Journal of Cryptologic Research
 
Citation Search Quick Search DOI Advanced
  Author Center
   » Submission Online
   » Instruction for Authors
   » Template
   » Copyright Agreement
  Peer Review
   » Peer Review
   » Peer Review Policy
Journal Online
   » Accepted
   » In Press
   » Current Issue
   » Earlier Issues
   » View by Fields
   » Top Downloaded
   » RSS
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

All
  
1 Survey of Lattice-based Cryptography 2014 Vol.1(1):13-27
WANG X Y, LIU M J [Abstract] (2452) [HTML 0 KB][PDF 678 KB] (8532)
2 Research on Attribute-based Cryptography 2014 Vol.1(1):1-12
FENG D G, CHEN C [Abstract] (1787) [HTML 0 KB][PDF 769 KB] (8332)
3 An Overview on the Security Techniques and Challenges of the Internet of Things 2015 Vol.2(1):40-53
WU C K [Abstract] (1022) [HTML 0 KB][PDF 401 KB] (6468)
4 Research on White-box Cryptography 2015 Vol.2(3):258-267
LIN T T, LAI X J [Abstract] (1134) [HTML 0 KB][PDF 333 KB] (5946)
5 Secret Key Extraction in Wireless Channel 2014 Vol.1(3):211-224
LI G Y, HU A Q, SHI L [Abstract] (1058) [HTML 0 KB][PDF 1519 KB] (4682)
6 Provable Security for Public Key Encryption——Challenges and Approaches 2014 Vol.1(6):537-550
LIU S L [Abstract] (1101) [HTML 0 KB][PDF 447 KB] (4285)
7 A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm 2014 Vol.1(2):155-166
SHANG M, MA Y, LIN J Q, JING J W [Abstract] (1441) [HTML 0 KB][PDF 1051 KB] (4270)
8 Cryptanalysis of Quantum Cryptographic Protocols 2014 Vol.1(2):200-210
WEN Q Y, QIN S J, GAO F [Abstract] (1085) [HTML 0 KB][PDF 866 KB] (4190)
9 Bitcoin and Digital Fiat Currency 2017 Vol.4(2):176-186
QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B [Abstract] (1437) [HTML 0 KB][PDF 1282 KB] (3986)
10 Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table 2014 Vol.1(1):100-110
ZHENG Z X, JI Q B, YU H B [Abstract] (1132) [HTML 0 KB][PDF 778 KB] (3696)
11 The Design of an Anti-Counterfeiting System Based on Blockchain 2017 Vol.4(2):199-208
AN R, HE D B, ZHANG Y R, LI L [Abstract] (1366) [HTML 0 KB][PDF 2475 KB] (3675)
12 University Score Management System Based on Blockchain Technology 2018 Vol.5(5):568-578
SUN Y Q, WANG Q C [Abstract] (524) [HTML 0 KB][PDF 9005 KB] (3527)
13 The Integration of Biometrics and Cryptography——A New Solution for Secure Identity Authentication 2015 Vol.2(2):159-176
ZHANG N, ZANG Y L, TIAN J [Abstract] (876) [HTML 0 KB][PDF 767 KB] (3122)
14 From Bilinear Pairings to Multilinear Maps 2016 Vol.3(3):211-228
ZHANG F G [Abstract] (1356) [HTML 0 KB][PDF 571 KB] (3101)
15 Power Analysis on Lightweight Mask Scheme 2014 Vol.1(1):51-63
TANG M, WANG X, LI Y B, XIANG X, QIU Z L, ZHANG H G [Abstract] (1189) [HTML 0 KB][PDF 1621 KB] (2984)
16 Complexity Analysis of Lattice Hard Problems 2015 Vol.2(1):1-16
WANG X Y, HU A Q [Abstract] (1083) [HTML 0 KB][PDF 518 KB] (2902)
17 On the Progress of Elliptic Curve Discrete Logarithm Problem 2015 Vol.2(2):177-188
TIAN S, LI B, WANG K P [Abstract] (869) [HTML 0 KB][PDF 346 KB] (2840)
18 The Innovation of Trusted Computing Based on the Domestic Cryptography 2015 Vol.2(5):381-389
SHEN C X, GONG B [Abstract] (874) [HTML 0 KB][PDF 686 KB] (2712)
19 An Overview on the Post-processing Procedure in Quantum Key Distribution 2015 Vol.2(2):113-121
LI M, ZHANG C M, YIN Z Q, CHEN W, HAN Z F [Abstract] (1047) [HTML 0 KB][PDF 384 KB] (2704)
20 Comparison Study of Formal Verification Tools for Security Protocols 2014 Vol.1(6):568-577
LU S Q, CHENG Q F, ZHAO J H [Abstract] (814) [HTML 0 KB][PDF 1724 KB] (2676)
21 A Privacy Preserving Fair Contract Signing Protocol based on Block Chains 2017 Vol.4(2):187-198
TIAN H B, HE J J, FU L Q [Abstract] (807) [HTML 0 KB][PDF 883 KB] (2644)
22 Recent Advances in PKI Technologies 2015 Vol.2(6):487-496
LIN J Q, JING J W, ZHANG Q L, WANG Z [Abstract] (1084) [HTML 0 KB][PDF 762 KB] (2643)
23 Design and Analysis of Stream Ciphers: Past, Present and Future Directions 2016 Vol.3(6):527-545
ZHANG B, XU C, FENG D G [Abstract] (843) [HTML 0 KB][PDF 1123 KB] (2539)
24 A Survey on Applications of Matrix Decomposition in Cryptography 2014 Vol.1(4):341-357
ZHANG H G, LIU J H, JIA J W, MAO S W, WU W Q [Abstract] (1174) [HTML 0 KB][PDF 1259 KB] (2403)
25 On the Theory of Provable Security for PKI-based Authenticated Key Agreement Protocols 2014 Vol.1(6):551-567
ZHAO J J, GU D W, HU X X [Abstract] (656) [HTML 0 KB][PDF 916 KB] (2311)
26 Research on Leakage-resilient Stream Ciphers with Provable Security 2014 Vol.1(2):134-145
YU Y, GU D W [Abstract] (928) [HTML 0 KB][PDF 649 KB] (2279)
27 Recent Progress in Properties of Cryptographic Functions
 
2014 Vol.1(6):578-588
QU L J, FU S J, LI C [Abstract] (823) [HTML 0 KB][PDF 685 KB] (2278)
28 Application of (Fully) Homomorphic Encryption for Encrypted Computing Models 2017 Vol.4(6):596-610
JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C. [Abstract] (828) [HTML 0 KB][PDF 5733 KB] (2194)
29 Survey on Lightweight Hash Functions 2016 Vol.3(1):1-11
GONG Z [Abstract] (1137) [HTML 0 KB][PDF 488 KB] (2172)
30 On Opportunistic Networks and Their Security 2015 Vol.2(4):342-362
SHI L, HU A Q [Abstract] (707) [HTML 0 KB][PDF 1132 KB] (2066)
Copyright © Journal of Cryptologic Research