Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing Electronic Science and Technology Institute
1672-464X
2013 Issue 4
A Chaos Map-based Scheme for Deniable Authentication
Sun Jinhui;,Zhao Geng;
..............page:1-4
Analysis of Nonlinear Transformation x of Keccak
Guo Xing;,Shi Rui;,Zhang Cong;,Zheng Xiulin;
..............page:5-8
FPGA Realization of Digital Signature based on SHA-3
Yang Junming;,Yang Yatao;
..............page:9-14
Research on elliptic curve cryptographic algorithms based on Chaotic System
Liu Minglai;,Wang Kun;,Wei Guangzheng;,Zhao Geng;
..............page:15-19
The Implementation of SM4 Algorithm on Multi-core System Based on FSL
Li Ge;,Tao Lin;,Zhang Lei;
..............page:20-24
A New One-time Group Signature Based on Hash Function
Bai Jian;,Li Xiaodong;,Liu Hui;
..............page:25-29
Research on the Development of the Lattice-Reduction
Bai Jian;,Li Zichen;,Liu Hui;,Yang Yatao;
..............page:30-34
Research On The Integral Distinguisher For SMS4
Ma Jingyi;,Shi Rui;,Zhang Zhenmin;,Zhen Xiulin;
..............page:40-45
Study of AMPDR2 C Model-based eParty System
Lou Jiapeng;,Peng Bo;
..............page:46-49
The design and complement of hierarchical management Electronic Signature System
Hu Ronglei;,Jiang Hua;,Li Haoliang;,Liu Juan;
..............page:50-55
Design and Implementation of Electronic Documents Security Label
Huang Xiaoshuai;,Qin Xiaolei;,Xu Shengwei;,Zhang Xiaoshuai;
..............page:56-59
The Implementation of an ARQ Mechanism Based on Network Coding in Wifi Unicast Traffic
Guo Yucui;,Pan Luyuan;,Xu Guoai;,Zhou Yajian;
..............page:60-65,73
Application of Improved SQUARE Model in Software Security Requirements Elicitation
Fan Jie;,Lou Jiapeng;,Xu Shengwei;
..............page:66-73
The Applications of Linear Algebra in Cryptology
Li Jia;,Li Yuannan;
..............page:74-79
Digital Frequency Divider Based on the FPGA
Li Xuemei;,Zhou Simin;
..............page:80-84