Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Changsha University of Electric Power(Natural Science)》 2002-04
Add to Favorite Get Latest Update

Encrypt Arithmetic of Symmetry

LIU Xiang-hua (Dept. of Math. & Computer,Changsha Univ. of Electr. Power,Changsha 410077,China)  
A quick and safe encryption arithmetic of symmetry is proposed, which has the same arithmetic in encryption and decryption without arithmetic logical operation.
【CateGory Index】: TP309.7
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 ;Design and Implementation of Data Encryption Groupware[J];Software Guide;2008-11
Chinese Journal Full-text Database 10 Hits
1 Cheng Wei (Beijing Polytechnic College,Beijing 100042,China);Research of Electric Power System Safety[J];Journal of Beijing Polytechnic College;2008-03
2 FU Xiao-xiao,WANG Shi-min(College of Computer Science and Technology,Beijing Technology and Business University,Beijing 100037,China);POKER GAME BASED ON RSA ENCRYPT ARITHMETIC[J];Journal of Beijing Technology and Business University(Natural Science Edition);2007-05
3 ZHANG Dei ming (Department of Postgraduate Education,Chongqing University of Posts and Telecommunication,Chongqing 400065);Internet Security —— Packet Filter and Firewall[J];Journal of Chongqing University of Posts and Telecommunications;1999-04
4 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
5 LIU Xiao hong (The 613th Research Institute of AVIC, Luoyang 471009);Virus Defense Technology for Avionics[J];Electronics Optics & Control;2001-03
6 Yu Yu; Cheng Yunshan; Wang Dawei (Datong Electric Technical & Enginerring Schcol);The Study of the Testing Method of Electric Network Connection[J];JOURNAL OF ELECTRIC POWER;1999-03
7 Xiang Jidong, Huang Tianshu, Guan Huanmei (Wuhan University, Wuhan 430072, China);A REAL-TIME ANTI-VIRUS SYSTEM BASED ON GATEWAY FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2003-17
8 MA Xiao-hu(The Information Department of Ningxia Vocational and Technical College, Yinchuan 750002, China);The Information Safety Mechanism of National Universities and Colleges Online Enrolment System[J];Computer Knowledge and Technology;2006-35
9 WANG Ding-jun (Computer College,Chongqing University,Chongqing 400044);Analysis for Campus Network Information Security[J];Journal of Huaihua University;2007-03
10 FU Li-zhi (Basic Science Department of Jiaozuo University,Jiaozuo454003,China);Transformation model of similitude in diagonalization of symmetric matrices[J];Henan Science;2005-04
Chinese Journal Full-text Database 8 Hits
1 LI Xiao ping, YAN Guang wei, WANG Xuan feng, LI De zhi, ZHANG Yang, ZHANG Lin (Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing100081, China);Single Sign-On (SSO) System Based on Public-Key Infrastructure[J];Journal of Beijing Institute of Technology;2002-02
2 ZHAO Xing-yang (No.101 Section, the Second Artillary Engineering Institute, Xi'an 710025,China);A new symmetric block ciphering algorithm—SEA[J];Information Technology;2004-07
3 QIN Zhi-guang (College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China);Cryptography Algorithm- Survey and Trends[J];Computer Applications;2004-02
4 ZHU Ting-ge,YANG Bo (Ministry of Education Key Laboratory of Computer Networks & Information Security, Xidian University, Xi'an Shanxi 710071, China);Role-based Dynamic Access Control[J];Application Research of Computers;2005-09
5 FU Guo-qiang, ZHAO Yi-bin (Information Center,Shenzhen Polytechnic,Shenzhen 518055,China);The Technology of Internet Information Security by Using SSL and Its Implement[J];Computer and Modernization;2001-05
6 WANG Shang-Ping1,2+, WANG Yu-Min2, ZHANG Ya-Ling1 1(Science School, Xi抋n University of Technology, Xi抋n 710048, China) 2(National Key Laboratory on ISN, Xidian University, Xi抋n 710071, China);A Confirmer Signature Scheme Based on DSA and RSA[J];Journal of Software;2003-03
7 Zhao Shengmei Zheng Baoyu (Department of Information Engineering,Nanjing University of Post &Telecommunication,Nanjing 210003);Quantum Key Distribution Protocol a nd Its Security[J];Communications Technology;2001-09
8 CHEN Yi,GENG Guo-hua,LI Zhe (Dept.of Computer Sci.,Northwest Univ.,Xi'an 710069,China);Research and Application of Dynamic Access Controls[J];Computer Technology and Development;2006-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved