电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918.2":
42 MA Shang, LIU Jianfeng, YANG Zeguo, ZHANG Yan, HU Jianhao
  A Method of Generating High Speed and Long Period Pseudo-random Sequence Based on Residue
    JEIT   2018 Vol.40 (1): 42-49 [Abstract] (142) [HTML 1 KB] [PDF 277 KB] (340)
1656 Wang Zhong-Xiao, Qi Wen-Feng
  On the Uniqueness of Decomposition of a NFSR into a Cascade Connection of Smaller NFSRs
    JEIT   2014 Vol.36 (7): 1656-1660 [Abstract] (1278) [HTML 1 KB] [PDF 214 KB] (754)
802 You Wei, Qi Wen-Feng
  Construction of Several Classes of Single-cycle Polynomials over Z/(pn)
    JEIT   2012 Vol.34 (4): 802-806 [Abstract] (1584) [HTML 1 KB] [PDF 224 KB] (814)
2095 Chen Guang-Hua, Zhu Jing-Ming, Liu Ming, Zeng Wei-Min
  Dual-field Modular Multiplication Algorithm and Modular Inversion Algorithm with VLSI Implementation
    JEIT   2010 Vol.32 (9): 2095-2100 [Abstract] (2977) [HTML 1 KB] [PDF 347 KB] (1396)
2249 Sun Yin-Xia, Li Hui, Li Xiao-Qing
  Certificateless Signcryption KEM to Multiple Recipients
    JEIT   2010 Vol.32 (9): 2249-2252 [Abstract] (2779) [HTML 1 KB] [PDF 198 KB] (973)
1511 Xie Qi
  Cryptanalysis of an Efficient Group Signature Scheme
    JEIT   2007 Vol.29 (6): 1511-1513 [Abstract] (2260) [HTML 1 KB] [PDF 194 KB] (811)
1173 Wen Feng-tong; Wu Wen-ling; Wen Qiao-yan
  Pseudorandomness of Optimal MISTY-Type Structure
    JEIT   2007 Vol.29 (5): 1173-1176 [Abstract] (2279) [HTML 1 KB] [PDF 223 KB] (836)
888 Xu Chun-xia; Chen Wei-hong
  An Algorithm to Determine the Annihilators of Boolean Function and a Class of Invariants of Algebraic Attacks
    JEIT   2007 Vol.29 (4): 888-891 [Abstract] (2399) [HTML 1 KB] [PDF 255 KB] (817)
1415 Qi Chuan-da①②; Wang Nian-ping; Jin Chen-hui
  A New Multi-proxy Multi-signature Scheme
    JEIT   2006 Vol.28 (8): 1415-1417 [Abstract] (1940) [HTML 1 KB] [PDF 191 KB] (889)
625 Zhou Xuan; Li Chao①②③
  Auto-correlation Function of Generalized Jacobi Sequences
    JEIT   2005 Vol.27 (4): 625-628 [Abstract] (1841) [HTML 1 KB] [PDF 797 KB] (703)
1778 Liu Bin; Tong Sheng; Bai Bao-ming
  Algebraic Construction of Low-Density Parity-Check Codes without Short Cycles
    JEIT   2004 Vol.26 (11): 1778-1782 [Abstract] (1649) [HTML 1 KB] [PDF 1136 KB] (731)
664 Zhang Shenru; Wang Tingchang; Deng Xiaoyan
  Generating 2k pseudo-random sequences using quasi-chaotic mealy limited state machine
    JEIT   2003 Vol.25 (5): 664-670 [Abstract] (1893) [HTML 1 KB] [PDF 533 KB] (868)
1190 Wang Changjie; Zhang Fangguo; Wang Yumin
  IMPROVEMENT UPON PUBLIC KEY CERTIFICATION SYSTEM
    JEIT   2001 Vol.23 (11): 1190-1194 [Abstract] (1407) [HTML 1 KB] [PDF 1094 KB] (492)
717 Qi Ming; Xiao Guozhen
  A PRACTICAL SECRET VOTING SCHEME FOR LARGE SCALE ELECTRONIC ELECTIONS
    JEIT   1997 Vol.19 (5): 717-720 [Abstract] (1648) [HTML 1 KB] [PDF 708 KB] (775)
First page | Prev page | Next page | Last pagePage 1 of 1, 14 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech