Journal of Cryptologic Research
 
Citation Search Quick Search DOI Advanced
  Author Center
   » Submission Online
   » Instruction for Authors
   » Template
   » Copyright Agreement
  Peer Review
   » Peer Review
   » Peer Review Policy
Journal Online
   » Accepted
   » In Press
   » Current Issue
   » Earlier Issues
   » View by Fields
   » Top Downloaded
   » RSS
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

All
  
1 Survey of Lattice-based Cryptography 2014 Vol.1(1):13-27
WANG X Y, LIU M J [Abstract] (2251) [HTML 0 KB][PDF 678 KB] (7862)
2 Research on Attribute-based Cryptography 2014 Vol.1(1):1-12
FENG D G, CHEN C [Abstract] (1659) [HTML 0 KB][PDF 769 KB] (7855)
3 An Overview on the Security Techniques and Challenges of the Internet of Things 2015 Vol.2(1):40-53
WU C K [Abstract] (939) [HTML 0 KB][PDF 401 KB] (6010)
4 Research on White-box Cryptography 2015 Vol.2(3):258-267
LIN T T, LAI X J [Abstract] (1034) [HTML 0 KB][PDF 333 KB] (5532)
5 Secret Key Extraction in Wireless Channel 2014 Vol.1(3):211-224
LI G Y, HU A Q, SHI L [Abstract] (965) [HTML 0 KB][PDF 1519 KB] (4362)
6 Provable Security for Public Key Encryption——Challenges and Approaches 2014 Vol.1(6):537-550
LIU S L [Abstract] (977) [HTML 0 KB][PDF 447 KB] (4035)
7 Cryptanalysis of Quantum Cryptographic Protocols 2014 Vol.1(2):200-210
WEN Q Y, QIN S J, GAO F [Abstract] (989) [HTML 0 KB][PDF 866 KB] (3935)
8 A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm 2014 Vol.1(2):155-166
SHANG M, MA Y, LIN J Q, JING J W [Abstract] (1309) [HTML 0 KB][PDF 1051 KB] (3919)
9 Bitcoin and Digital Fiat Currency 2017 Vol.4(2):176-186
QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B [Abstract] (1290) [HTML 0 KB][PDF 1282 KB] (3515)
10 Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table 2014 Vol.1(1):100-110
ZHENG Z X, JI Q B, YU H B [Abstract] (1017) [HTML 0 KB][PDF 778 KB] (3416)
11 The Design of an Anti-Counterfeiting System Based on Blockchain 2017 Vol.4(2):199-208
AN R, HE D B, ZHANG Y R, LI L [Abstract] (1221) [HTML 0 KB][PDF 2475 KB] (3393)
12 University Score Management System Based on Blockchain Technology 2018 Vol.5(5):568-578
SUN Y Q, WANG Q C [Abstract] (348) [HTML 0 KB][PDF 9005 KB] (3234)
13 The Integration of Biometrics and Cryptography——A New Solution for Secure Identity Authentication 2015 Vol.2(2):159-176
ZHANG N, ZANG Y L, TIAN J [Abstract] (782) [HTML 0 KB][PDF 767 KB] (2916)
14 Power Analysis on Lightweight Mask Scheme 2014 Vol.1(1):51-63
TANG M, WANG X, LI Y B, XIANG X, QIU Z L, ZHANG H G [Abstract] (1113) [HTML 0 KB][PDF 1621 KB] (2897)
15 From Bilinear Pairings to Multilinear Maps 2016 Vol.3(3):211-228
ZHANG F G [Abstract] (1169) [HTML 0 KB][PDF 571 KB] (2870)
16 Complexity Analysis of Lattice Hard Problems 2015 Vol.2(1):1-16
WANG X Y, HU A Q [Abstract] (944) [HTML 0 KB][PDF 518 KB] (2757)
17 On the Progress of Elliptic Curve Discrete Logarithm Problem 2015 Vol.2(2):177-188
TIAN S, LI B, WANG K P [Abstract] (761) [HTML 0 KB][PDF 346 KB] (2652)
18 An Overview on the Post-processing Procedure in Quantum Key Distribution 2015 Vol.2(2):113-121
LI M, ZHANG C M, YIN Z Q, CHEN W, HAN Z F [Abstract] (924) [HTML 0 KB][PDF 384 KB] (2557)
19 Recent Advances in PKI Technologies 2015 Vol.2(6):487-496
LIN J Q, JING J W, ZHANG Q L, WANG Z [Abstract] (970) [HTML 0 KB][PDF 762 KB] (2514)
20 Comparison Study of Formal Verification Tools for Security Protocols 2014 Vol.1(6):568-577
LU S Q, CHENG Q F, ZHAO J H [Abstract] (696) [HTML 0 KB][PDF 1724 KB] (2499)
21 The Innovation of Trusted Computing Based on the Domestic Cryptography 2015 Vol.2(5):381-389
SHEN C X, GONG B [Abstract] (800) [HTML 0 KB][PDF 686 KB] (2463)
22 A Privacy Preserving Fair Contract Signing Protocol based on Block Chains 2017 Vol.4(2):187-198
TIAN H B, HE J J, FU L Q [Abstract] (686) [HTML 0 KB][PDF 883 KB] (2427)
23 Design and Analysis of Stream Ciphers: Past, Present and Future Directions 2016 Vol.3(6):527-545
ZHANG B, XU C, FENG D G [Abstract] (715) [HTML 0 KB][PDF 1123 KB] (2301)
24 A Survey on Applications of Matrix Decomposition in Cryptography 2014 Vol.1(4):341-357
ZHANG H G, LIU J H, JIA J W, MAO S W, WU W Q [Abstract] (1058) [HTML 0 KB][PDF 1259 KB] (2271)
25 On the Theory of Provable Security for PKI-based Authenticated Key Agreement Protocols 2014 Vol.1(6):551-567
ZHAO J J, GU D W, HU X X [Abstract] (571) [HTML 0 KB][PDF 916 KB] (2219)
26 Recent Progress in Properties of Cryptographic Functions
 
2014 Vol.1(6):578-588
QU L J, FU S J, LI C [Abstract] (720) [HTML 0 KB][PDF 685 KB] (2177)
27 Research on Leakage-resilient Stream Ciphers with Provable Security 2014 Vol.1(2):134-145
YU Y, GU D W [Abstract] (837) [HTML 0 KB][PDF 649 KB] (2176)
28 Survey on Lightweight Hash Functions 2016 Vol.3(1):1-11
GONG Z [Abstract] (1013) [HTML 0 KB][PDF 488 KB] (2014)
29 Full Privacy Preserving Smart Metering System 2014 Vol.1(4):400-409
DIAO F, ZHANG F G [Abstract] (634) [HTML 0 KB][PDF 710 KB] (1974)
30 Application of (Fully) Homomorphic Encryption for Encrypted Computing Models 2017 Vol.4(6):596-610
JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C. [Abstract] (701) [HTML 0 KB][PDF 5733 KB] (1970)
Copyright © Journal of Cryptologic Research