冯登国
o Guozhen, 1997,Spectral characterization of Boolean functions satisfying k degree propagation criteria, Journal of Electronics,Vol.14(1), 34-38
[25] 冯登国,裴定一,1997,无条件安全认证码的一种构造方法,电子学报,Vol.25(4), 114-115
[26] 冯登国,1997,环Z 上的相关免疫函数的频谱特征,电子学报,Vol.25(7), 131-133
[27] 冯登国,肖国镇,1997,有限域上的函数的相关免疫性和线性结构的频谱特征,通信学报,Vol.18(1), 63-68
[28] 冯登国,裴定一,1997,关于多值逻辑函数的仿射逼近问题,电子科学学刊,Vol.19(5)
[29] 冯登国,裴定一,1997,一个新型认证方案的设计与分析,计算机工程与设计,Vol.33(2), 50-51
[30] 冯登国,1997,一个修改的口令认证方案,计算机应用,Vol.17(5), 79-80
[31] 冯登国,1997,基于数字签名标准的可验证的签名共享,计算机工程与设计,Vol.18(5), 64-65
[32] 胡一平,冯登国,1997,前馈流密码的相关分析,通信技术,No.4
[33] 冯登国,裴定一,肖国镇,1998,多值逻辑在密码学中的应用研究,自然科学进展,No.3,257-261
[34] 冯登国,1998,一种新型的数字签名,计算机工程与应用,Vol.34(5), 36-37
[35] 胡一平,冯登国,1998,多输出前馈网络的密码分析,电子科学学刊,No.6
[36] Feng Dengguo, Pei Dingyi,Xiao Guozhen, 1998,Maximum correlation analysis of non-linear combining functions,Science in China,No.1,31-36
[37] 冯登国,宁鹏,1998,S-盒的非线性准则之间的关系,通信学报,Vol.19(4), 71-75
[38] 冯登国,裴定一,肖国镇,1998,非线性组合函数的最大相关分析,中国科学E辑,Vol.41(3),1-5
[39] 冯登国,1998,关于SN-S认证系统中潜信道的实现,通信学报,No.8, 57-60
[40] Feng Dengguo, 1999,Proo f of Chabaud and Vaudenay's Almost Bent Functions Conjecture, Journal of Electronics
[41] 冯登国,吴文玲,1999,抵抗差分分析的代替-置换网络的构造,CCICS'99
[42] 周武,卿斯汉,冯登国,立体型黑客防御机制,CCICS'99,1999
[43] 蒋建春,周武,冯登国,卿斯汉,1999,拒绝服务攻击的分析与对抗,CCICS'99
[44] Wu Wen-ling,Feng deng-guo, Qing Si-han,1999,Brief commentary on the 15 AES candidate algorithms issued by NIST of USA,Journal of software
[45] 吴文玲,李宝,冯登国,1999,LOKI97的线性密码分析,软件学报
[46] Wu Wen-ling,Li Bao,Feng Deng-guo,Qing Si-han, 1999,Linear Cryptanalysis of LOKI97, The Fifth International Conference for Young Computer Scientists ICYCS'99
[47] Wu Wen-ling,Li Bao,Feng Deng-guo,Qing Si-han,1999,Cryptanalysis of some AES candidate algorithms, The Second International Conference on Informationand Communication Security, ICICS'99, Springer-Verlag
[48] 吴文玲,冯登国,卿斯汉,1999,简评美国公布的15个AES候选算法",软件学报
[49] Feng Dengguo,1999,Three characterizations of the corralation-immune functions over the ring Z , Theoretical computer science
[25] 冯登国,裴定一,1997,无条件安全认证码的一种构造方法,电子学报,Vol.25(4), 114-115
[26] 冯登国,1997,环Z 上的相关免疫函数的频谱特征,电子学报,Vol.25(7), 131-133
[27] 冯登国,肖国镇,1997,有限域上的函数的相关免疫性和线性结构的频谱特征,通信学报,Vol.18(1), 63-68
[28] 冯登国,裴定一,1997,关于多值逻辑函数的仿射逼近问题,电子科学学刊,Vol.19(5)
[29] 冯登国,裴定一,1997,一个新型认证方案的设计与分析,计算机工程与设计,Vol.33(2), 50-51
[30] 冯登国,1997,一个修改的口令认证方案,计算机应用,Vol.17(5), 79-80
[31] 冯登国,1997,基于数字签名标准的可验证的签名共享,计算机工程与设计,Vol.18(5), 64-65
[32] 胡一平,冯登国,1997,前馈流密码的相关分析,通信技术,No.4
[33] 冯登国,裴定一,肖国镇,1998,多值逻辑在密码学中的应用研究,自然科学进展,No.3,257-261
[34] 冯登国,1998,一种新型的数字签名,计算机工程与应用,Vol.34(5), 36-37
[35] 胡一平,冯登国,1998,多输出前馈网络的密码分析,电子科学学刊,No.6
[36] Feng Dengguo, Pei Dingyi,Xiao Guozhen, 1998,Maximum correlation analysis of non-linear combining functions,Science in China,No.1,31-36
[37] 冯登国,宁鹏,1998,S-盒的非线性准则之间的关系,通信学报,Vol.19(4), 71-75
[38] 冯登国,裴定一,肖国镇,1998,非线性组合函数的最大相关分析,中国科学E辑,Vol.41(3),1-5
[39] 冯登国,1998,关于SN-S认证系统中潜信道的实现,通信学报,No.8, 57-60
[40] Feng Dengguo, 1999,Proo f of Chabaud and Vaudenay's Almost Bent Functions Conjecture, Journal of Electronics
[41] 冯登国,吴文玲,1999,抵抗差分分析的代替-置换网络的构造,CCICS'99
[42] 周武,卿斯汉,冯登国,立体型黑客防御机制,CCICS'99,1999
[43] 蒋建春,周武,冯登国,卿斯汉,1999,拒绝服务攻击的分析与对抗,CCICS'99
[44] Wu Wen-ling,Feng deng-guo, Qing Si-han,1999,Brief commentary on the 15 AES candidate algorithms issued by NIST of USA,Journal of software
[45] 吴文玲,李宝,冯登国,1999,LOKI97的线性密码分析,软件学报
[46] Wu Wen-ling,Li Bao,Feng Deng-guo,Qing Si-han, 1999,Linear Cryptanalysis of LOKI97, The Fifth International Conference for Young Computer Scientists ICYCS'99
[47] Wu Wen-ling,Li Bao,Feng Deng-guo,Qing Si-han,1999,Cryptanalysis of some AES candidate algorithms, The Second International Conference on Informationand Communication Security, ICICS'99, Springer-Verlag
[48] 吴文玲,冯登国,卿斯汉,1999,简评美国公布的15个AES候选算法",软件学报
[49] Feng Dengguo,1999,Three characterizations of the corralation-immune functions over the ring Z , Theoretical computer science