×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Archive
2014, 1(6)
30 December 2014
A Class of Improved Sequences Generated by
T-functions
LIU Y, HU B
2014, 1(6): 513-524.
Abstract
(
)
PDF (
)
Chosen Plaintext and Second-order Differential Power Analysis Combination Attack on Masked AES
WANG F Y, CHEN B T, LIU J F, YUAN Z G, ZHENG X G
2014, 1(6): 525-536.
Abstract
(
)
PDF (
)
Provable Security for Public Key Encryption——Challenges and Approaches
LIU S L
2014, 1(6): 537-550.
Abstract
(
)
PDF (
)
On the Theory of Provable Security for PKI-based Authenticated Key Agreement Protocols
ZHAO J J, GU D W, HU X X
2014, 1(6): 551-567.
Abstract
(
)
PDF (
)
Comparison Study of Formal Verification Tools for Security Protocols
LU S Q, CHENG Q F, ZHAO J H
2014, 1(6): 568-577.
Abstract
(
)
PDF (
)
Recent Progress in Properties of Cryptographic Functions
QU L J, FU S J, LI C
2014, 1(6): 578-588.
Abstract
(
)
PDF (
)
Research on UC Secure Finite-key Protocol with Decoy-state
LI H X, GAO M, MA Z, MA C G, WANG W
2014, 1(6): 589-601.
Abstract
(
)
PDF (
)
The Equation
x
r
=
a
over Finite Fields
LI Z, DONG X L, CAO Z F
2014, 1(6): 602-616.
Abstract
(
)
PDF (
)