×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Current Issue
2025, 12(3)
15 July 2025
Leakage Length Analysis of Leakage-Resilient PKE
DONG X T, WEI Y Z, LIU M M, GAO W
2025, 12(3): 489-498.
Abstract
(
)
PDF (
)
Key-Value Pair Data Collection Mechanism Based on Shuffling Differential Privacy
TANG H Y, CHEN Y, GUO Y Y
2025, 12(3): 499-512.
Abstract
(
)
PDF (
)
Quantum Circuit Implementation of ZUC-128
LIU J H, TAN X Q, HUANG R
2025, 12(3): 513-526.
Abstract
(
)
PDF (
)
Forward-Secure Identity-Based Puncturable Signature Algorithm
GAO P B, LIU Z H, WANG B C
2025, 12(3): 527-544.
Abstract
(
)
PDF (
)
PPHSFL: Privacy-Preserving Federated Learning Towards Heterogeneous System in IoV
ZHANG Y, XIAN H Q
2025, 12(3): 545-564.
Abstract
(
)
PDF (
)
Improvement on Side-Channel Information Assisted Persistent Fault-Based Collision Attacks
SONG W, ZHENG S H, GU L Z
2025, 12(3): 565-575.
Abstract
(
)
PDF (
)
Fast Implementation of SM9 Multi-Point Operation Based on FPGA
MEI F, MA Y, ZHOU F, LI Z C
2025, 12(3): 576-585.
Abstract
(
)
PDF (
)
An Improved Method for Calculating Probability of Multi-Round Boomerang Dependency
LI C M, WU B F, HOU S Q, LIN D D
2025, 12(3): 586-603.
Abstract
(
)
PDF (
)
Practical Attack on Small $d_{p},d_{q}$ CRT-RSA
LI Q, ZHENG Q X, QI W F
2025, 12(3): 604-626.
Abstract
(
)
PDF (
)
Tag-Based and Verifiable Cloud-Assisted Multi-Party PSI
LAI C Z, ZHANG H Y, QIN B D, ZHENG D
2025, 12(3): 627-644.
Abstract
(
)
PDF (
)
Design of SM4 IP Cores Against Side-Channel Attacks Based on Loop Unrolling Architecture
ZHANG Q, GAO Y W, LIU Y J, ZHAO J L, ZHANG R
2025, 12(3): 645-661.
Abstract
(
)
PDF (
)
Constrained Pseudorandom Function Supporting t-DNF and Its Application to Attribute-Based Encryption
MA C, GAO H Y, HU B
2025, 12(3): 662-678.
Abstract
(
)
PDF (
)
Model Extraction of Full Connected Neural Network Based on Differential Cryptanalysis
XIONG L Y, LIU Y, LU J Y, LIU G Q, SUN B
2025, 12(3): 679-695.
Abstract
(
)
PDF (
)
Software Optimization Implementation of Tweakable Enciphering Schemes
XU R Z, LIU F Z, MAO S P, HU L, WANG P
2025, 12(3): 696-713.
Abstract
(
)
PDF (
)
Construction of Even-Variable 2-Output Almost Optimal Five-Valued Spectra Boolean Functions
SONG C F, JI Y H, SUN Y J
2025, 12(3): 714-728.
Abstract
(
)
PDF (
)