Citation: | Hou Luoming, Zhou Xiaolei, Chen Chunyan. DEADS——A Useful System for Data Encryption and Decryption[J]. INFORMATION AND CONTROL, 1986, 15(1): 29-32. |
[1] |
Davies,D.W.,Data Security in Data Communi cation and Computer Networks, North-Holland Publishing Company,lg81.
|
[2] |
DES编译组,美国国家标准局《数据加密标准》译文集,四川省灌县101信箱.(内部资料)
|
[3] |
H.卡茨安著,陈太一,屠世祯译,标准数据加密算法,人民邮电出版社.
|
[1] | HE Lile, JIANG Yichun, HE Ning, WU Wen, CAO Jin. Analytical Tuning of Predictive Control for a Multivariable Fractional Dead Time System[J]. INFORMATION AND CONTROL, 2019, 48(6): 687-693. DOI: 10.13976/j.cnki.xk.2019.9248 |
[2] | XIA Fan, YU Xiuwu, LIU Yong, ZHONG Wenhao, GUO Lin, DAI Li, JIANG Hui. An Elliptic-curve and Hilbert-curve Based Privacy-preserving Aggregation Algorithm for Cluster Heads[J]. INFORMATION AND CONTROL, 2019, 48(2): 239-244. DOI: 10.13976/j.cnki.xk.2019.8241 |
[3] | ZHANG Hui, WANG Qinruo, XIANG Guobo, LI Ming. Nonlinearized Design for Twice-optimal Control of a Second-order Dead-time System[J]. INFORMATION AND CONTROL, 2017, 46(6): 664-670. DOI: 10.13976/j.cnki.xk.2017.0664 |
[4] | MA Zenghui, LIU Changliang, KAI Ping'an. Control of Dead-time Systems Based on Disturbance Compensation[J]. INFORMATION AND CONTROL, 2013, 42(5): 570-576. DOI: 10.3724/SP.J.1219.2013.00570 |
[5] | ZHANG Meng, SHI Yimin, YANG Yang. Reliability Estimation for the Generalized Exponential Components in Parallel System Using Masked Data[J]. INFORMATION AND CONTROL, 2011, 40(4): 483-488,496. |
[6] | ZHAO Xue-long, YOU Jing, LI Qian-mu, LIU Feng-yu. Application of Coupled Toggle Cellular Automata in Data Encryption[J]. INFORMATION AND CONTROL, 2005, 34(6): 746-752. |
[7] | LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566. |
[8] | LIAN Shi-guo, SUN Jin-sheng, WANG Zhi-quan. Video Encryption and Its Development[J]. INFORMATION AND CONTROL, 2004, 33(5): 560-566. |
[9] | XIE Kun, LEI Min, FENG Zheng-jin. Test Study on Surrogate Data of Chaotic Encryption Communication System[J]. INFORMATION AND CONTROL, 2004, 33(4): 429-433. |
[10] | LI Chang-gang, HAN Zheng-zhi. THE NEW EVOLUTION OF IMAGE ENCRYPTION TECHNIQUES[J]. INFORMATION AND CONTROL, 2003, 32(4): 339-343,351. |