[1] |
Liu Botao, Peng Changgen, Wu Ruixue, Ding Hongfa, Xie Mingming.
Lightweight Format-Preserving Encryption Algorithm Oriented to Number
[J]. Journal of Computer Research and Development, 2019, 56(7): 1488-1497.
|
[2] |
Xie Gaoqi, Wei Hongru.
Impossible Differential Attack of Block Cipher ARIA
[J]. Journal of Computer Research and Development, 2018, 55(6): 1201-1210.
|
[3] |
Zhao Xiaofei, Shi Zhongzhi, Feng Zhiyong.
Transformation Algorithm and Its Properties for D3L with Heterogeneous Semantic Mapping
[J]. Journal of Computer Research and Development, 2018, 55(12): 2715-2724.
|
[4] |
Xu Xiao, Ding Shifei, Sun Tongfeng, Liao Hongmei.
Large-Scale Density Peaks Clustering Algorithm Based on Grid Screening
[J]. Journal of Computer Research and Development, 2018, 55(11): 2419-2429.
|
[5] |
Cui Jingyi, Guo Jiansheng, Liu Yipeng.
Impossible Differential Attack on Crypton
[J]. Journal of Computer Research and Development, 2017, 54(7): 1525-1536.
|
[6] |
Li Gongli, Dai Zibin, Xu Jinhui, Wang Shoucheng, Zhu Yufei, Feng Xiao.
Design of Block Cipher Processor Based on Stream Architecture
[J]. Journal of Computer Research and Development, 2017, 54(12): 2833-2842.
|
[7] |
WangGaoli, GanNan.
A Meet-in-the-Middle Attack on 8-Round mCrypton-96
[J]. Journal of Computer Research and Development, 2016, 53(3): 666-673.
|
[8] |
Wei Hongru and Yin Guangli.
Related-Key Impossible Differential Cryptanalysis on LBlock
[J]. 计算机研究与发展, 2014, 51(7): 1520-1526.
|
[9] |
Zhou Junping, Jiang Yunhui, and Yin Minghao.
New Worst-Case Upper Bounds for X2SAT
[J]. Journal of Computer Research and Development, 2014, 51(3): 598-605.
|
[10] |
Zhai Zhigang, Wang Jiandong, Cao Zining, and Mao Yuguang,.
Hybrid Role Mining Methods with Minimal Perturbation
[J]. , 2013, 50(5): 951-960.
|
[11] |
Yu Xiaoli, , Wu Wenling, and Li Yanjun.
Integral Attack of Reduced-Round MIBS Block Cipher
[J]. , 2013, 50(10): 2117-2125.
|
[12] |
Shen Zhijun, and Zeng Huashen.
A Load Balanced Switch Architecture Based on Implicit Flow Splitter
[J]. , 2012, 49(6): 1220-1227.
|
[13] |
Zhao Xinjie, Wang Tao, Guo Shize, and Liu Huiying.
Cache Attacks on Block Ciphers
[J]. , 2012, 49(3): 453-468.
|
[14] |
Zhao Xinjie, Wang Tao, Guo Shize, and Liu Huiying.
Cache Attacks on Block Ciphers
[J]. , 2012, 49(3): 453-468.
|
[15] |
Zhang Yu, Liu Ping, Liu Yanbing, Tan Jianlong, and Guo Li.
Algorithmic Complexity Attacks Against WuManber
[J]. , 2011, 48(8): 1381-1389.
|