电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
851 Chen Xiaofeng; Gao Huming; Wang Yumin
  Blind Signature schemes based on XTR system
    JEIT   2003 Vol.25 (6): 851-854 [Abstract] (1698) [HTML 1 KB] [PDF 856 KB] (837)
654 Lu Shuwang; Liu Chuandong; Fan Xiubin
  Counting formula of the permutation with the maximum distance
    JEIT   2003 Vol.25 (5): 654-656 [Abstract] (1560) [HTML 1 KB] [PDF 357 KB] (522)
657 Wang Xiaoming①②; Fu Fangwei
  A secure group signature scheme
    JEIT   2003 Vol.25 (5): 657-663 [Abstract] (1701) [HTML 1 KB] [PDF 193 KB] (530)
664 Zhang Shenru; Wang Tingchang; Deng Xiaoyan
  Generating 2k pseudo-random sequences using quasi-chaotic mealy limited state machine
    JEIT   2003 Vol.25 (5): 664-670 [Abstract] (1894) [HTML 1 KB] [PDF 533 KB] (883)
711 Zheng Haoran; Jin Chenhui; Zhang Haimo
  Construction and enumeration of correlation-immune permutations
    JEIT   2003 Vol.25 (5): 711-715 [Abstract] (1679) [HTML 1 KB] [PDF 175 KB] (829)
473 Li Shujun; Mou Xuanqin; Ji Zhen; Zhang Jihong
  Cryptanalysis of a class of chaotic stream ciphers
    JEIT   2003 Vol.25 (4): 473-478 [Abstract] (2780) [HTML 1 KB] [PDF 650 KB] (764)
171 Liu Chuancai
  Quantum key distribution and its unconditional security proof
    JEIT   2003 Vol.25 (2): 171-179 [Abstract] (1798) [HTML 1 KB] [PDF 1798 KB] (834)
275 Hao Lin; Luo Ping
  A fast algorithm for the point multiplication in elliptic curve cryptosystems
    JEIT   2003 Vol.25 (2): 275-278 [Abstract] (1858) [HTML 1 KB] [PDF 680 KB] (1834)
123 Peng Jun①②; Liao Xiaofeng; Wu Zhongfu
  Chaotic synchronization of a coupled delayed neuron system
    JEIT   2003 Vol.25 (1): 123-127 [Abstract] (1846) [HTML 1 KB] [PDF 854 KB] (832)
1815 Tian Wenchun; Wei Gang
  A tree-type secure multicast scheme based on digital certificate
    JEIT   2002 Vol.24 (12): 1815-1820 [Abstract] (1707) [HTML 1 KB] [PDF 1200 KB] (578)
1821 Bai Enjian; Zhang Bin; Xiao Guozhen
  A relationship between linear complexity and k-error complexity of binary periodic sequences
    JEIT   2002 Vol.24 (12): 1821-1824 [Abstract] (1579) [HTML 1 KB] [PDF 735 KB] (537)
1825 Wang Xiaoming; Fu Fangwei
  A limited proxy signature scheme based on elliptic curve
    JEIT   2002 Vol.24 (12): 1825-1828 [Abstract] (1752) [HTML 1 KB] [PDF 777 KB] (844)
1985 Deng Suoyun; Sui Aifen; Hu Zhengming; Yang Yixian
  An optimistic fair multi-party non-repudiation protocol
    JEIT   2002 Vol.24 (12): 1985-1989 [Abstract] (1699) [HTML 1 KB] [PDF 1315 KB] (875)
1597 Luo Shoushan; Zhang Zhentao; Wu Qiuxin; Yang Yixian; Niu Xinxin
  Generalized hamming weights of a one-step majority-logic decodable code
    JEIT   2002 Vol.24 (11): 1597-1601 [Abstract] (1727) [HTML 1 KB] [PDF 997 KB] (639)
1602 Yang Tao; Dai Xiaoming; Shao Huihe
  Digital communication based on occasional coupling and generalized chaotic synchronization
    JEIT   2002 Vol.24 (11): 1602-1607 [Abstract] (1787) [HTML 1 KB] [PDF 1234 KB] (641)
1608 Wang Shangping①②; Wang Yumin
