电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP309.7":
1992 ZANG Hongyan,LI Jiu, LI Guodong
  A One-dimensional Discrete Map Chaos Criterion Theorem with Applications in Pseudo-random Number Generator
    JEIT   2018 Vol.40 (8): 1992-1997 [Abstract] (153) [HTML 1 KB] [PDF 1924 KB] (481)
1652 ZHAO Jian, GAO Haiying, HU Bin
  An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    JEIT   2018 Vol.40 (7): 1652-1660 [Abstract] (103) [HTML 1 KB] [PDF 271 KB] (375)
1669 SONG Xinxia, CHEN Zhigang
  Analysis of Constructing Fully Homomorphic Encryption Based on the Abstract Decryption Structure
    JEIT   2018 Vol.40 (7): 1669-1675 [Abstract] (100) [HTML 1 KB] [PDF 217 KB] (309)
2479 XU Hong, SU Penghui, QI Wenfeng
  Impossible Differential Cryptanalysis of Reduced-round SPECK
    JEIT   2017 Vol.39 (10): 2479-2486 [Abstract] (178) [HTML 1 KB] [PDF 334 KB] (510)
2487 DAI Zibin, YI Suwen, LI Wei, NAN Longmei
  Research and Design of Efficient Parallel Processing Architecture for Elliptic Curve Cryptographic Processor
    JEIT   2017 Vol.39 (10): 2487-2494 [Abstract] (168) [HTML 1 KB] [PDF 1273 KB] (452)
2647 HU Hao, YU Bin, SHEN Gang, ZHANG Xuesi
  Region Incrementing Visual Cryptography Scheme with Decrypt Regions Perfectly Recovered
    JEIT   2016 Vol.38 (10): 2647-2653 [Abstract] (163) [HTML 1 KB] [PDF 2181 KB] (541)
827 FENG Xiao, DAI Zibin, LI Wei, CAI Luting
  Performance Model of Multicore Crypto Processor Based on Amdahl’s Law
    JEIT   2016 Vol.38 (4): 827-833 [Abstract] (273) [HTML 1 KB] [PDF 320 KB] (634)
354 ZHANG Minqing, KE Yan, SU Tingting
  Reversible Steganography in Encrypted Domain Based on LWE
    JEIT   2016 Vol.38 (2): 354-360 [Abstract] (220) [HTML 1 KB] [PDF 6221 KB] (1216)
1978 Yu Bin,Hu Hao, Chen Wu-ping, Shen Gang
  XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction
    JEIT   2015 Vol.37 (8): 1978-1983 [Abstract] (253) [HTML 1 KB] [PDF 1976 KB] (504)
3027 Chen Tao, Luo Xing-Guo, LI Xiao-Nan, LI Wei
  An Architecture of Stream Based Reconfigurable Clustered Block Cipher Processing Array
    JEIT   2014 Vol.36 (12): 3027-3034 [Abstract] (848) [HTML 1 KB] [PDF 394 KB] (837)
1642 Fu Zheng-Xin, Shen Gang, Kong Zhi-Yin, Yu Bin
  Investigation on Ideal Access Structure of XOR-based Visual Cryptography
    JEIT   2014 Vol.36 (7): 1642-1647 [Abstract] (965) [HTML 1 KB] [PDF 310 KB] (621)
1271 Liu Quan, Li Pei-Yue, Zhang Ming-Chao, Sui Yong-Xin, Yang Huai-Jiang
  Image Encryption Algorithm Based on Chaos System having Markov Portion
    JEIT   2014 Vol.36 (6): 1271-1277 [Abstract] (1425) [HTML 1 KB] [PDF 462 KB] (938)
2294 Shen Gang, Fu Zheng-Xin, Yu Bin
  On the Generality of (k, n) XOR-based Visual Cryptography Scheme
    JEIT   2013 Vol.35 (10): 2294-2300 [Abstract] (1402) [HTML 1 KB] [PDF 451 KB] (944)
1055 Fu Zheng-Xin, Yu Bin, Fang Li-Guo
  The Access-based Multi-secret Visual Cryptography with Compression Algorithm
