Citation: | ZHANG Lei, SHANG Yong, CHENG Yuxin, XIANG Haige. MMSE Turbo Equalizer with Preprocessor[J]. Chinese Journal of Electronics, 2009, 18(3): 500-503. |
[1] | JIAO Zhipeng, CHEN Hua, FENG Jingyi, KUANG Xiaoyun, YANG Yiwei, LI Haoyuan, FAN Limin. A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique[J]. Chinese Journal of Electronics, 2023, 32(2): 199-208. DOI: 10.23919/cje.2021.00.089 |
[2] | LIU Yipeng, GUO Jiansheng, CUI Jingyi. Non-malleable Extractor in the Presence of Classical or Quantum Side Information[J]. Chinese Journal of Electronics, 2019, 28(5): 938-943. DOI: 10.1049/cje.2019.06.004 |
[3] | YE Chendong, TIAN Tian. New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC[J]. Chinese Journal of Electronics, 2019, 28(4): 698-705. DOI: 10.1049/cje.2019.04.002 |
[4] | TANG Wenyi, JIA Song, WANG Yuan. Dual-Voltage Single-Rail Dynamic DPA-Resistant Logic Based on Charge Sharing Mechanism[J]. Chinese Journal of Electronics, 2017, 26(5): 899-904. DOI: 10.1049/cje.2017.03.003 |
[5] | FAN Guangjun, ZHOU Yongbin, ZHANG Hailong, FENG Dengguo. The Cognition Is Not Enough: Another Look on Existing Interesting Points Chosen Methods[J]. Chinese Journal of Electronics, 2017, 26(2): 416-423. DOI: 10.1049/cje.2017.01.030 |
[6] | CAO Yuchen, ZHOU Yongbin, YU Zhenmei. On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis[J]. Chinese Journal of Electronics, 2014, 23(2): 366-370. |
[7] | GUO Zheng, GU Dawu, YUAN Kan, LIU Junrong, HE Yuming. A Novel Method for Power Analysis Based on Combinational Logic in Block Cipher Circuit[J]. Chinese Journal of Electronics, 2014, 23(1): 151-156. |
[8] | LIU Jiye, ZHOU Yongbin, YANG Shuguo, FENG Dengguo. Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation[J]. Chinese Journal of Electronics, 2012, 21(3): 547-553. |
[9] | WU Keke, LI Huiyun, ZHU Dingju, YU Fengqi. Efficient Solution to Secure ECC Against Side-channel Attacks[J]. Chinese Journal of Electronics, 2011, 20(3): 471-475. |
[10] | GU Haihua, GU Dawu. Extending the GHS Attack of Hyperelliptic Curves[J]. Chinese Journal of Electronics, 2009, 18(4): 741-743. |