×
模态框(Modal)标题
在这里添加一些文本
Close
Close
Submit
Cancel
Confirm
×
模态框(Modal)标题
在这里添加一些文本
Close
×
Please choose a citation manager
RIS (ProCite, Reference Manager)
BibTeX
Content to export
Citation
Citation and abstract
Export
Author Login
Peer Review
Editorial Board
Editor-in-Chief
Home
About
Periodical Information
Database Collection
Statement
Open Access
Contact Us
Editorial Board
Current Editorial Board
Previous Editorial Boards
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Subscriptions
Subscriptions
Email Alert
RSS
Submission Guidelines
Instructions for Authors
Review Process
FAQ
Downloads
中文
Journal
Current Issue
Archive
Accepted
Review Paper
Virtual Issue
Archive
2018, 5(3)
22 June 2018
Cloud-based RFID Mutual Authentication Protocol
CHEN M M, DONG Q K, LI L L}
2018, 5(3): 231-241.
Abstract
(
)
PDF (
)
Implementation Scheme of SIS Lattice Signature Against Side Channel Attack
LI Z C, SUN Y F, YANG Y T, ZHANG J M, YANG W, LIANG L
2018, 5(3): 242-248.
Abstract
(
)
PDF (
)
Simulator of Quantum Computer Using Classical Computer
FAN H Q, HU B, YUAN Z.
2018, 5(3): 249-261.
Abstract
(
)
PDF (
)
Homomorphically Encrypted Arithmetic Operations over Symmetric Ternary Coding
FU H J, CAI B, XIANG H, SANG J
2018, 5(3): 262-270.
Abstract
(
)
PDF (
)
Similar Search Balanced Binary Tree Based Multi-keyword Ranked Searchable Scheme">
Similar Search Balanced Binary Tree Based Multi-keyword Ranked Searchable Scheme
CHEN L X, CHEN Z C
2018, 5(3): 271-285.
Abstract
(
)
PDF (
)
Security Deduplication Method of Encrypted Data Without Any Additional Server
ZHANG S G, XIAN H Q, WANG L M, LIU H Y, HOU R T
2018, 5(3): 286-296.
Abstract
(
)
PDF (
)
Preface of Elliptic Curve Cryptography Column (in Chinese and in English)#br#
XU M Z
2018, 5(3): 297-300.
Abstract
(
)
PDF (
)
On Construction and Application of Deterministic Encoding Functions into Elliptic Curves
HE X Y, YU W, WANG K P
2018, 5(3): 301-314.
Abstract
(
)
PDF (
)
Algorithm of Converting Weierstrass Form into Edwards Form for Elliptic Curves over Binary Fields
ZHANG J W, ZHAO C A
2018, 5(3): 315-323.
Abstract
(
)
PDF (
)
Constructing Optimal Pairings for Menezes-128 Security Level
ZHANG M, WANG S, GUO Z Z
2018, 5(3): 324-334.
Abstract
(
)
PDF (
)