  The eigenvector representation of LFSR\’s output sequence
    JEIT   2002 Vol.24 (11): 1608-1613 [Abstract] (1854) [HTML 1 KB] [PDF 709 KB] (583)
1321 Zhou Yaxun;Yie Qingwei;Xu Tiefeng
  The study of embedding an invisible signature watermarking in a digital image
    JEIT   2002 Vol.24 (10): 1321-1328 [Abstract] (1690) [HTML 1 KB] [PDF 2188 KB] (808)
1428 Zhou Shangbo; He Songbai; Yu Juebang; Liao Xiaofeng
  Chaotic synchronization in neuron model with time-delay
    JEIT   2002 Vol.24 (10): 1428-1432 [Abstract] (1738) [HTML 1 KB] [PDF 809 KB] (566)
1177 Wu Wenling; He Yeping
  Security evaluation for a class of generalized feistel ciphers
    JEIT   2002 Vol.24 (9): 1177-1184 [Abstract] (2185) [HTML 1 KB] [PDF 1308 KB] (923)
1185 Xu Hanliang; Lu Shuwang
  Equivalent characterization and application of multi-output correlation-immune boolean function
    JEIT   2002 Vol.24 (9): 1185-1189 [Abstract] (1615) [HTML 1 KB] [PDF 912 KB] (731)
1276 Mu Jianjun; Lu Chengye; Wang Xinmei
  Research and development on erasure codes
    JEIT   2002 Vol.24 (9): 1276-1281 [Abstract] (2123) [HTML 1 KB] [PDF 1224 KB] (2877)
1294 Kang Baoyuan
  Constructions and enumerations of orthomorphic permutations in cryptosystems
    JEIT   2002 Vol.24 (9): 1294-1296 [Abstract] (1712) [HTML 1 KB] [PDF 478 KB] (788)
1109 Du Qingling; Zhang Limin
  bounds and construction for multiple authentication codes with multi-receiver
    JEIT   2002 Vol.24 (8): 1109-1112 [Abstract] (1608) [HTML 1 KB] [PDF 837 KB] (700)
1131 Yuan Ding①②; Fan Pingzhi; He Mingxing
  Notes on the investigation of the freshness in BNA logic
    JEIT   2002 Vol.24 (8): 1131-1133 [Abstract] (1796) [HTML 1 KB] [PDF 544 KB] (627)
758 Zhou Xiaoan; Zhang Jihong; Qiu Shuisheng
  The method of optimizing design of chaotic synchronization system
    JEIT   2002 Vol.24 (6): 758-764 [Abstract] (1722) [HTML 1 KB] [PDF 1108 KB] (551)
370 Cai Mian①②; Wang Hong; Xiao Guozhen
  A fast algorithm for determing the linear complexity of a pseudo-random sequence with periodic n2v
    JEIT   2002 Vol.24 (3): 370-376 [Abstract] (1758) [HTML 1 KB] [PDF 934 KB] (538)
377 Zhang Fangguo; Wang Changjie; Wang Yumin
  The selection of secure elliptic curves and their base points over GF(p)
    JEIT   2002 Vol.24 (3): 377-381 [Abstract] (1846) [HTML 1 KB] [PDF 694 KB] (642)
418 Li Ruihu①②; Li Zhihui; Li Xueliang
  Further construction of authentication codes with arbitration from unitary geometry
    JEIT   2002 Vol.24 (3): 418-421 [Abstract] (1712) [HTML 1 KB] [PDF 778 KB] (537)
422 Li Chunfu; Hu Zhiheng; Yu Juebang
  A new chaos model with its hardware implementation
    JEIT   2002 Vol.24 (3): 422-425 [Abstract] (1721) [HTML 1 KB] [PDF 681 KB] (661)
192 Fei Ruchun; Wang Lina; Dong Xiaomei; Yu Ge
  Quick trickle characteristic sequence and quick trickle permutation
    JEIT   2002 Vol.24 (2): 192-197 [Abstract] (1770) [HTML 1 KB] [PDF 654 KB] (605)
First page | Prev page | Next page | Last pagePage 9 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech