[1] |
Yanjun LI, Yaodong GE, Qi WANG, Weiguo ZHANG, Chen LIU.
Improved KLEIN algorithm and its quantum analysis
[J]. Journal of Computer Applications, 2024, 44(9): 2810-2817.
|
[2] |
Yong XIANG, Yanjun LI, Dingyun HUANG, Yu CHEN, Huiqin XIE.
Differential and linear characteristic analysis of full-round Shadow algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3839-3843.
|
[3] |
Zheng XIE, Zihao WANG, Dan TANG, Hang ZHANG, Hongliang CAI.
Double fault tolerant array code with low compilation complexity
[J]. Journal of Computer Applications, 2023, 43(9): 2766-2774.
|
[4] |
Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI.
Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP
[J]. Journal of Computer Applications, 2023, 43(9): 2784-2788.
|
[5] |
Dongdong LIN, Manman LI, Shaozhen CHEN.
Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers
[J]. Journal of Computer Applications, 2023, 43(8): 2462-2470.
|
[6] |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan.
Optimized CKKS scheme based on learning with errors problem
[J]. Journal of Computer Applications, 2021, 41(6): 1723-1728.
|
[7] |
XU Zhiqiang, JIANG Tiegang, YANG Libo.
Stochastic support selection based generalized orthogonal matching pursuit algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 1104-1108.
|
[8] |
Wenli WU, Guohua LIU, Junbao ZHANG.
Complexity analysis of functional query answering on big data
[J]. Journal of Computer Applications, 2020, 40(2): 416-419.
|
[9] |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang.
Integral attack on PICO algorithm based on division property
[J]. Journal of Computer Applications, 2020, 40(10): 2967-2972.
|
[10] |
ZHAO Kunsong, YU Dunhui, ZHANG Wanshan.
Priority calculation method of software crowdsourcing task release
[J]. Journal of Computer Applications, 2018, 38(7): 2032-2036.
|
[11] |
YU Dunhui, WANG Yi, ZHANG Wanshan.
Ability dynamic measurement algorithm for software crowdsourcing workers
[J]. Journal of Computer Applications, 2018, 38(12): 3612-3617.
|
[12] |
LIU Xiaoqiang, WEI Yongzhuang, LIU Zhenghong.
New design of linear structure for round-reduced Keccak
[J]. Journal of Computer Applications, 2018, 38(10): 2934-2939.
|
[13] |
ZHOU Wei, GUO Mengyu, XIANG Danlei.
Improved QRD-M detection algorithm for spatial modulation system
[J]. Journal of Computer Applications, 2018, 38(10): 2950-2954.
|
[14] |
MA Yunfei, WANG Tao, CHEN Hao, HUANG Changyang.
Algebraic fault attack on lightweight block ciphers SIMON
[J]. Journal of Computer Applications, 2017, 37(7): 1953-1959.
|
[15] |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui.
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm
[J]. Journal of Computer Applications, 2017, 37(6): 1605-1608.
|