×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Information
More
Academic Review
More
Current Issue
Archive
Accpted
Review Paper
Virtual Issues
2025, 12(6)
12 January 2026
Overview of Key Functional Properties of Ring Signatures
YAO Y Q, TENG D
2025, 12(6): 1195-1210.
Abstract
(
)
PDF (
)
Fast Implementation of BFV Fully Homomorphic Encryption Algorithm on FPGA
YANG Y T, WANG Z Z, CAO J P, CHEN L Y
2025, 12(6): 1211-1225.
Abstract
(
)
PDF (
)
Optimization Method for First-Order Threshold Implementation of SM4
YAO F, CHEN H, CAO W Q, WANG J, FU Y F
2025, 12(6): 1226-1246.
Abstract
(
)
PDF (
)
Quantum Q1 Security of Sibleyras's Tweakable FX Construction
GUO C, GUO X N, HUANG A J, YU Y
2025, 12(6): 1247-1264.
Abstract
(
)
PDF (
)
Leakage-Relisient Group Signature Scheme Based on SM2
LIU L Z, ZHENG D B, TAN Z W, WANG W J
2025, 12(6): 1265-1283.
Abstract
(
)
PDF (
)
Differential Cryptanalysis on SAILFISH-I
LI Y J, LIN Y P, LIU J, JIN D, LIU R Y
2025, 12(6): 1284-1295.
Abstract
(
)
PDF (
)
New Quantum Boomerang Attack and Its Application
ZOU J, LAN Q F, LUO Y Y
2025, 12(6): 1296-1313.
Abstract
(
)
PDF (
)
Chaotic Mapping-Based Secure Networking Authentication Scheme for Space-Air-Ground Integrated Networks
ZHANG J T, CHEN X X, CHENG Q F, LUO X Y
2025, 12(6): 1314-1333.
Abstract
(
)
PDF (
)
Measurement-Device-Independent Certified Quantum Secure Direct Communication Protocol
ZHANG Q D, SUN H W, ZHANG L, ZHANG K J
2025, 12(6): 1334-1348.
Abstract
(
)
PDF (
)
Analysis of Randomness Reuse for Aigis-Enc Scheme
WANG K, HAN J, XIE H Q, JIANG H D, CHEN L, ZHANG Z F
2025, 12(6): 1349-1364.
Abstract
(
)
PDF (
)
Outsourcing-Based Secure Optimized User Recruitment in Mobile Crowdsensing Systems
ZHANG M W, LIU Y X, CHEN Y T
2025, 12(6): 1365-1380.
Abstract
(
)
PDF (
)
TDDGuess: A Method for Password Guessing Based on Two-Dimensional Convolutional Diffusion Model
LI C Y, DUAN M, DU Y B, WANG W, ZHENG Q X
2025, 12(6): 1381-1391.
Abstract
(
)
PDF (
)
Research on Homomorphic Encryption of Elliptic Curves over Rings
QIN T H, PAN W L, TANG H Y, XU Z Y, WANG Z B
2025, 12(6): 1392-1404.
Abstract
(
)
PDF (
)
Lattice-Based Forward-Secure Linkable Ring Signatures in Random Oracle Model
XIE J, ZHANG Q H, LUAN X J, WANG L, GAO J T, WANG B C
2025, 12(6): 1405-1420.
Abstract
(
)
PDF (
)
Construction of Optimal Secret Key Sharing Scheme for Non-Threshold Access Structure
TANG C M, MIAO J W, XU Q X
2025, 12(6): 1421-1429.
Abstract
(
)
PDF (
)
TtLR: A Lightweight and Transferable Side Channel
Distinguisher Against Kyber
GUO S Q, CHEN P, CHENG C
2025, 12(6): 1430-1444.
Abstract
(
)
PDF (
)