共 18 条
[1]
Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation[J]. TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China;2School of Science, Harbin Institute of Technology, Weihai 264209, China.Science China(Information Sciences). 2010(01)
[4]
New related-key rectangle attacks on reduced AES-192 and AES-256[J]. WEI YongZhuang & HU YuPu Key Laboratory of Computer Networks & Information Security of Ministry of Education,Xidian University,Xi’an 710071,China.Science in China(Series F:Information Sciences). 2009(04)
[6]
Construction and enumeration of Boolean functions with maximum algebraic immunity[J]. ZHANG WenYing1,2, WU ChuanKun2 & LIU XiangZhong3 1 School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China;2 State Key Lab of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China;3 No. 2 Middle School Attached to Shandong Normal University, Jinan 250014, China.Science in China(Series F:Information Sciences). 2009(01)
[7]
Chaos block cipher for wireless sensor network[J]. CHEN Shuai1,ZHONG XianXin2 & WU ZhengZhong2 1 Department of Physics,Huainan Normal University,Huainan 232001,China;2 Key Lab for Optoelectronic Technology and System,Ministry of Education,Chongqing University,Chongqing 400030,China.Science in China(Series F:Information Sciences). 2008(08)
[8]
New designing of cryptosystems based on quadratic fields[J]. DONG XiaoLei,CAO ZhenFu & WANG LiCheng Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,China.Science in China(Series F:Information Sciences). 2008(08)