×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Archive
2015, 2(5)
30 October 2015
The Innovation of Trusted Computing Based on the Domestic Cryptography
SHEN C X, GONG B
2015, 2(5): 381-389.
Abstract
(
)
PDF (
)
Cryptanalysis of RSA with Special Exposed Least Significant Bits of the Private Key
WANG S X, QU L J, LI C, FU S J
2015, 2(5): 390-403.
Abstract
(
)
PDF (
)
A Survey of Constructions on Bent Functions
YANG X L, HU H G
2015, 2(5): 404-438.
Abstract
(
)
PDF (
)
Constructing Zero-Sum Distinguishers of Two Generalized Feistel Structures
DONG L, WU W L, LI Y J, ZOU J, DU J
2015, 2(5): 439-448.
Abstract
(
)
PDF (
)
Construction of a Class of Quasi-groups for Designing the Cipher Algorithm
LI Y M, GUO Y J, CAO Z J, ZHANG G S
2015, 2(5): 449-457.
Abstract
(
)
PDF (
)
Multidimensional Zero-correlation Linear Cryptanalysis on SMS4 Algorithm
MA M, ZHAO Y Q, LIU Q C, LIU F M
2015, 2(5): 458-466.
Abstract
(
)
PDF (
)
Side Channel Analysis on SM2 Decryption Algorithm
SHI R H, LI Z J, DU L, PENG Q, XU J B
2015, 2(5): 467-476.
Abstract
(
)
PDF (
)
Amplified Template Attacks on Cryptographic Devices Using Hamming Weight Model
OU C H, WANG Z, HUANG W Q, ZHOU X P, AI J, PANG N
2015, 2(5): 477-486.
Abstract
(
)
PDF (
)