[1]
QIU Wei-xing, XIAO Ke-zhi, NI Fang, HUANG Hua. DES Key Extension Method[J] 2011.
Google Scholar
[2]
Li Qin-wei, Peng lei. Analysis of DES S-box. Gui zhou university. 2008.
Google Scholar
[3]
Zhu Gui-liang Wang Chao-feng Zhang Xiaoq-iang. Design and implementation of smis data security based on the mixed encryption algorithm and fuk technology. North China University of Water Resources and Electric Power. (2012)
Google Scholar
[4]
Ding Chen-li. Reseach an implementation of encryption and decryption system of file. Shanghai Jiaotong university. 2009.
Google Scholar
[5]
Liu Yuan-sheng. Computer network security[M]. BeiJing: Tsinghua University press. 2006.
Google Scholar
[6]
Duan gang . The encryption and decryption of [M]. Beijing: Publishing House of electronics industry, 2009.
Google Scholar
[7]
Du qian, Zhang Wen-xia. Language can realize S H A -1 hash algorithm [J].Journal of Wuhan University of Technology, 2007,( 29 ): 43-44.
Google Scholar
[8]
Markku-Juhani O. Saarinen. Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Helsinki University of Technology, 3-8
Google Scholar
[9]
Timebleby, H. W. and Gow J, "Computer algebra in interface design research",Proceedings of the 9th International Conference onIntelligent User Interface, Island of Madeira, 2004, pp.366-367.
Google Scholar
[10]
Z. He, et al, "Optimum bit allocation and accurate rate control forvideo coding viaρ-domain source modeling," IEEE Trans. CircuitsSyst. Video Technol., vol. 12, no. 10, p.840–849, Oct. 2002.
DOI: 10.1109/tcsvt.2002.804883
Google Scholar
[11]
D. Kwon et al. "Rate Control for H.264 Video with Enhanced Rateand DistortionModels," IEEE Trans Circuits and Syst. VideoTechnol., Vol. 17, pp.517-529, May 2007.
Google Scholar