[1] |
ZHANG Lei, SHANG Yali, SUN Bo.
A meet-in-the-middle attack on Lblock
[J]. , 2014, 31(4): 564-569.
|
[2] |
SUN Fu-Ling, ZHOU Zhan-Fei, YU Yang.
Rational secret sharing protocol in the context of extensive game with imperfect information
[J]. , 2013, 30(4): 539-546.
|
[3] |
ZHAO Yan, LIN Dong-Dai.
Nonsingular circulant matrices over finite fields
[J]. , 2012, (6): 805-814.
|
[4] |
Two notes on Bent functions of Gold case SUN Guang-Hong, WU Chuan-Kun.
[J]. , 2010, 27(2): 257-262.
|
[5] |
CAO Zheng-Jun, LIU Mu-Lan.
Cryptanalysis of a Blind Proxy Signature Scheme
[J]. , 2006, 23(2): 145-148.
|
[6] |
MA Wei-Ju, FENG Deng-Guo, WU Zhi-Ping.
Cryptanlysis of the Improved Summation Generator
[J]. , 2005, 22(4): 494-498.
|
[7] |
WU Wen-Ling.
Key Technologies in Securities of Wireless Electric Business
[J]. , 2002, 19(3): 324-333.
|
[8] |
HU Lei, PEI Ding-Yi, FENG Deng-Guo.
Construction of a Class of Bent Functions
[J]. , 2002, 19(2): 103-106.
|
[9] |
WU Wen-Ling, ZHANG Yue-Ling.
On Noekeon Block Cipher
[J]. , 2002, 19(2): 168-171.
|
[10] |
Wang Mingsheng, Wang Guilin, Feng Dengguo .
A SECRET SHARING SCHEME BASED ON LINEAR TRANSFORMATION
[J]. , 2001, 18(2): 134-139.
|
[11] |
Sun Linhong, Ye Dingfeng, Lü Shuwang .
Information Leakage of Feedback Network
[J]. , 2001, 18(2): 130-133.
|
[12] |
Zhao Yaqun, Li Shiqu, Zhang Yanxiao .
Several Methods of Constructing Partially-bent Functions
[J]. , 2001, 18(2): 105-109.
|
[13] |
Wu Wenling .
On E2 and Camellia Block Cipher
[J]. , 2001, 18(2): 181-185.
|