[1] |
ZHAO Taifei, YIN Hang, ZHAO Siting.
Anti-Desynchronization and Efficient RFID Mutual Authentication Protocol
[J]. Computer Engineering and Applications, 2019, 55(12): 90-96.
|
[2] |
DENG Qingwen, LIN Zhixian, GUO Tailiang.
Multi table image hash retrieval method based on principal component
[J]. Computer Engineering and Applications, 2018, 54(3): 192-199.
|
[3] |
WANG Yong1,2, CHEN Yan1, ZHAO Yi1.
Parallel Hash function construction based on piecewise Logistic map
[J]. Computer Engineering and Applications, 2018, 54(15): 38-43.
|
[4] |
LI Juanjuan1, GONG Xiangyang2.
Fast cloned tags detection algorithm in large-scale RFID systems
[J]. Computer Engineering and Applications, 2017, 53(8): 106-112.
|
[5] |
CUI Hengshan, TIAN Yuan, DENG Shaojiang.
Improved parallel chaotic hash function using two-way coupled map lattice
[J]. Computer Engineering and Applications, 2016, 52(4): 88-93.
|
[6] |
HUANG Ping, YANG Xiaodong, WANG Caifen.
On-line/off-line signature scheme with strong unforgeability
[J]. Computer Engineering and Applications, 2016, 52(3): 81-84.
|
[7] |
YU Chunwu, GUO Longfei, ZHANG Jian.
HBL: lightweight Hash function
[J]. Computer Engineering and Applications, 2016, 52(20): 1-4.
|
[8] |
LI Huijia, LONG Min.
Design and analysis of HMAC algorithm based on chaotic maps
[J]. Computer Engineering and Applications, 2015, 51(22): 109-114.
|
[9] |
MENG Jinfeng, GAO Zhonghe.
Flow sampling measurement algorithm based on dynamic counting bloom filter
[J]. Computer Engineering and Applications, 2015, 51(17): 92-95.
|
[10] |
HE Bintao1, LIU Lihua1, DENG Fang’an1, WANG Shangping2.
Hash function based on chaotic message expansion
[J]. Computer Engineering and Applications, 2015, 51(14): 78-83.
|
[11] |
WEN Yamin1, LI Fengxia2, GONG Zheng3, TANG Shaohua2.
Optimized implementation of Quark hash function for lightweight AVR microcontrollers
[J]. Computer Engineering and Applications, 2014, 50(23): 104-107.
|
[12] |
LI Zhiwen, ZHANG Wei.
String matching technology for large-scale short pattern set
[J]. Computer Engineering and Applications, 2014, 50(1): 105-110.
|
[13] |
GAO Shujing.
Hash function based on multiple input signature analysis registers
[J]. Computer Engineering and Applications, 2013, 49(21): 95-97.
|
[14] |
LI Jing, LI Zhihui, LAI Hong.
Multi-secret sharing scheme without dealer based on Hash function
[J]. Computer Engineering and Applications, 2012, 48(18): 64-65.
|
[15] |
YAN Na1,2,LI Mengdong2,CHEN Shaohui1,2.
Analysis and improvement of preimage attack on MD-4
[J]. Computer Engineering and Applications, 2011, 47(9): 112-114.
|