×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Information
More
Academic Review
More
Current Issue
Archive
Accpted
Review Paper
Virtual Issues
2024, 11(3)
19 July 2024
Architecture and Key Techniques for the Cryptographic Running Security
HUO W, WANG X Y, HAN W B
2024, 11(3): 485-503.
Abstract
(
)
PDF (
)
Overview of Cryptographic Library Fuzz Testing Techniques
MA F C, ZHOU Y H, CHEN Y L, YAN Z, JIANG Y, SUN J G
2024, 11(3): 504-520.
Abstract
(
)
PDF (
)
Overview of Encoding Techniques for Application of Fully Homomorphic Encryption
WEI B Q, LU X H, WANG R D, LI Z H
2024, 11(3): 521-544.
Abstract
(
)
PDF (
)
Overview of Authenticated Data Structures
KONG X Y, CHEN Y
2024, 11(3): 545-574.
Abstract
(
)
PDF (
)
An Overview on Privacy-preserving Data Aggregation in Smart Grid
CHEN D, ZHOU T P, SONG Z C, DING Y J, YANG X Y
2024, 11(3): 575-587.
Abstract
(
)
PDF (
)
Latent Logic Analysis Method of Security Protocol Based on Mathematical Logic
LI Y F, KONG X M, GENG Y, SHEN C X
2024, 11(3): 588-601.
Abstract
(
)
PDF (
)
Truncated Differential Cryptanalysis of FBC
ZOU G N, LIU D, JIA K T, ZHANG G Y
2024, 11(3): 602-620.
Abstract
(
)
PDF (
)
A Searchable Symmetric Encryption Scheme for Block-Wise Decentralized Storage
XU F, WANG T, YANG B, ZHANG W Z
2024, 11(3): 621-636.
Abstract
(
)
PDF (
)
Correlation Power Analysis of Hardware-Implemented ZUC Algorithms and Multi-Granularity Time-Domain Sensitive Area Detection
WU Y, ZHAO Y L, PAN Y Y, MA Z, LI Y Z, PENG Q, WU L J, ZHANG X M
2024, 11(3): 637-648.
Abstract
(
)
PDF (
)
On Optimization of Modulo Multiplication Methods for SM2
YU Z Q, XU G W
2024, 11(3): 649-661.
Abstract
(
)
PDF (
)
A Compact Implementation of Masked AES Encryption
SUI Q, ZHOU J Y, ZHU Y H, SU Y, XU S, WANG W J
2024, 11(3): 662-680.
Abstract
(
)
PDF (
)
Integral Analysis of Lightweight Block Cipher FBC
XIE Y X, GAO Y
2024, 11(3): 681-691.
Abstract
(
)
PDF (
)
Differential Fault Attack on SKINNY and Key Recovery Attack on ForkAE
XIE M, JIANG J Y, CHEN J
2024, 11(3): 692-705.
Abstract
(
)
PDF (
)
Cryptographic Chip Security Evaluation Method Based on Radio Frequency Side Channel
XIE H, TIAN X, LIAO W, ZHU X J
2024, 11(3): 706-718.
Abstract
(
)
PDF (
)