About 127 item dissertation in line with stream cipher query results,the following is 1 to 50(Search took 0.070 seconds)
 Based on the Theory of Chaos Encryption Algorithm,HuangGe/Central South University,0/7
 Research and Implementation of Secure Voice Communication,YinManGang/Hangzhou University of Electronic Science and Technology,0/30
 The KError Linear Complexity Distribution of Periodic Unbalanced Binary Sequences,WangHongCui/Hangzhou University of Electronic Science and Technology,0/0
 Research on the Security in Wireless Sensor Network Based on Stream Cipher,LiXu/Northwest Normal University,0/5
 The Design and Implementation of Mobile Storage Device Encryption System Based on Chaos,WangChunLei/Hangzhou University of Electronic Science and Technology,0/64
 New Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity,ZhuFengQin/Fudan University,0/18
 Researches on the KError Linear Complexity of Some Periodic Sequences,PiFei/PLA Information Engineering University,0/19
 Security Analysis on BlockLike Type Stream Ciphers,ZhangZhongYa/PLA Information Engineering University,0/28
 Research on Some Properties of Primitive σ LFSR Sequences,TanGangMin/PLA Information Engineering University,1/12
 Research on KError Linear Complexity of Periodic Sequences,PangXiaoBo/Hangzhou University of Electronic Science and Technology,0/5
 Differential Power Analysis of the Stream Ciphers with Filter Structure,QuBo/Shanghai Jiaotong University,0/18
 Design of interactive pseudorandom sequence generator,SunXiaoHong/Central South University,0/14
 Research on the2Adic Complexity and Linear Complexity of Periodic Sequences,ZhaoZuo/Beijing University of Posts and Telecommunications,0/7
 Research of Distinguishing Attacks on eSTREAM Candidates,LiShunBo/Xi'an University of Electronic Science and Technology,0/1
 Research on Several Driven Components in Stream Ciphers,WangQiuYan/PLA Information Engineering University,0/6
 A New Selfshrinkingcontrolled Generator,LiChengHang/Zhengzhou University,0/3
 The Designs of Stream Cipher Based on FCSR and Their Analysis,PanZhen/Southwest Jiaotong University,0/16
 Research on Attacks about LEX Algorithm,LiXin/Jinan University,0/4
 Output Error Analysis of Wireless Block Ciphered Transmission and Performance Test for a Stream Cipher,YangQiuHua/Tsinghua University,0/33
 Research on Some Related Problems of σLFSR Sequences,HuDaLiang/PLA Information Engineering University,0/12
 Study on the application of S box in sequence cryptology,YangBin/Yunnan University,0/15
 Research on Counting and Characterization of Periodic Sequences with kError Linear Complexity,ZuoFeng/Hangzhou University of Electronic Science and Technology,0/24
 Stream Cipher Based on Quasigroups with Keystream Period of Arbitrary Length,ZhangJuanJuan/Ningbo University,0/21
 Security Analysis on ZUC and Study of Cube Attack,DuHongHong/Shandong Normal University,0/32
 Security Analysis on the Initialization Algorithm of Stream Ciphers,DingLin/PLA Information Engineering University,0/46
 Research on the Design and Analysis of Stream Ciphers,LianZhiZhu/Xi'an University of Electronic Science and Technology,1/93
 Stream Cipher Machine Design Based on FPGA,ZhuZuo/Xi'an University of Electronic Science and Technology,1/39
 Continuous Variable Quantum Cryptography Communication Techniques,LuZuo/Shanghai Jiaotong University,0/159
 Cryptanalysis of Two Symmetric Encryption Algorithms ARIA and SALSA20,LiShenHua/Shandong University,9/333
 Research on Key Technologies of Cipher Theory,ZhuBaoPing/Nanjing University of Technology and Engineering,0/367
 Pseudorandomness of the Generalized SelfShrinking Sequences,DongLiHua/Xi'an University of Electronic Science and Technology,2/96
 Analysis and Design of Chaotic Stream Cipher,WeiJun/Chongqing University,7/718
 On the Spectrum of rSelfOrthogonal Latin Squares and Its Applications,XuYunQing/Beijing Jiaotong University,0/83
 A Study on Chaos Theory and Its Application in Information Security,DengShaoJiang/Chongqing University,20/1020
 Analysis of the Linear Complexity and Its Stability for Periodic Sequences,NiuZhiHua/Xi'an University of Electronic Science and Technology,8/320
 Research on ErrorCorrecting Codes and Sequence Ciphers Over Finite Rings in Information Safety,ZhuShiXin/Hefei University of Technology,5/381
 Stream Cipbers and Analysis of Its Complexity,WeiShiMin/Xi'an University of Electronic Science and Technology,9/645
 Research on Several Key Problems of Algebraic Attacks on Stream Ciphers,ChenYinDong/Fudan University,0/298
 On Several Cryptanalytic Techniques of Stream Ciphers,YangWenFeng/Xi'an University of Electronic Science and Technology,0/111
 Research on Some Topics of Modern Cryptosystem,ZhangLong/Beijing University of Posts and Telecommunications,0/239
 Encryption technology of video information,WangLiFeng/Beijing University of Posts and Telecommunications,0/284
 The Synchronization Control Theory in Chaosbased Secure Communication and It’s Application,ZhuZiQi/Huazhong University of Science and Technology,1/186
 Research on the Design and Simulation of Symmetric Cipher Cluster,YangHongZhi/PLA Information Engineering University,1/145
 Research on Resistance of Boolean Functions to Algebraic Attacks,DuYuSong/Guangzhou University,0/191
 Cellular Automata Theory in stream cipher application,ZhuXiangYan/Nanjing University of Technology and Engineering,0/123
 Research on the Depth Distribution of Linear Codes and the Generalized Derivatives of Binary Sequences,ZhangDaoFu/Hefei University of Technology,0/20
 Improvement of AKA Protocol and Design of Cryptography Algorithm in 3G,LiuJiaZuo/PLA Information Engineering University,2/232
 Study on Algebraic Attack Based on Stream Cipher and the Immunity of Boolean Function,LuoWeiHua/National University of Defense Science and Technology,2/161
 Authentication Research Based on HDCP Protocol and Stream Cipher Algorithm Implementation,SongYaPing/Shanghai Jiaotong University,5/251
 Research about Several Questions Such as Expansion of Pseudorandom Sequence in the Stream Cipher,SunLei/Liaoning Technical University,0/91
Total 3 Pages First Previous 1 2 3 Next Last
© 2012 www.DissertationTopic.Net Mobile
