[1] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[2] |
WANG Yong, ZHU Guang, WANG Ying.
Hyperchaotic image encryption algorithm based on cellular neural network and AES algorithm
[J]. Computer Engineering and Applications, 2018, 54(21): 194-200.
|
[3] |
WANG Yong, LI Jinyang, WANG Ying.
Hyperchaotic image encryption algorithm based on 4D of Hopfield-type neural network and AES algorithm
[J]. Computer Engineering and Applications, 2018, 54(17): 202-207.
|
[4] |
ZHAO Yuehua, MA Linlin.
Research of AES’s lightweight complementation technique
[J]. Computer Engineering and Applications, 2015, 51(6): 79-83.
|
[5] |
LI Yongda, WANG Danghui, HUANG Xiaoping.
ZIP password recovery on GPU
[J]. Computer Engineering and Applications, 2015, 51(2): 190-193.
|
[6] |
LIU Lan1, YAO Xingzhong2, WANG Zhenyu1, YANG Xiaofei1.
FPGA implementation of “One Frame One Key” encryption/decryption solution suitable for CCSDS
[J]. Computer Engineering and Applications, 2015, 51(10): 84-88.
|
[7] |
DUAN Erpeng, YAN Yingjian, LIU Kai.
Research on attack point of correlation power analysis against AES cryptographic chip
[J]. Computer Engineering and Applications, 2013, 49(4): 91-94.
|
[8] |
CHEN Kaiyan1, YU Hao1, ZOU Cheng1, WU Hengxu2.
Differential ElectroMagnetic analysis attacks on FPGA cipher chip in near field
[J]. Computer Engineering and Applications, 2013, 49(18): 89-93.
|
[9] |
JIANG Wenming, SHENG Liyuan, LI Feng.
Pseudo random number generator based on block cipher of rijndael
[J]. Computer Engineering and Applications, 2012, 48(6): 96-98.
|
[10] |
LIU Lian-hao,WEN Cong-jian.
Differential-algebraic attack on AES
[J]. Computer Engineering and Applications, 2010, 46(5): 111-113.
|
[11] |
YANG Hong-zhi,HAN Wen-bao,SHEN Yong.
Analysis and design of AES diffusion layer
[J]. Computer Engineering and Applications, 2009, 45(36): 12-14.
|
[12] |
ZOU Cheng,ZHANG Peng,DENG Gao-ming,ZHAO Qiang.
Differential Power Analysis resistant hardware implementation of AES cryptosystem
[J]. Computer Engineering and Applications, 2009, 45(36): 63-65.
|
[13] |
ZHAO Xin-jie,MI Dong,WANG Tao,ZHENG Yuan-yuan,CHEN Cai-sen,ZHENG Wei.
Access-driven Cache attack method against AES on the first two rounds
[J]. Computer Engineering and Applications, 2009, 45(16): 130-133.
|
[14] |
SUN Ying-hong1,TONG Yuan-man2,WANG Zhi-ying2.
AES implementation based on instruction extension and randomized scheduling
[J]. Computer Engineering and Applications, 2009, 45(16): 106-110.
|
[15] |
CHEN Guo1,2.
Research of encryption in network test systems
[J]. Computer Engineering and Applications, 2008, 44(19): 129-131.
|