×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Current Issue
2025, 12(2)
15 May 2025
An Overview of Witness Encryption Based on NP Language
WANG Y Z, ZHANG M G
2025, 12(2): 247-264.
Abstract
(
)
PDF (
)
Survey for lattice-based signature
XIA W W, GU D W, WANG G
2025, 12(2): 265-282.
Abstract
(
)
PDF (
)
SAT-Based Algebraic Attack on WARP
HAO C Y, XU H
2025, 12(2): 283-296.
Abstract
(
)
PDF (
)
Tight Bounds for Quantum Indistinguishability of Tweakable Random Permutations from Random Functions
GUO X N, GUO C
2025, 12(2): 297-309.
Abstract
(
)
PDF (
)
Cross-Domain Authentication Key Agreement Protocol Based on Blockchain
MA Y L, CHEN X X, CHENG Q F, WEI F S
2025, 12(2): 310-321.
Abstract
(
)
PDF (
)
Smooth Discrete Logarithm Computation in Isogeny-Based Cryptography
LIN K Z, WANG L, WANG W Z, ZHAO C A
2025, 12(2): 322-336.
Abstract
(
)
PDF (
)
Impact of Nonces Leakage Location and Modulus on ECDSA Security
ZHOU C J, WANG G, GU D W
2025, 12(2): 337-352.
Abstract
(
)
PDF (
)
Volume-Hiding Range Encrypted Multi-Map Scheme
CAI Y R, MA C S, ZHU Y S
2025, 12(2): 353-369.
Abstract
(
)
PDF (
)
Parameter Analysis of Group Key Exchange Protocol Based on RLWE Problem
HONG L, HUANG H Y, HU W
2025, 12(2): 370-383.
Abstract
(
)
PDF (
)
Improved Multiple Linear Attacks on 28-Round PRESENT-128
WANG Z B, JIN C H
2025, 12(2): 384-397.
Abstract
(
)
PDF (
)
An Improved Conditional Privacy-Preserving Authentication Scheme Based on Certificateless Aggregate Signature for VANETs
XU S W, YU S H, BAI Y J, YUE Z Y, LIU Y L
2025, 12(2): 398-413.
Abstract
(
)
PDF (
)
Side Channel Attacks Based on CLRM Model
HUANG H, TANG X L, WU J M, LIU Z W, YU B, ZHAO S L
2025, 12(2): 414-428.
Abstract
(
)
PDF (
)
Parallel Error-Checking Key Recovery Scheme for Kyber
LIN Z C, CHENG C, CHEN P, SONG M
2025, 12(2): 429-442.
Abstract
(
)
PDF (
)
Cross-Device Profiling Side-Channel Attack with Relevant Subdomain Adaptation
ZHANG Y P, LIU H X, LI D, DUAN M, GONG Z
2025, 12(2): 443-456.
Abstract
(
)
PDF (
)
Quantum Multi-Secret Sharing with High Dimensional Cluster States
MA R H, CAI B B, LIN S, ZHANG X D
2025, 12(2): 457-468.
Abstract
(
)
PDF (
)
Differential-Linear Attacks on Ballet Block Cipher
ZHOU Y, CHEN S W, XU S Y, XIANG Z J, ZENG X Y
2025, 12(2): 469-488.
Abstract
(
)
PDF (
)