Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Beijing Electronic Science and Technology Institute
1672-464X
2013 Issue 4
bei jing dian zi ke ji xue yuan xue bao zheng gao qi shi zi ran ke xue ban
..............
page:0-0
A Chaos Map-based Scheme for Deniable Authentication
Sun Jinhui;,Zhao Geng;
..............
page:1-4
Analysis of Nonlinear Transformation x of Keccak
Guo Xing;,Shi Rui;,Zhang Cong;,Zheng Xiulin;
..............
page:5-8
FPGA Realization of Digital Signature based on SHA-3
Yang Junming;,Yang Yatao;
..............
page:9-14
Research on elliptic curve cryptographic algorithms based on Chaotic System
Liu Minglai;,Wang Kun;,Wei Guangzheng;,Zhao Geng;
..............
page:15-19
The Implementation of SM4 Algorithm on Multi-core System Based on FSL
Li Ge;,Tao Lin;,Zhang Lei;
..............
page:20-24
A New One-time Group Signature Based on Hash Function
Bai Jian;,Li Xiaodong;,Liu Hui;
..............
page:25-29
Research on the Development of the Lattice-Reduction
Bai Jian;,Li Zichen;,Liu Hui;,Yang Yatao;
..............
page:30-34
Scheme Design for the Integrated Service of the Internet of Things and Geographic Information
Ma Xuping;,Mo Xinyu;
..............
page:35-39
Research On The Integral Distinguisher For SMS4
Ma Jingyi;,Shi Rui;,Zhang Zhenmin;,Zhen Xiulin;
..............
page:40-45
Study of AMPDR2 C Model-based eParty System
Lou Jiapeng;,Peng Bo;
..............
page:46-49
The design and complement of hierarchical management Electronic Signature System
Hu Ronglei;,Jiang Hua;,Li Haoliang;,Liu Juan;
..............
page:50-55
Design and Implementation of Electronic Documents Security Label
Huang Xiaoshuai;,Qin Xiaolei;,Xu Shengwei;,Zhang Xiaoshuai;
..............
page:56-59
The Implementation of an ARQ Mechanism Based on Network Coding in Wifi Unicast Traffic
Guo Yucui;,Pan Luyuan;,Xu Guoai;,Zhou Yajian;
..............
page:60-65,73
Application of Improved SQUARE Model in Software Security Requirements Elicitation
Fan Jie;,Lou Jiapeng;,Xu Shengwei;
..............
page:66-73
The Applications of Linear Algebra in Cryptology
Li Jia;,Li Yuannan;
..............
page:74-79
Digital Frequency Divider Based on the FPGA
Li Xuemei;,Zhou Simin;
..............
page:80-84
Implementation of Rainbow Tables to Crack PowerPoint Password on GPU-based Heterogeneous System
Li Xiaoxiao;
..............
page:85-92