About 174 item dissertation in line with block cipher query results,the following is 1 to 50(Search took 0.078 seconds)

  1. Analysis and Design of Block Ciphers,LiRuiLin/National University of Defense Science and Technology,0/90
  2. Differential-Algebraic Cryptanalysis on SMS4Cryptosystem,WeiHang/Chengdu University of Technology,0/26
  3. Research on Power Analysis Attack and Countermeasure for Light Weight Block Cipher Algorithm,JiangPeiHe/Harbin Institute of Technology,0/53
  4. Cryptanalysis of Lightweight Block Cipher Algorithms,JiangShaSha/Donghua University,0/56
  5. Algebraic attack lightweight block cipher nonlinear module,LiuFeng/Shandong Normal University,0/2
  6. Analysis of HASH BMW function and SM3 algorithm,MengShuai/Shandong Normal University,0/2
  7. Design and implementation of the lightweight block cipher ESF,LiuXuan/Shandong Normal University,0/7
  8. Research on Power Analysis Attack and Masking Countermeasure for Block Cipher Algorithm,ZhangKaiFeng/Harbin Institute of Technology,0/26
  9. Boomerang Analysis Method Research on the Block Cipher,DuBaoPing/Shandong Normal University,0/40
  10. Analysis Method Research on the Block Cipher AES,WangZhe/Shandong Normal University,0/72
  11. Research on Power Analysis Attacks and Defense Issues of Block Ciphers Chip,LiLang/Hunan University,0/84
  12. Collision Power Analysis on Lightweight Block Cipher Algorithm,YuYanYan/Shandong University,0/89
  13. Cryptanalysis of Block Ciphers and Hash Function Based on Grover’s Quantum Search Algorithms,DuanBoJia/Nanjing University of Aeronautics and Astronautics,2/25
  14. Research on Cryptanalysis of Block Cipher,ZhangLei/PLA Information Engineering University,0/56
  15. Cryptanalysis of IDEA and ARIA Block Cipher,LuLinZhen/PLA Information Engineering University,0/39
  16. Research on Differential and Linear Provable Security of Lai-Massey Scheme,FuLiShi/PLA Information Engineering University,0/1
  17. The Extended Differential Cryptanalysis on Three SPN Block Ciphers,LiuJia/PLA Information Engineering University,0/0
  18. The Analysis of Differential Probability Based on Arithmetic Operation in Block Cipher,HuangYuanMin/Central China Normal University,0/2
  19. Output Error Analysis of Wireless Block Ciphered Transmission and Performance Test for a Stream Cipher,YangQiuHua/Tsinghua University,0/33
  20. The Research, Design and Implementation of Encryption Technology on Special Control of Computer,ChengXiaoNi/Xi'an University of Electronic Science and Technology,0/21
  21. The Research of Countermeasure Against Power Analysis Attack in Block Cipher Applications,YuanZheng/Hunan University,0/23
  22. Design and Implementation of PC Storage Encrypting System Based on Chaos,WangYing/Hangzhou University of Electronic Science and Technology,0/29
  23. Reserch on Several Tranformations in Block Cipher Design,HuXiaoLiang/PLA Information Engineering University,0/19
  24. Cryptanalysis of MISTY1Block Cipher,DaiYiBin/PLA Information Engineering University,0/27
  25. Research on Computing Method of the Differential Probability of SPS Structure,LiuGuoQiang/PLA Information Engineering University,0/26
  26. Security Research Based on Chaotic Block Cipher,ZhengZuo/Xi'an University of Electronic Science and Technology,0/38
  27. Power Analysis and Fault Analysis of Block Cipher and Their Countermeasures,ChenMan/Shandong University,0/23
  28. Research on Differential Power Analysis of Cryptographic Chip and Security Evaluation,LiZhiQiang/PLA Information Engineering University,1/36
  29. Comparative Studies on Chaotic and Traditional Cipher and Application,ZhaoErFan/Xi'an University of Electronic Science and Technology,0/80
  30. Research on the Design and Analysis of Block Cipher Algorithm,LuYanRong/Xi'an University of Electronic Science and Technology,0/86
  31. Cryptanalysis of the AES and SMS4Block Ciphers,DongXiaoLi/Xi'an University of Electronic Science and Technology,0/185
  32. Research and Design of Hash Functions,LiuFei/Nanjing University of Aeronautics and Astronautics,0/138
  33. Research on Impossible Differential Cryptanalysis and Algebraic Cryptanalysis of Some Block Ciphers,LiuYa/Shanghai Jiaotong University,0/135
  34. Design and Security Analysis on Several Cryptography Hash Functions,ZhangShaoLan/Beijing University of Posts and Telecommunications,0/330
  35. Techniques for Cryptanalysis Based on Higher Order Differentials,DuanMing/Shanghai Jiaotong University,0/166
  36. Research and Implementation of Side Channel Attack and Countermeasure,SunChunHui/Xi'an University of Electronic Science and Technology,0/239
  37. Research on High-Performance FH Sequences for Adaptive Frequency Hopping Communications and FPGA Implementation,WanJiaJun/Xi'an University of Electronic Science and Technology,1/32
  38. Research on Security for Wireless Sensor Networks Based on Chaos Encryption,XuLianJie/Harbin Institute of Technology,0/12
  39. Cryptanalysis of Two Symmetric Encryption Algorithms ARIA and SALSA20,LiShenHua/Shandong University,9/333
  40. Study on Block Cipher algorithm Based on Chaos and Group,YangHuaQian/Chongqing University,0/315
  41. Research and Implementation on Key Technologies of Programmable Cryptographic Processors,ZhaoXueMi/National University of Defense Science and Technology,2/254
  42. Research on Applications of Chaos-based Encryptions,ZhangLinHua/Chongqing University,14/1065
  43. Research on the Block Cipher Mode of Operation,WenFengTong/Beijing University of Posts and Telecommunications,5/366
  44. Study on Chaotic Block Cryptography and Its Applications,TangGuoPing/Chongqing University,3/405
  45. The Research on Self-Protection System Based on Multi-Agent,ZhangYaPing/Tianjin University,0/317
  46. The Research of General Parallel Vector Crypto Coprocessor,NiXiaoQiang/National University of Defense Science and Technology,4/213
  47. A Study on Chaos Theory and Its Application in Information Security,DengShaoJiang/Chongqing University,20/1020
  48. Security Test on Cryptographic Algorithms and Design of Key Cryptographic Components,ChenHua/Institute of Software,6/556
  49. The Research and Design of Reconfigurable Cipher Processing Architecture,JiangJingFei/National University of Defense Science and Technology,30/448
  50. Analysis and Design of Block Ciphers,ZhangWenTao/Institute of Software,11/872

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile