[1] |
Xie Zhen, Tan Guangming, Sun Ninghui.
Research on Optimal Performance of Sparse Matrix-Vector Multiplication and Convoulution Using the Probability-Process-Ram Model
[J]. Journal of Computer Research and Development, 2021, 58(3): 445-457.
|
[2] |
Liu Botao, Peng Changgen, Wu Ruixue, Ding Hongfa, Xie Mingming.
Lightweight Format-Preserving Encryption Algorithm Oriented to Number
[J]. Journal of Computer Research and Development, 2019, 56(7): 1488-1497.
|
[3] |
Zhang Qianlong, Hou Rui, Yang Sibo, Zhao Boyan, Zhang Lixin.
The Role of Architecture Simulators in the Process of CPU Design
[J]. Journal of Computer Research and Development, 2019, 56(12): 2702-2719.
|
[4] |
Xie Gaoqi, Wei Hongru.
Impossible Differential Attack of Block Cipher ARIA
[J]. Journal of Computer Research and Development, 2018, 55(6): 1201-1210.
|
[5] |
Li Junnan, Yang Xiangrui, Sun Zhigang.
DrawerPipe: A Reconfigurable Packet Processing Pipeline for FPGA
[J]. Journal of Computer Research and Development, 2018, 55(4): 717-728.
|
[6] |
Cui Jingyi, Guo Jiansheng, Liu Yipeng.
Impossible Differential Attack on Crypton
[J]. Journal of Computer Research and Development, 2017, 54(7): 1525-1536.
|
[7] |
Shen Jianliang, Li Sikun, Liu Lei, Wang Guanwu, Wang Xin, Liu Qinrang.
Hierarchical Configuration Memory Design for Coarse-Grained Reconfigurable SoC
[J]. Journal of Computer Research and Development, 2017, 54(5): 1121-1129.
|
[8] |
Qian Lei, Zhao Jinming, Peng Dajia, Li Xiang, Wu Dong, Xie Xianghui.
Energy-Efficient Fingerprint Matching Based on Reconfigurable Micro Server
[J]. Journal of Computer Research and Development, 2016, 53(7): 1425-1437.
|
[9] |
Fang Minquan, Zhang Weimin, Zhou Haifang.
Parallel Algorithm of Fast Independent Component Analysis for Dimensionality Reduction on Many Integrated Core
[J]. Journal of Computer Research and Development, 2016, 53(5): 1136-1146.
|
[10] |
WangGaoli, GanNan.
A Meet-in-the-Middle Attack on 8-Round mCrypton-96
[J]. Journal of Computer Research and Development, 2016, 53(3): 666-673.
|
[11] |
Xie Xianghui, Qian Lei, Wu Dong, Yuan Hao, Li Xiang.
Ant Cluster: A Novel High-Efficiency Multipurpose Computing Platform
[J]. Journal of Computer Research and Development, 2015, 52(6): 1341-1350.
|
[12] |
Wei Hongru and Yin Guangli.
Related-Key Impossible Differential Cryptanalysis on LBlock
[J]. 计算机研究与发展, 2014, 51(7): 1520-1526.
|
[13] |
Shi Hailong, Li Dong, Qiu Jiefan, and Cui Li.
EasiSHA: A Reconfigurable Node Architecture for IoT Based on Joint Design of Software and Hardware
[J]. Journal of Computer Research and Development, 2014, 51(5): 959-973.
|
[14] |
Zheng Yafei, Wei Hongru.
Biclique Cryptanalysis of Block Cipher SHACAL2
[J]. Journal of Computer Research and Development, 2014, 51(10): 2329-2335.
|
[15] |
Xun Changqing, Yang Qianming, Wu Nan, Wen Mei, and Zhang Chunyuan.
Optimized Software-Hardware Communications for Shared Memory Reconfigurable Computer
[J]. , 2013, 50(8): 1637-1646.
|