[1] |
Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai.
A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
[J]. Journal of Computer Research and Development, 2020, 57(10): 2147-2157.
|
[2] |
Zhang Runlian, Sun Yaping, Wei Yongzhuang, Li Yingxin.
A New Automatic Search Method for Cryptographic S-Box
[J]. Journal of Computer Research and Development, 2020, 57(7): 1415-1423.
|
[3] |
Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin.
Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things
[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228.
|
[4] |
Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo.
Post-Quantum Privacy Preserving Smart Metering System
[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242.
|
[5] |
Li Wei, Wu Yixin, Gu Dawu, Cao Shan, Liao Linfeng, Sun Li, Liu Ya, Liu Zhiqiang.
Ciphertext-Only Fault Analysis of the LBlock Lightweight Cipher
[J]. Journal of Computer Research and Development, 2018, 55(10): 2174-2184.
|
[6] |
Qu Longjiang, Chen Xi, Niu Tailin, Li Chao.
Recent Progress in Low Differential Uniformity Functions over Finite Fields
[J]. Journal of Computer Research and Development, 2018, 55(9): 1931-1945.
|
[7] |
Li Gongli, Dai Zibin, Xu Jinhui, Wang Shoucheng, Zhu Yufei, Feng Xiao.
Design of Block Cipher Processor Based on Stream Architecture
[J]. Journal of Computer Research and Development, 2017, 54(12): 2833-2842.
|
[8] |
Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin.
Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things
[J]. Journal of Computer Research and Development, 2017, 54(10): 2205-2214.
|
[9] |
Yin Jun, Ma Chuyan, Song Jian, Zeng Guang, Ma Chuangui.
Security Analysis of Lightweight Block Cipher ESF
[J]. Journal of Computer Research and Development, 2017, 54(10): 2224-2231.
|
[10] |
Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng.
An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio
[J]. Journal of Computer Research and Development, 2017, 54(10): 2255-2267.
|
[11] |
Chen Zhenhua, Li Shundong, Wang Daoshun, Huang Qiong, Dong Lihong.
Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method
[J]. Journal of Computer Research and Development, 2017, 54(7): 1549-1556.
|
[12] |
Ke Yan, Zhang Minqing, Su Tingting.
A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE
[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322.
|
[13] |
Liu Mingjie, Wang An.
Fully Homomorphic Encryption and Its Applications
[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603.
|
[14] |
Zhang Qikun1, Wang Ruifang1, Tan Yu'an2.
Identity-Based Authenticated Asymmetric Group Key Agreement
[J]. 计算机研究与发展, 2014, 51(8): 1727-1738.
|