×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Current Issue
2025, 12(5)
07 November 2025
Review of RRAM-Based Physically Unclonable Functions: Design, Protection, and Applications
WANG C X, LV Z B, YANG S Q, ZHANG Y H, CUI A J
2025, 12(5): 961-981.
Abstract
(
)
PDF (
)
Recent Progress in (Generalization) Almost Perfect Nonlinear Functions
WANG Y P
2025, 12(5): 982-1002.
Abstract
(
)
PDF (
)
Automated Related-Key Impossible Differential Cryptanalysis of SIMON
SHI J L, LIU G Q, LI C
2025, 12(5): 1003-1017.
Abstract
(
)
PDF (
)
SM9-Based Conditional Proxy Re-Encryption Scheme and Its Application
ZENG S H, LAI J Z, WU J H, YANG P, WENG J
2025, 12(5): 1018-1030.
Abstract
(
)
PDF (
)
Key Traceable Attribute-Based Cross-Domain Access Control Encryption
ZHANG Y H, YANG J Y, ZHENG X K, WU A X
2025, 12(5): 1031-1046.
Abstract
(
)
PDF (
)
Security Bound of PRESENT Against Integral Distinguishers
ZENG F Y, TIAN T
2025, 12(5): 1047-1060.
Abstract
(
)
PDF (
)
Batch Verifiable Edge Computing Schemes with Function Privacy
CHEN Y, ZHOU J, DONG X L, CAO Z F
2025, 12(5): 1061-1080.
Abstract
(
)
PDF (
)
Multi-Platform Efficient Implementation of Polynomial Multiplication for Lattice-Based Cryptographic Schemes
ZHANG H, SHEN S Y, ZHAO Y L
2025, 12(5): 1081-1105.
Abstract
(
)
PDF (
)
Secure Sorting of Sum of Elements at Corresponding Positions in Multi-Party Sequences
WU C Y, DU J X, YU J T, LI S D
2025, 12(5): 1106-1117.
Abstract
(
)
PDF (
)
Design and Implementation of Secure Hardware Acceleration Solution for Kyber
WANG T F, ZHANG C, GU D W
2025, 12(5): 1118-1131.
Abstract
(
)
PDF (
)
Differential Cryptanalysis on Stream Cipher Salsa20
HOU S Q, LV Y, WU B F, WANG M Q, LIN D D
2025, 12(5): 1132-1143.
Abstract
(
)
PDF (
)
Modeling Complexity Analysis Method for PUFs Based on Neural Network Approximation Structure
LIU W, GU D W
2025, 12(5): 1144-1161.
Abstract
(
)
PDF (
)
Research on Security Analysis of POSEIDON Family of Hash Functions
DUAN E E, WU W L, WANG B L
2025, 12(5): 1162-1177.
Abstract
(
)
PDF (
)
Quantum Circuit Implementation and Resource Evaluation of Ballet‑$p/k$ Under Grover's Attack
HONG R P, ZHANG L, PANG C X, LI G Y, DING D, WANG J X
2025, 12(5): 1178-1194.
Abstract
(
)
PDF (
)