Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 573-575.
• Interdiscipline & Application • Previous Articles Next Articles
WU Wei-jian, CHEN Shi-guo,LI Dan
CLC Number:
[1]李娟,王宏大,祝慧,等.一种基于功能安全的汽车 PEPS 系统[J].农业装备与车辆工程,2014(4):57-59. [2]COURTOIS N T,BARD G V.Algebraic and slide attacks on KeeLoq.http://eprint.iacr.org/2007/062. [3]游建雄,李瑞林,李超.轻量级分组密码 Keeloq 的故障攻击[J].北京大学学报(自然科学版),2010,46(5):756-762. [4]COURTOIS N T.Self-similarity attacks on block ciphers and application to keeloq [M]∥Cryptography and Security:From Theory to Applications.Springer Berlin Heidelberg,2012:55-66. [5]刘璟,陈惠滨,叶文才.KeeLoq 算法的改进与实现[J].信号处理,2014,30(11):1335-1338. [6]赵烽.KEELOQ 加密算法安全性探究[J].信息网络安全,2011(8):29-31. [7]王秋燕,金晨辉.KeeLoq 密码第1种滑动-代数攻击的改进[J].计算机工程,2009,35(16):133-137. [8]张健,任洪娥,陈宇.密码学原理及应用技术[M].北京:清华大学出版社,2014. [9]李玲,陈惠滨.基于KEELOQ 的无线遥控车位锁系统设计[J].电子技术应用,2013,39(12):52-54. [10]游子毅,李丹,肖文君.改进的keeloq算法及其在无钥匙进入与启动系统中的应用[J].科学技术与工程,2017,17(20):181-183. |
[1] | SUN Wen-yun, JIN Zhong, ZHAO Hai-tao, CHEN Chang-sheng. Cross-domain Few-shot Face Spoofing Detection Method Based on Deep Feature Augmentation [J]. Computer Science, 2021, 48(2): 330-336. |
[2] | FAN Jian-feng, LI Yi, WU Wen-yuan, FENG Yong. Double Blockchain Based Station Dynamic Loop Information Monitoring System [J]. Computer Science, 2019, 46(12): 155-164. |
[3] | JIAO Wan-ni,WU Kai-gui. Security Vulnerabilities Analysis Technology Based on Multi-core Architecture [J]. Computer Science, 2011, 38(10): 117-120. |
[4] | ZHAO Feng,ZHANG Qin,LI Min. Novel Dynamic Security Analysis Model for Computing System Based on DBN [J]. Computer Science, 2010, 37(2): 61-64. |
[5] | . [J]. Computer Science, 2007, 34(6): 124-127. |
[6] | . [J]. Computer Science, 2007, 34(2): 289-291. |
[7] | YI Xiao-Dong, YANG Xue-Jun (College of Computer, National Univ, of Defense Technology, Changsha 410073). [J]. Computer Science, 2006, 33(1): 153-157. |
|