›› 2012, Vol. ›› Issue (06): 1515-1520.
Previous Articles Next Articles
HU Liang1, YAN Zhi-jia2, CHU Jian-feng1, YUAN Wei1, XU Xiao-bo1
CLC Number:
| [1] Lai Xue-jia, Massey J L. A proposal for a new block encryption standard[C]//Eurocrypt'90 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, New York, USA 1991: 389-404. [2] Lai Xue-jia, Massey J L. Hash function based on block ciphers[C]//Lecture Notes in Computer Science, 1993, 658: 55-70. [3] Hawkes P. Differential-linear weak key classes of IDEA[J]. Lecture Notes in Computer Science, 1998, 1403:112-126. [4] 杨维忠,李彤. 变长密钥的IDEA算法的研究与实现[J]. 计算机工程,2004,30(9):139-141. Yang Wei-zhong, Li Tong. Study and implementation of IDEA of the variable length keys[J]. Computer Engineering,2004,30(9):139-141. [5] 吴伟彬, 黄元石. IDEA算法的改进及其应用[J].福州大学学报:自然科学版,2004(增刊1):28-31. Wu Wei-bin, Huang Yuan-shi. The improvement of IDEA algorithm and its application[J]. Journal of Fuzhou University(Natural Science),2004(Sup.1):28-31. [6] 张青凤,殷肖川,李长青. IDEA算法及其编程实现[J]. 现代电子技术,2006(1):69-71. Zhang Qing-feng,Yin Xiao-chuan,Li Chang-qing. Principle and implementation of the IDEA algorithm[J]. Modern Electronics Technique,2006(1):69-71. [7] Lai X J,Massey J L,Murphy S. Markov ciphers anddifferential cryptanalysis[C]//Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, Heidelberg,1992:17-38. [8] Schneier B. 应用密码学[M]. 吴世忠译.北京:机械工业出版社, 2000. [9] Stallings W. 密码编码学与网络安全:原理与实践[M]. 第4版.孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2001. [10] Daemen J, Govaerts R,Vandewalle J. Weak keys for IDEA[C]//Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology,New York, USA,1993:224-231. [11] Meier W. On the security of the IDEA block cipher[J]. Lecture Notes in Computer Science, 1994, 765:371-385. [12] Hawkes P,O'Connor L. On applying linear cryptanalysis to IDEA[J]. Lecture Notes in Computer Science, 1996, 116:105-115. [13] 鲁林真,陈少真. 对5轮IDEA算法的两种攻击[J]. 北京大学学报,2010,46(5):731-735. Lu Lin-zhen,Chen Shao-zhen. Two attacks on 5-round IDEA[J]. Acta Scientiarum Naturalium Universitatis Pekinensis,2010,46(5):731-735. |
| [1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
| [2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
| [3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
| [4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
| [5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
| [6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
| [7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
| [8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
| [9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
| [10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
| [11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
| [12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
| [13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
| [14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
| [15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|
||