×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Information
More
Academic Review
More
Current Issue
Archive
Accpted
Review Paper
Virtual Issues
2026, 13(1)
20 March 2026
A Survey on Symmetric Searchable Encryption
ZHAO C B, LI J M, HE K, CHEN J, DU R Y
2026, 13(1): 1-27.
Abstract
(
)
PDF (
)
Privacy-Preserving Kernel Function Evaluation in Machine Learning and Its Application
ZHANG M W, HUANG Z Q, WANG Y Z
2026, 13(1): 28-42.
Abstract
(
)
PDF (
)
Implementation of Secure uBlock for Second-Order Glitch Detection with Low Random Number Dependence
DAI Z L, HU X T, ZHU H P, ZHANG Y H
2026, 13(1): 43-59.
Abstract
(
)
PDF (
)
Forward-Secure Dynamic Range Minimum Query Scheme Based on Reverse Tree
QIN Z Y, MA C S, WU H
2026, 13(1): 60-79.
Abstract
(
)
PDF (
)
Efficient Approach for Searching the Best Differential and Linear Trail: Applications to NOEKEON and Serpent
WENG J S, ZHANG W T, PENG T
2026, 13(1): 80-96.
Abstract
(
)
PDF (
)
Truncated Differential Attack on 7-Round SPRING128-128
ZHOU W C, ZHANG X
2026, 13(1): 97-108.
Abstract
(
)
PDF (
)
Construction of Resilient Boolean Functions with Strictly Almost Optimal Nonlinearity Through Disjoint Linear Codes
JI Y H, SUN Y J, LI L Y
2026, 13(1): 109-121.
Abstract
(
)
PDF (
)
MuRE: Secure and Concise Supervised Cross-Border Transaction Scheme
RONG Y L, LIU F M, LIN Q P
2026, 13(1): 122-132.
Abstract
(
)
PDF (
)
Impossible Differential Cryptanalysis of Ballet128 Block Cipher
ZHANG X, LYU J Q
2026, 13(1): 133-146.
Abstract
(
)
PDF (
)
Bit-Level Side-Channel Collision Analysis Based on S-Box Inputs
LONG J S, TANG Y Z, OU C H, ZENG S, CHENG Y K
2026, 13(1): 147-162.
Abstract
(
)
PDF (
)
Automated Meet-in-the-Middle Attacks of Hash Modes Based on Misty Structure
ZOU J, GONG M L, LIN R W, WEI J C
2026, 13(1): 163-178.
Abstract
(
)
PDF (
)
Research and Implementation of Invisible Digital Watermark Encryption Detection Technology (in English)
LIU T, WU F, ZHANG G Y
2026, 13(1): 179-198.
Abstract
(
)
PDF (
)
Performance Evaluation of TLS 1.3 Based on Post-Quantum Cryptography (in English)
SONG Z Y, ZHENG J Y, ZHAO Y L.
2026, 13(1): 199-218.
Abstract
(
)
PDF (
)