[1] |
XIA Wentao, PAN Senshan, WANG Liangmin.
An Ultra-lightweight Stream Cipher Algorithm for RFID
[J]. Computer Engineering, 2019, 45(10): 144-149.
|
[2] |
DING Jie,SHI Hui,GONG Jing,DENG Yuanqing.
An Improved Algorithm of Key Stream Extraction with Slide Attack Resistant
[J]. Computer Engineering, 2018, 44(2): 158-162.
|
[3] |
WEI Wanyin,DU Xiaoni,WANG Guohui.
Research on Linear Complexity of Quaternary Sequences with Period 2pq
[J]. Computer Engineering, 2016, 42(3): 161-164.
|
[4] |
DAI Xiaoping,BI Songsong,WANG Xifeng,ZHOU Jianqin.
2 n-periodic Sequences with Second Descent Point of k-error Linear Complexity
[J]. Computer Engineering, 2016, 42(1): 156-162.
|
[5] |
WANG Qiu-yan, JIN Chen-hui.
Related-key Attack on LEX Algorithm
[J]. Computer Engineering, 2014, 40(4): 141-145,150.
|
[6] |
WANG Qiu-yan, JIN Chen-hui.
Criteria for Nonsingularity of Grain-like Cascade Feedback Shift Register
[J]. Computer Engineering, 2014, 40(3): 167-170,174.
|
[7] |
DAN Yong-Fang, DU Xiao-Ni, YAN Tong-Jiang, LI Xu.
Study of Linear Complexity of Generalized Cyclotomic Sequences with Period pm
[J]. Computer Engineering, 2013, 39(7): 189-192,199.
|
[8] |
LUO Fang, OU Qiang-Xu, FU Wei.
A Self-synchronic Stream Cipher Model Based on Block Cipher
[J]. Computer Engineering, 2013, 39(6): 170-173.
|
[9] |
LI Xu, DU Xiao-Ni, ZHANG Ji, WANG Cai-Fen.
Algebraic Attack and Improvement on WSN Stream Cipher Encryption Scheme
[J]. Computer Engineering, 2013, 39(3): 142-145.
|
[10] |
WANG Jin-ling, GAO Peng-ge.
New Self-shringking Controlled Generator on GF(3)
[J]. Computer Engineering, 2013, 39(11): 127-130,135.
|
[11] |
GONG Ji-Zhong, CHEN Gong-Liang, LI Lin-Sen, LI Jian-Hua.
RFID Secure Authentication Protocol Based on Stream Cipher
[J]. Computer Engineering, 2012, 38(18): 126-129.
|
[12] |
HU Da-Liang, CENG Guang, HAN Wen-Bao, LIU Xiang-Hui.
Research on Interval Vector Properties of Primitive s-LFSR Sequences
[J]. Computer Engineering, 2012, 38(13): 105-107.
|
[13] |
LIU Shu-Kai, GUAN Jie, CHANG E-Qi.
Guess and Decision Attack for Stream Cipher K2 Algorithm
[J]. Computer Engineering, 2011, 37(7): 168-170.
|
[14] |
GU Yan-Yan, DONG Li-Hua, HU Yu-Pu.
Study on Quadratic Span of Multiple Binary Sequences
[J]. Computer Engineering, 2011, 37(4): 31-33.
|
[15] |
ZHANG Hai-Xia, HU Yu-Pu, CHAI Jin.
Guess and Determine Attack on SOSEMANUK
[J]. Computer Engineering, 2011, 37(4): 170-171.
|