [PDF 714 KB] (801)
72 Sun Lin-hong; Ye Ding-feng; Lǚ Shu-wang; Feng Deng-guo
  Composite Attack on Sequence Cipher
    JEIT   2004 Vol.26 (1): 72-76 [Abstract] (1712) [HTML 1 KB] [PDF 491 KB] (608)
1514 Hu Guojie; Feng Zhengjin
  Security property of a class of digital chaotic encryption system
    JEIT   2003 Vol.25 (11): 1514-1518 [Abstract] (1580) [HTML 0 KB] [PDF 780 KB] (780)
1578 Liu Yuan; Yin Qing; Zhang Limin
  A verifiable dynamic secret sharing scheme
    JEIT   2003 Vol.25 (11): 1578-1580 [Abstract] (1597) [HTML 1 KB] [PDF 463 KB] (709)
1398 Liu Chuandong; Lǚ Shuwang; Fan Xiubin
  The mutual information between control and output sequences of the control-choice cryptographic logic
    JEIT   2003 Vol.25 (10): 1398-1402 [Abstract] (1689) [HTML 1 KB] [PDF 850 KB] (493)
1237 Lǚ Shuwang; Zhang Ruwen
  Linear cryptanalysis for a class of feistel ciphers
    JEIT   2003 Vol.25 (9): 1237-1242 [Abstract] (1777) [HTML 1 KB] [PDF 542 KB] (596)
1108 Li Zhen; Lǚ Shuwang; Wang Yongchuan; Wang Ansheng
  Study on the computation of differential characteristic probability in differential cryptanalysis
    JEIT   2003 Vol.25 (8): 1108-1113 [Abstract] (1930) [HTML 1 KB] [PDF 686 KB] (516)
First page | Prev page | Next page | Last pagePage 8 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech