Journal of Cryptologic Research

 Citation Search Quick Search DOI Advanced
» Submission Online
» Instruction for Authors
» Template
» Copyright Agreement
 » Peer Review    » Peer Review Policy
 Journal Online » Accepted    » In Press    » Current Issue    » Earlier Issues    » View by Fields    » Top Downloaded    » RSS

 2018, 5(6)
 HighLights More»
 · Z Cipher Scheme——ZHENG J H, REN S, JING Q, SONG R H
 · On Cycle Structure of Non-singular Shift Registers with 2 Circles——ZHOU C W, GUAN J
 · Selectively Public-verifiable Outsourced Computation Scheme Based on Garbled Circuit——YANG H N, QIN J, SUN J M, ZHU B R
 · Research on Plaintext Recovery Algorithm of RC4——XU M X, SI X M, YUAN C
 · Niederreiter Public Key Cryptosystem Based on Polar Codes—— YANG C, XIAO D L, GU Z Z, CHU W B
 Current Issue Accepted Earlier Issues Top Read Top Downloaded Top Cited
 Journal of Cryptologic Research--2018, 5 (6)   Published: 07 December 2018
Articles
Z Cipher Scheme Hot!
ZHENG J H, REN S, JING Q, SONG R H
Journal of Cryptologic Research. 2018, 5 (6): 579-590. ;  doi: 10.13868/j.cnki.jcr.000267
Full Text: HTML (1 KB)  PDF (5714 KB)  ( 88 )
Show Abstract ( 34 )

This paper designs Z cipher scheme to satisfy the security requirements for mobile ends, including the identity authentication and key exchange. The design of Z cipher is dynamic in the way that the algorithm structure depends on the user's key, which is different from known ciphers with static structure and different keys for different users. This means that different users have different encryption logic which appears not only in different cipher parameters, but also in different logic layers, different operations, different components, and different data processing. This dynamic feature makes the Z cipher algorithm secure against static attacks. We call this Z's characteristics as `different user, different algorithm'. Some new security concepts are proposed, such as instance security, system security and distance security, which expands the security measures of traditional block ciphers. The users can update their keys and hence the cipher structures periodically or occasionally. Furthermore, the encryption algorithms in Z cipher scheme can be provided in the form of executable code, so it is easy to use and manage in software.

On Cycle Structure of Non-singular Shift Registers with 2 Circles Hot!
ZHOU C W, GUAN J
Journal of Cryptologic Research. 2018, 5 (6): 591-598. ;  doi: 10.13868/j.cnki.jcr.000268
Full Text: HTML (1 KB)  PDF (485 KB)  ( 9 )
Show Abstract ( 16 )

The non-singular feedback shift register (NFSR) is a widely studied class of registers used in communications and cryptographic algorithms. The cycle structure is a common expression for describing the state diagram of NFSRs, that is, how many circles can an NFSR generate and what is the length of each circle? The problem of the cycle number distribution on NFSRs is a counting problem of NFSRs with certain number of circles. In the 80s of last century, scholars solved the problem of linear and specially appointed nonlinear cycle structure of NFSRs. So far, only the number of NFSRs with one circle can be determined, namely the number of $M$-sequences. There are few results on the cycle number distribution on the other kinds. This study investigates the counting problem of NFSRs with 2 circles. This problem can be converted into the number of assignment points in the $M$-sequence state cycle structure. Accordingly, we propose two constraints of the number on the cycle structure of NFSRs with 2 circles. Based on the number of the assorted assignment points and aliquot circles, we present a new structure property law of $M$-sequences. Based on the $m$-sequences, we construct a class of the cycle structure of NFSRs with 2 circles. We present the relation between the cycle number of NFSRs and the number of minor terms  as well as its relationship with the weight distribution of the $M$-sequence feedback function.

Selectively Public-verifiable Outsourced Computation Scheme Based on Garbled Circuit Hot!
YANG H N, QIN J, SUN J M, ZHU B R
Journal of Cryptologic Research. 2018, 5 (6): 599-611. ;  doi: 10.13868/j.cnki.jcr.000269
Full Text: HTML (1 KB)  PDF (769 KB)  ( 6 )
Show Abstract ( 15 )

As the analysis and processing of data is becoming more and more dependent on computer capacity, users prefer to outsource their complex computing tasks to a more powerful server. This paper studies outsourced computation in the setting of dual-server and multi-user, which allows users with weak computing power to outsource the computation of function $f$ on their collective input $(x_1, \cdots, x_n)$ to two non-collaborating severs $S_1$ and $S_2$. $S_2$ is responsible for computing and returning the result, while $S_1$ uses the public key of specified user to execute the encryption operation in order to provide a proof of the correctness for the final result. Compared with previous schemes, the proposed scheme satisfies selective public verifiability, namely only specified users can use their own private key to verify the correctness of the returned results, hence the sensitive data can be effectively kept secret to unauthorized users. It also improves the efficiency of computation and avoids unnecessary interaction among servers and among users. In addition, this scheme meets the defined privacy and reliability requirements in the case of malicious behavior of a server. The proposed scheme is of certain practical significance in terms of avoiding damage caused by information leakage in the cloud environment.

Research on Plaintext Recovery Algorithm of RC4 Hot!
XU M X, SI X M, YUAN C
Journal of Cryptologic Research. 2018, 5 (6): 612-622. ;  doi: 10.13868/j.cnki.jcr.000270
Full Text: HTML (1 KB)  PDF (3050 KB)  ( 11 )
Show Abstract ( 14 )

With the exposing biases of the output key streams, RC4 algorithm is confronted with great security challenges. In 2013, Al Fardan et al. proposed a plaintext recovery attack using single-byte and double-byte biases. Given $13\cdot2^{30}$ ciphertexts encrypted by different keys, the first 256 bytes can be recovered successfully with probability 1. In the same year, Ohigashi et al. proposed a guess and determine attack to recover the plaintexts encrypted by RC4. Given $2^{35}$ ciphertexts encrypted by different keys, any byte of a plaintext can be recovered with probability close to 1. However, when the amount of ciphertexts is less than $2^{35}$, the success probability decreases rapidly. This study proposes a more effective guess and determine attack by using the $t$ value to replace the traditional probability, and the existing bias is fully utilized to modify the guess phase of Ohigashi's algorithm. Given $2^{34}$ ciphertexts encrypted by different keys, any byte of a plaintext can be recovered by the proposed method with probability close to 100\%, and given $2^{33}$ ciphertexts encrypted by different keys, any byte of a plaintext can be recovered with probability being above 98\%.

Niederreiter Public Key Cryptosystem Based on Polar Codes Hot!
YANG C, XIAO D L, GU Z Z, CHU W B
Journal of Cryptologic Research. 2018, 5 (6): 623-630. ;  doi: 10.13868/j.cnki.jcr.000271
Full Text: HTML (1 KB)  PDF (941 KB)  ( 5 )
Show Abstract ( 6 )

Quantum computers have made rapid progress in recent years, which is bound to have certain impact on traditional cryptography. Public-key cryptosystems based on error-correcting codes are considered to be a class of cryptosystems that can resist quantum attacks. This paper first reviews the research background of public-key cryptosystems based on various error-correcting codes, then the SC fast decoding algorithm of polar codes is introduced in detail. Using the SC decoding algorithm, a Niederreiter public key cryptosystem based on polar codes is designed. The security of the cryptosystem is based on the difficulty of large matrix decomposition and the NP-complete problem of decoding linear block codes, which are known as fundamental hard problems. The designed cryptosystem is less complex and more efficient than the Niederreiter public key cryptosystems based on other error-correcting codes, and can resist many kinds of attacks, such as equation-solving attack, chosen plaintext attack and chosen ciphertext attack. It is a cryptosystem with working factor up to $2^{82}$, and can be used in scenarios where the amount of data to be transmitted is small and the security level is high.

Analysis of Impossible Differential Characteristics for SPECK Families of Block Ciphers Hot!
LI M M, GUO J S, CUI J Y, XU L H
Journal of Cryptologic Research. 2018, 5 (6): 631-640. ;  doi: 10.13868/j.cnki.jcr.000272
Full Text: HTML (1 KB)  PDF (533 KB)  ( 11 )
Show Abstract ( 16 )

SPECK is a family of lightweight block ciphers published by National Security Agency (NSA) of USA in 2013. Xu Hong et al. found some new 6-round impossible differential characteristics of SPECK 32/64 and SPECK 48/96 by analyzing differential diffusion property of addition, and a 10-round impossible differential cryptanalysis on these two ciphers was presented which is the best result of impossible differential attack so far. This paper further analyzes the longest impossible differential characteristics for SPECK families of block ciphers having differential diffusion property of addition. Based on differential diffusion property of addition given by Xu Hong et al., the differential diffusion properties of SPECK 32 in encryption and decryption are analyzed in this paper. It is shown that the maximum number of rounds of impossible differential characteristics for SPECK 32 under the differential diffusion property of addition is 6-round, and all the 6-round impossible differential characteristics are given. Moreover, the result can be extended to SPECK $2n~(2n=48,64,96,128)$. With the similar method, it is shown that the maximum number of rounds of impossible differential characteristics for SPECK $2n$ having the differential diffusion property of addition is also 6-round, and all the 6-round impossible differential characteristics are given.

A New Threshold Implementation of the S-box in SM4 Hot!
LI X C, ZHONG W D, ZHANG S W, YANG X Y
Journal of Cryptologic Research. 2018, 5 (6): 641-650. ;  doi: 10.13868/j.cnki.jcr.000273
Full Text: HTML (1 KB)  PDF (15636 KB)  ( 22 )
Show Abstract ( 14 )

Since its birth, side channel attack has posed a great threat to the security of cryptographic algorithms. As one of the typical side channel attack methods, DPA attack has become the most popular and widely used attack method in the field of side channel attack because of its high effectiveness and simple implementation. As a block cipher standard in China, SM4 algorithm has attracted wide attention, and its security has become a research hotspot. Shortly after the publication of SM4 algorithm, it was successfully cracked by the industry scholars using DPA attack. The security of SM4 algorithm in its implementation is facing severe challenges. In this study, a new threshold implementation scheme of SM4 is proposed to resist second-order DPA attack. In this scheme, the input of S-box is transformed into composite field by normal basis, and then a new S-box is constructed by combining threshold implementation theory. By dividing the input into three groups, the new S-box guarantees the resistance against second-order DPA attacks, and reduces the implementation area of the scheme by introducing ring mask structure and decomposition method for inversion. Analysis shows that the S-box constructed in this scheme can effectively resist second-order DPA attack. The experimental results show that the area of the proposed scheme is reduced by 6\% and the required number of random masks is at a low level compared with the conventional masking schemes based on composite field.

Cryptanalysis of Two White-box SM4 Implementations Hot!
PAN W L, QIN T H, JIA Y, ZHANG L T
Journal of Cryptologic Research. 2018, 5 (6): 651-671. ;  doi: 10.13868/j.cnki.jcr.000274
Full Text: HTML (1 KB)  PDF (711 KB)  ( 17 )
Show Abstract ( 13 )

Traditional cryptographic algorithms are designed to be secure without considering their platform risks. In 2002, Chow et al. introduced the white-box context, assuming attackers have full control over the execution of a cryptographic algorithm. Attackers can thus observe the algorithm internal states and even modify these values. This white-box model is very practical when evaluating cryptographic devices which are used in untrusted environments, where a legitimate user may be a potential attacker. Then, traditional cryptographic algorithms become no longer secure in such a context, and how to protect their security is strongly required in practice, e.g. digital rights protection and mobile device security. Taking advantage of obfuscation operations and lookup-tables, Chow et al. constructed a white-box implementation of AES and DES. Similarly, Xiao et al. constructed a white-box implementation of SM4 and Bai et al. proposed another white-box SM4 by more complex inner encodings/decodings and random numbers. This paper analyzes these two white-box implementations of SM4. It first points out a flaw in Lin's analysis on Xiao's white-box SM4. In counting encoding matrixes and affine constants, the real value should be 61 200$\cdot2^{32}$ instead of only one in their analysis. Then an improvement of Lin's method is given. By adjusting the order of recovering affine constants, the improved method greatly reduces the attacking complexity. For example, in recovering the affine constants of external encoding of look-up tables, the new method needs no more than $2^{10}$ look-ups by first searching equivalent keys and then determining affine constants. This is far less than $2^{46}$ in Lin's analysis. This study also proposes a third-party analysis on Bai's white-box SM4, and points out that the size of keys and external encodings is 61 200$\cdot 2^{128}$. Analysis shows that, both of the two white-box SM4 rely on the security of their affine constants in external encodings, the linear transformation parts contribute very little to security, and simply complicating internal encodings/decodings. Furthermore, at the expense of implementation hardness to increase diversity, the method of splitting affine matrixes or constants cannot efficiently improve security. All these findings will be useful to analyze and design white-box ciphers.

Discovery and Analysis of High Frequency Words in Password Sets Hot!
YAN R-R, CHEN H
Journal of Cryptologic Research. 2018, 5 (6): 671-679. ;  doi: 10.13868/j.cnki.jcr.000275
Full Text: HTML (1 KB)  PDF (954 KB)  ( 16 )
Show Abstract ( 19 )

Vocabulary is an important feature of a password set. Quantitative analysis of vocabulary has not received sufficient attention. This paper first presents a method to discovery for high-frequency words (hot words) based on effective frequency, which can effectively eliminate the interference of short words and improve the accuracy of discovery. In our hot word discovery software, a compressed trie tree was used to improve the performance of hot word discovery. Using the above method, hot words are collected from two password sets, such as CSDN and RockYou. By analyzing the top 100 words in these sets, we found the different vocabulary characteristics in passwords from China Mainland users and Western country users. The correlation analysis with the existing corpuses further confirms the significant difference between the two password sets. This paper also presents a method to quantitatively measure the vocabulary difference between two password sets by the cosine similarity. Analysis of multiple password sets shows that this method can effectively distinguish password sets from different regions. This paper quantitatively describes the characteristics of vocabulary in password set, which is of great significance for constructing a target corpus and improving the efficiency of password guessing.

Construction and Application of 4 × 4 Formalized MDS Matrices Hot!
ZHANG S Y, WANG Y J, WANG L, WANG T
Journal of Cryptologic Research. 2018, 5 (6): 680-694. ;  doi: 10.13868/j.cnki.jcr.000276
Full Text: HTML (1 KB)  PDF (9147 KB)  ( 27 )
Show Abstract ( 16 )

The $4\times4$ MDS matrices over $\textrm{GL}(4, F_{2})$ are widely used in the design of diffusion layer in block ciphers, because they can provide the largest number of differential branches, and thus can resist differential and linear analyses. Since lightweight MDS matrices with few XOR operations are more cost-saving in circuit implementation, such kind of matrices have important applications in fast searching schemes. The need of such matrices is more pronounced with cryptographic algorithms being more frequently used in lightweight circumstances such as Internet of Things. Based on the construction of the lightweight $4\times4$ MDS matrices, this paper presents the concept of formalized MDS matrix: some of the entries that make up the matrix are known, their positions are fixed, and the criteria of being an MDS matrix are satisfied. Based on the definition above, this paper constructs $4\times4$ formalized MDS matrices with only three entries, like $L_{i}[I, A, A^{d}]$, where $I$ is a $4\times4$ identity matrix, $i$ represents the number of identity matrices in the formalized MDS matrices, $o(A)$ = 15 and $d = 2, 3,\cdots, 14$. Based on the theory of finite fields, by traversing all the $4\times4$ matrices of period 15 over $F_{2}$, a total of 18 432 lightweight MDS matrices of 13 XORs and 17 280 of 12 XORs are obtained. Based on these results, a general construction of formalized MDS matrices is given by increasing the number of entries and transforming the algebraic relations among them. Using this algorithm, a fast implementation of the lightest $4\times4$ MDS matrices with 10 XORs over $\textrm{GL}(4, F_{2})$ is conducted, and the algebraic structures of these matrices is studied. Compared with general exhaustive search, the method presented in this paper greatly reduces the searching space and has higher accuracy and construction efficiency.

Authenticated Key Exchange from Supersingular Isogeny Hot!
XU X, LI B, WANG K P, XUE H Y
Journal of Cryptologic Research. 2018, 5 (6): 695-704. ;  doi: 10.13868/j.cnki.jcr.000277
Full Text: HTML (1 KB)  PDF (816 KB)  ( 25 )
Show Abstract ( 2 )

This paper studies the supersingular isogeny cryptosystem, a new promising post-quantum cryptosystem, and proposes a provably secure two-pass authenticated key exchange protocol over supersingular isogeny cryptosystems inspired by twin Diffie-Hellman problems. The proposed protocol is also an MQV-style protocol, hence it inherits sound properties of (H)MQV protocol. The security of the proposed protocol is based on the hardness of computing isogenies between supersingular elliptic curves. This paper gives heuristic arguments about the security properties, and formally proves its security in the authenticated-links adversarial model of Canetti-Krawczyk. To prove the security, a twin version of supersingular isogeny assumption is proposed. Compared with the lattice-based schemes, the proposed protocol has smaller keys and larger computation.

Journal of Cryptologic Research
 Accepts Note: The papers published below will continue to be available from this page until they are assigned to an issue. To see an article, click its [PDF] link. To review many abstracts, check the boxes to the left of the titles you want, and click the 'Selected articles' button. To see one abstract at a time, click its [Abstract] link.
Journal of Cryptologic Research
 2018 Vol.5 No.1 No.2 No.3 No.4 No.5 2017 Vol.4 No.1 No.2 No.3 No.4 No.5 No.6 2016 Vol.3 No.1 No.2 No.3 No.4 No.5 No.6 2015 Vol.2 No.1 No.2 No.3 No.4 No.5 No.6 2014 Vol.1 No.1 No.2 No.3 No.4 No.5 No.6

Top Read
»

Preface on Homomorphic Encrpytion

CHEN K F, JIANG L Z
2017, 4(6): 560-560. Full Text: PDF (351KB) (1719)
»

Application of (Fully) Homomorphic Encryption for Encrypted Computing Models

JIANG L Z, XU C X, WANG X F, CHEN K F, WANG B C.
2017, 4(6): 610-610. Full Text: PDF (5733KB) (1834)
»

ZUC-256 Stream Cipher

Design Team
2018, 5(2): 179-179. Full Text: PDF (1448KB) (802)
»

Research and Progress of Order Preserving Encryption

GUO J J, MIAO M X, WANG J F
2018, 5(2): 195-195. Full Text: PDF (1226KB) (714)
»

Key Update and Trusted Positioning System Based on Blockchain

LI D W, LIU J W, GUANG Z Y, QIN Y Y, WU Q H
2018, 5(1): 42-42. Full Text: PDF (1140KB) (1097)
»

Preface of Special Issue on Blockchain Technology

FENG D G，OUYANG Y G
2018, 5(5): 457-457. Full Text: PDF (112KB) (513)
»

Research Advances on Authenticated Encryption Algorithms#br#

WU W L
2018, 5(1): 82-82. Full Text: PDF (331KB) (1075)
»

Overview on Fully Homomorphic Encryption

LI Z P, MA C G, ZHOU H S
2017, 4(6): 578-578. Full Text: PDF (746KB) (1174)
»

Efficient Homomorphic Encryption and Its Application

YANG H M, JIN B L, CHEN C, WU X Y
2017, 4(6): 619-619. Full Text: PDF (1074KB) (667)
»

Preface

2018, 5(2): 181-181. Full Text: PDF (344KB) (540)
»

Biclique Cryptanalysis of Lightweight Block Cipher PRINCE

YUAN Z, PENG Z
2017, 4(6): 527-527. Full Text: PDF (3937KB) (649)
»

Digital Certificate Scheme Based on Lattice Signature Algorithm

LI Z C, LIANG L, SUN Y F
2018, 5(1): 20-20. Full Text: PDF (1229KB) (629)
»

Analysis on Photon-number-splitting Attack Against Decoy-state Quantum Key Distribution Schemes

LI H X, CHI Y G, HAN Y, YAN B, WANG W
2018, 5(1): 12-12. Full Text: PDF (4140KB) (733)
»

Related Randomness Attacks on Quasi-adaptive NIZK for Linear Subspaces Revisited

LIU J H, YU Y, YANG B, WU W Q
2018, 5(2): 110-110. Full Text: PDF (1518KB) (587)
»

University Score Management System Based on Blockchain Technology

SUN Y Q, WANG Q C
2018, 5(5): 578-578. Full Text: PDF (9005KB) (667)
»

Preface

HU L
2018, 5(1): 69-69. Full Text: PDF (121KB) (561)
»

User Authentication and Key Agreement Protocol for Mobile Client-multi-server Environment

LIU B, ZHOU Y Y, HU F, LI F G
2018, 5(2): 125-125. Full Text: PDF (2952KB) (598)
»

Fair Secret Sharing Scheme with Unconditional Security

ZHANG B H, XIE X J, TANG Y S
2017, 4(6): 544-544. Full Text: PDF (766KB) (535)
»

Research Progress on Theory of Blockchains

SHAN J Y, GAO S
2018, 5(5): 500-500. Full Text: PDF (1237KB) (697)
»

Differential Analysis of Lightweight Block Cipher GIFT

ZHAO J Y, XU S Y, ZHANG Z J, DONG X Y, LI Z
2018, 5(4): 343-343. Full Text: PDF (894KB) (456)
»

Simple Analysis on Noiseless Fully Homomorphic Encryptions

WANG L C,LI J
2017, 4(6): 595-595. Full Text: PDF (596KB) (600)
»

Cube Attack on Round-reduced Fruit

SUN Y S
2017, 4(6): 536-536. Full Text: PDF (485KB) (504)
»

Parallel FHEW Based on Multi-core CPU

YANG X Y, DING Y T, ZHOU T P
2017, 4(6): 626-626. Full Text: PDF (481KB) (552)
»

Survey on Security of Blockchain

SI X M, XU M X, YUAN C
2018, 5(5): 469-469. Full Text: PDF (2061KB) (630)
»

Security Analysis of Authentication Mechanism in Grain-128a

WANG P, ZHENG K Y
2018, 5(1): 100-100. Full Text: PDF (537KB) (451)
»

Identity-based Broadcast Fully Homomorphic Encryption Scheme from LWE

FENG H W, LIU J W, WU Q H
2018, 5(1): 34-34. Full Text: PDF (742KB) (495)
»

Secure Skyline Query Processing over Location-based Data

WANG W G, LI H
2018, 5(2): 230-230. Full Text: PDF (4441KB) (387)
»

Secure Data Acquisition Method among Multi-hop Transmission Environments

LIU Z, HAN Y L, YANG X Y, PAN F
2018, 5(2): 217-217. Full Text: PDF (1536KB) (344)
»

Cloud-based RFID Mutual Authentication Protocol

CHEN M M, DONG Q K, LI L L}
2018, 5(3): 241-241. Full Text: PDF (709KB) (302)
»

Research on Cryptanalysis on Authenticated Cipher FASER

FENG X T, ZHANG F
2018, 5(1): 93-93. Full Text: PDF (530KB) (425)
Journal of Cryptologic Research
Top Download
»

Survey of Lattice-based Cryptography

WANG X Y, LIU M J
2014, 1(1): 27-27. Full Text: PDF (678KB) (7597)
»

Research on Attribute-based Cryptography

FENG D G, CHEN C
2014, 1(1): 12-12. Full Text: PDF (769KB) (7595)
»

An Overview on the Security Techniques and Challenges of the Internet of Things

WU C K
2015, 2(1): 53-53. Full Text: PDF (401KB) (5786)
»

Research on White-box Cryptography

LIN T T, LAI X J
2015, 2(3): 267-267. Full Text: PDF (333KB) (5339)
»

Secret Key Extraction in Wireless Channel

LI G Y, HU A Q, SHI L
2014, 1(3): 224-224. Full Text: PDF (1519KB) (4244)
»

Provable Security for Public Key Encryption——Challenges and Approaches

LIU S L
2014, 1(6): 550-550. Full Text: PDF (447KB) (3914)
»

Cryptanalysis of Quantum Cryptographic Protocols

WEN Q Y, QIN S J, GAO F
2014, 1(2): 210-210. Full Text: PDF (866KB) (3815)
»

A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm

SHANG M, MA Y, LIN J Q, JING J W
2014, 1(2): 166-166. Full Text: PDF (1051KB) (3775)
»

Bitcoin and Digital Fiat Currency

QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B
2017, 4(2): 186-186. Full Text: PDF (1282KB) (3361)
»

Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table

ZHENG Z X, JI Q B, YU H B
2014, 1(1): 110-110. Full Text: PDF (778KB) (3335)
 Top Cited Top CitedTop CitedTop CitedTop CitedTop Cited
Supervised&Sponsored
 Supervised by China Association for Science and Technology(CAST) Sponsored by Chinese Association for Cryptologic Research(CACR),Beijing Academy of Information Science & Technology(BAIST) and China Science and Technology Press
Announcement
 · Recommended Academic Periodicals and International Conferences List by CACR (2018)
 · Contents and Front Covers of Journal of Cryptologic Research
 · 2018 Open Fund of State Key Laboratory of Cryptology Now Release
 · Call for Papers of 2018 Conference on Identification, Certification and Authentication (CICA2018)
 · Call for Papers for Special Column “Blockchain Technique”
 · Call for Papers for Special Column “Secure Multi-party Computation”
 · Call for Papers of 2018 CACR Conference on Cryptology Algorithm
 · Call for Papers of 2018 CACR Conference on Cryptology Test and Evaluation
 · Subscription Notification of Journal of Cryptologic Research
 · Good News: Journal of Cryptologic Research Successfully Indexed by CSTPCD
more>>
 Links » CACR    » MathMagic    » Journal of Software
 Copyright © Journal of Cryptologic Research