Journal of Cryptologic Research
 
Citation Search Quick Search DOI Advanced
  Author Center
   » Submission Online
   » Instruction for Authors
   » Template
   » Copyright Agreement
  Peer Review
   » Peer Review
   » Peer Review Policy
Journal Online
   » Accepted
   » In Press
   » Current Issue
   » Earlier Issues
   » View by Fields
   » Top Downloaded
   » RSS
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

All
  
1 Survey of Lattice-based Cryptography 2014 Vol.1(1):13-27
WANG X Y, LIU M J [Abstract] (2328) [HTML 0 KB][PDF 678 KB] (8166)
2 Research on Attribute-based Cryptography 2014 Vol.1(1):1-12
FENG D G, CHEN C [Abstract] (1724) [HTML 0 KB][PDF 769 KB] (8038)
3 An Overview on the Security Techniques and Challenges of the Internet of Things 2015 Vol.2(1):40-53
WU C K [Abstract] (968) [HTML 0 KB][PDF 401 KB] (6178)
4 Research on White-box Cryptography 2015 Vol.2(3):258-267
LIN T T, LAI X J [Abstract] (1074) [HTML 0 KB][PDF 333 KB] (5696)
5 Secret Key Extraction in Wireless Channel 2014 Vol.1(3):211-224
LI G Y, HU A Q, SHI L [Abstract] (1000) [HTML 0 KB][PDF 1519 KB] (4511)
6 Provable Security for Public Key Encryption——Challenges and Approaches 2014 Vol.1(6):537-550
LIU S L [Abstract] (1027) [HTML 0 KB][PDF 447 KB] (4126)
7 A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm 2014 Vol.1(2):155-166
SHANG M, MA Y, LIN J Q, JING J W [Abstract] (1370) [HTML 0 KB][PDF 1051 KB] (4068)
8 Cryptanalysis of Quantum Cryptographic Protocols 2014 Vol.1(2):200-210
WEN Q Y, QIN S J, GAO F [Abstract] (1021) [HTML 0 KB][PDF 866 KB] (4055)
9 Bitcoin and Digital Fiat Currency 2017 Vol.4(2):176-186
QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B [Abstract] (1353) [HTML 0 KB][PDF 1282 KB] (3802)
10 Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table 2014 Vol.1(1):100-110
ZHENG Z X, JI Q B, YU H B [Abstract] (1062) [HTML 0 KB][PDF 778 KB] (3556)
11 The Design of an Anti-Counterfeiting System Based on Blockchain 2017 Vol.4(2):199-208
AN R, HE D B, ZHANG Y R, LI L [Abstract] (1286) [HTML 0 KB][PDF 2475 KB] (3508)
12 University Score Management System Based on Blockchain Technology 2018 Vol.5(5):568-578
SUN Y Q, WANG Q C [Abstract] (432) [HTML 0 KB][PDF 9005 KB] (3363)
13 The Integration of Biometrics and Cryptography——A New Solution for Secure Identity Authentication 2015 Vol.2(2):159-176
ZHANG N, ZANG Y L, TIAN J [Abstract] (811) [HTML 0 KB][PDF 767 KB] (3033)
14 From Bilinear Pairings to Multilinear Maps 2016 Vol.3(3):211-228
ZHANG F G [Abstract] (1241) [HTML 0 KB][PDF 571 KB] (2965)
15 Power Analysis on Lightweight Mask Scheme 2014 Vol.1(1):51-63
TANG M, WANG X, LI Y B, XIANG X, QIU Z L, ZHANG H G [Abstract] (1139) [HTML 0 KB][PDF 1621 KB] (2934)
16 Complexity Analysis of Lattice Hard Problems 2015 Vol.2(1):1-16
WANG X Y, HU A Q [Abstract] (1007) [HTML 0 KB][PDF 518 KB] (2828)
17 On the Progress of Elliptic Curve Discrete Logarithm Problem 2015 Vol.2(2):177-188
TIAN S, LI B, WANG K P [Abstract] (803) [HTML 0 KB][PDF 346 KB] (2742)
18 An Overview on the Post-processing Procedure in Quantum Key Distribution 2015 Vol.2(2):113-121
LI M, ZHANG C M, YIN Z Q, CHEN W, HAN Z F [Abstract] (977) [HTML 0 KB][PDF 384 KB] (2634)
19 Comparison Study of Formal Verification Tools for Security Protocols 2014 Vol.1(6):568-577
LU S Q, CHENG Q F, ZHAO J H [Abstract] (743) [HTML 0 KB][PDF 1724 KB] (2590)
20 The Innovation of Trusted Computing Based on the Domestic Cryptography 2015 Vol.2(5):381-389
SHEN C X, GONG B [Abstract] (823) [HTML 0 KB][PDF 686 KB] (2573)
21 Recent Advances in PKI Technologies 2015 Vol.2(6):487-496
LIN J Q, JING J W, ZHANG Q L, WANG Z [Abstract] (1014) [HTML 0 KB][PDF 762 KB] (2569)
22 A Privacy Preserving Fair Contract Signing Protocol based on Block Chains 2017 Vol.4(2):187-198
TIAN H B, HE J J, FU L Q [Abstract] (743) [HTML 0 KB][PDF 883 KB] (2546)
23 Design and Analysis of Stream Ciphers: Past, Present and Future Directions 2016 Vol.3(6):527-545
ZHANG B, XU C, FENG D G [Abstract] (772) [HTML 0 KB][PDF 1123 KB] (2436)
24 A Survey on Applications of Matrix Decomposition in Cryptography 2014 Vol.1(4):341-357
ZHANG H G, LIU J H, JIA J W, MAO S W, WU W Q [Abstract] (1108) [HTML 0 KB][PDF 1259 KB] (2325)
25 On the Theory of Provable Security for PKI-based Authenticated Key Agreement Protocols 2014 Vol.1(6):551-567
ZHAO J J, GU D W, HU X X [Abstract] (603) [HTML 0 KB][PDF 916 KB] (2261)
26 Research on Leakage-resilient Stream Ciphers with Provable Security 2014 Vol.1(2):134-145
YU Y, GU D W [Abstract] (874) [HTML 0 KB][PDF 649 KB] (2222)
27 Recent Progress in Properties of Cryptographic Functions
 
2014 Vol.1(6):578-588
QU L J, FU S J, LI C [Abstract] (758) [HTML 0 KB][PDF 685 KB] (2221)
28 Survey on Lightweight Hash Functions 2016 Vol.3(1):1-11
GONG Z [Abstract] (1068) [HTML 0 KB][PDF 488 KB] (2108)
29 Application of (Fully) Homomorphic Encryption for Encrypted Computing Models 2017 Vol.4(6):596-610
JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C. [Abstract] (753) [HTML 0 KB][PDF 5733 KB] (2098)
30 Full Privacy Preserving Smart Metering System 2014 Vol.1(4):400-409
DIAO F, ZHANG F G [Abstract] (673) [HTML 0 KB][PDF 710 KB] (2015)
Copyright © Journal of Cryptologic Research