[1] |
JI Wentao, LI Yuanyuan, QIN Baodong.
Working Mode Recognition for SM4 Block Cipher Based on Decision Tree
[J]. Computer Engineering, 2021, 47(8): 157-161,169.
|
[2] |
BAO Zhiting, KE Junming, YANG Zheng, LONG Hua, HUANG Dong.
Time-based One-Time Password Scheme for PLC
[J]. Computer Engineering, 2021, 47(8): 149-156.
|
[3] |
XIN Wenqian, SUN Bing, LI Chao.
Bit-based Integral Attack on LiCi Algorithm
[J]. Computer Engineering, 2020, 46(7): 136-142.
|
[4] |
ZHU Wenfeng, WANG Qin, GUO Zheng, LIU Junrong.
Research on Attacks Method for Block Ciphers
[J]. Computer Engineering, 2020, 46(1): 102-107,113.
|
[5] |
SHI Shuying, HE Jun.
Impossible Differential Cryptanalysis of GRANULE Algorithm
[J]. Computer Engineering, 2019, 45(10): 134-138.
|
[6] |
ZHANG Pei,ZHANG Wenying.
Related-key Impossible Differential Attack of QARMA Algorithm
[J]. Computer Engineering, 2019, 45(1): 91-95.
|
[7] |
LI Mengzhu,ZHANG Wenying,CHEN Wanpu.
Algebraic Analysis of Key Recovery on ZORRO Iterative Differential Characteristics
[J]. Computer Engineering, 2017, 43(2): 189-193.
|
[8] |
ZHOU Wenjian,JIN Ting.
Blogel-SPINAL:Distributed PPI Network Alignment Algorithm
[J]. Computer Engineering, 2016, 42(4): 209-214,220.
|
[9] |
ZHU Jialiang,WEI Yongzhuang.
Trace Driven Cache Attack on LBlock Algorithm
[J]. Computer Engineering, 2015, 41(5): 153-158.
|
[10] |
MO Zhao, WEI Yong-zhuang.
Detection and Analysis of Key Neutral-bit for Reduced Round LBlock
[J]. Computer Engineering, 2014, 40(3): 28-32,45.
|
[11] |
WANG Chen-Guang, JIAO Shu-Shan, HEI Yong.
Low Complexity Implementation of Block Cipher SM4 Algorithm
[J]. Computer Engineering, 2013, 39(7): 177-180.
|
[12] |
LUO Fang, OU Qiang-Xu, FU Wei.
A Self-synchronic Stream Cipher Model Based on Block Cipher
[J]. Computer Engineering, 2013, 39(6): 170-173.
|
[13] |
GUO Lei, ZHENG Hao-ran, LIU Ming-wei.
Construction of a 16×16 0-1 Matrice with Maximum Branch Number
[J]. Computer Engineering, 2013, 39(12): 118-121.
|
[14] |
BANG Chang-Yong, CHU Ti-Fei, GU Chun-Xiang, MI Shun-Jiang.
Polynomial Expression and Completeness Analysis of 1~5 Round LBlock
[J]. Computer Engineering, 2012, 38(9): 155-157,179.
|
[15] |
HUI Yong-Zhuang, SU Chong-Mao, MA Chun-Bei.
Meet-in-the-Middle Attack on Rijndael-256 Algorithm
[J]. Computer Engineering, 2012, 38(7): 107-109.
|