    JEIT   2013 Vol.35 (5): 1055-1062 [Abstract] (979) [HTML 1 KB] [PDF 613 KB] (621)
2885 Yu Bin, Shen Gang, Fu Zheng-Xin
  A Lossless Multi-secret Sharing Visual Cryptography Scheme
    JEIT   2012 Vol.34 (12): 2885-2890 [Abstract] (1430) [HTML 1 KB] [PDF 375 KB] (725)
1721 Chen Jia-Yong, Wang Chao, Zhang Wei-Ming, Zhu Yue-Fei
  A Secure Image Steganographic Method in Encrypted Domain
    JEIT   2012 Vol.34 (7): 1721-1726 [Abstract] (1663) [HTML 1 KB] [PDF 272 KB] (1647)
1727 Zhang Wen-Quan, Zhou Nan-Run
  Double-color Image Encryption Based on Discrete Fractional Random Transform
    JEIT   2012 Vol.34 (7): 1727-1734 [Abstract] (1532) [HTML 1 KB] [PDF 732 KB] (920)
1735 Zhu Cong-Xu, Hu Yu-Ping, Sun Ke-Hui
  New Image Encryption Algorithm Based on Hyperchaotic System and Ciphertext Diffusion in Crisscross Pattern
    JEIT   2012 Vol.34 (7): 1735-1743 [Abstract] (1748) [HTML 1 KB] [PDF 424 KB] (1301)
2916 Yang Xiao-Dong, Wang Cai-Fen
  Efficient On-line/Off-line Proxy Re-signature Schemes
    JEIT   2011 Vol.33 (12): 2916-2921 [Abstract] (2442) [HTML 1 KB] [PDF 231 KB] (832)
2922 Cao Dan, Wang Xiao-Feng, Wang Fei, Hu Qiao-Lin, Su Jin-Shu
  SA-IBE: A Secure and Accountable Identity-based Encryption Scheme
    JEIT   2011 Vol.33 (12): 2922-2928 [Abstract] (2212) [HTML 1 KB] [PDF 469 KB] (1046)
163 Yu Bin, Lu Jin-Yuan, Fang Li-Guo
  Verifiable Visual Cryptography Based on Iterative Algorithm
    JEIT   2011 Vol.33 (1): 163-167 [Abstract] (2409) [HTML 1 KB] [PDF 704 KB] (1004)
1480 Wu Liang; Cao Xiao-mei; Yang Geng; Li Da-wei
  An Efficient Broadcast Key Management Policy in Wireless Sensor Networks
    JEIT   2010 Vol.32 (6): 1480-1484 [Abstract] (2572) [HTML 1 KB] [PDF 241 KB] (863)
1515 Zhao Jing-jing; Li Li; Pan Hong-bing; Xu Jun; Wu Zhi-gang; Lin Jun
  High-Speed Hardware Implementation for GCM in IEEE802.1AE
    JEIT   2010 Vol.32 (6): 1515-1519 [Abstract] (2324) [HTML 1 KB] [PDF 260 KB] (1274)
880 Fu Zheng-xin; Yu Bin; Fang Li-guo
  The Multi-secret Visual Cryptography Based on Ring Shares
    JEIT   2010 Vol.32 (4): 880-883 [Abstract] (2499) [HTML 1 KB] [PDF 356 KB] (1001)
727 Zeng Guang; Han Wen-bao; Fan Shu-qin
  Application of σ-LFSR in Stream Cipher AB
    JEIT   2009 Vol.31 (3): 727-730 [Abstract] (2724) [HTML 1 KB] [PDF 255 KB] (1114)
1530 Jin Chen-hui; Zhang Bin; Zhang Yuan-yang
  Analysis and Improvment of the Wu Breaking Algorithm for the Cipher Whitenoise
    JEIT   2006 Vol.28 (8): 1530-1532 [Abstract] (2272) [HTML 1 KB] [PDF 296 KB] (729)
1141 Mei Qi-xiang①②③;He Da-ke; ZhengYu
  Efficient Chosen Ciphertext Secure Public Key Cryptosystem from the ID-Based Encryption of Waters
    JEIT   2006 Vol.28 (6): 1141-1144 [Abstract] (1942) [HTML 1 KB] [PDF 212 KB] (1117)
First page | Prev page | Next page | Last pagePage 1 of 1, 27 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech