Journal of Cryptologic Research
 
Citation Search Quick Search DOI Advanced
  Author Center
   » Submission Online
   » Instruction for Authors
   » Template
   » Copyright Agreement
  Peer Review
   » Peer Review
   » Peer Review Policy
Journal Online
   » Accepted
   » In Press
   » Current Issue
   » Earlier Issues
   » View by Fields
   » Top Downloaded
   » RSS
 

2019, 6(2)
HighLights More»   
· Overview on Privacy Protection in Bitcoin——LI X D, NIU Y K, WEI L B, ZHANG C, YU N H
· Biclique Cryptanalysis of Piccolo——XU L H, GUO J S, CUI J Y, LI M M
· Zero-difference Balanced Functions on Matrix Rings——YI Z X, YIN Y Y
· Scheme of Block Ciphers Recognition Based on Randomness Test——ZHAO Z C, ZHAO Y Q, LIU F M
· Preface of Special Issue on Secure Multi-party Computing Technology——XU Q L, TANG C M
Current Issue Accepted Earlier Issues Top Read Top Downloaded Top Cited
  Journal of Cryptologic Research--2019, 6 (2)   Published: 25 April 2019
Select | Export to EndNote
Reviews
Overview on Privacy Protection in Bitcoin Hot!
LI X D, NIU Y K, WEI L B, ZHANG C, YU N H
Journal of Cryptologic Research. 2019, 6 (2): 133-149. ;  doi: 10.13868/j.cnki.jcr.000290
Full Text: HTML (1 KB)  PDF (1984 KB)  ( 221 )
Show Abstract ( 207 )

the other is to make some modifications with cryptography techniques such as stealth address, ring signature, zero-knowledge proofs, homomorphic encryption. Finally, challenges and perspectives of privacy protection of Bitcoin and Blockchain are discussed.the other is to make some modifications with cryptography techniques such as stealth address, ring signature, zero-knowledge proofs, homomorphic encryption. Finally, challenges and perspectives of privacy protection of Bitcoin and Blockchain are discussed.

Articles
Biclique Cryptanalysis of Piccolo Hot!
XU L H, GUO J S, CUI J Y, LI M M
Journal of Cryptologic Research. 2019, 6 (2): 150-164. ;  doi: 10.13868/j.cnki.jcr.000291
Full Text: HTML (1 KB)  PDF (7278 KB)  ( 53 )
Show Abstract ( 65 )

The lightweight block cipher Piccolo is very efficient for hardware implementation, and its security evaluation has been a hot topic in academia. Based on the idea of biclique attack, combined with the properties of the round function and the key schedule of Piccolo, this paper analyzes the security of Piccolo-80 and Piccolo-128 with unbalanced biclique attack and stars attack. For the unbalanced biclique attack of Piccolo-80, the required data complexity is 236, memory complexity
is 211.12, and computational complexity is 279.03. For the Stars attack of Piccolo-80, the required data complexity is 2, memory complexity is 28.12 and computational complexity is 279.31. For the two attacks of Piccolo-128, the required data complexities are 220 and 2, memory complexities are 211.17 and 28.19, and computational complexities are 2127.05 and 2127.40, respectively. Compared withthe existing attacks, this study takes into consideration of the memory complexity, and makes some optimization in terms of data complexity and computational complexity.

Zero-difference Balanced Functions on Matrix Rings Hot!
YI Z X, YIN Y Y
Journal of Cryptologic Research. 2019, 6 (2): 165-176. ;  doi: 10.13868/j.cnki.jcr.000292
Full Text: HTML (1 KB)  PDF (293 KB)  ( 53 )
Show Abstract ( 58 )

Zero-difference balanced (ZDB) functions have many applications in codes and designs, such as the constructions of constant composition codes, constant weight codes, difference systems of sets, and frequency-hopping sequences. Those constructions can meet some optimal bounds if the ZDB functions satisfy some conditions. Most of known ZDB functions are constructed based on cyclotomic cosets over communicative rings. Hence ZDB functions on matrix rings Mn(q) over finite field Fq, are considered in this study. This paper proves that the invertible matrices satisfying certain condition must have its multiplicative order r meeting the condition r|qn-1. Based on this result, new ZDB functions on matrix rings with parameters (qn^2,(qn^2-1)/r+1,r-1), are proposed. Finally,some frameworks of applications of ZDB function are presented, such as the constructions of constant composition codes, constant weight codes, and difference systems of sets. The proposed constructions meet some optimal bounds under some constraints and have many important applications.

Scheme of Block Ciphers Recognition Based on Randomness Test Hot!
ZHAO Z C, ZHAO Y Q, LIU F M
Journal of Cryptologic Research. 2019, 6 (2): 177-190. ;  doi: 10.13868/j.cnki.jcr.000293
Full Text: HTML (1 KB)  PDF (567 KB)  ( 71 )
Show Abstract ( 74 )

Cryptosystem recognition is a process, in the condition of known ciphertext, to classify or recognize the encryption algorithm based on analyzing the feature of the ciphertext. By extracting features and training the model of classification algorithm, machine learning based cryptosystem recognition scheme can construct the cryptosystem classifier to complete its task. This study adopts NIST's randomness test standard to design ciphertext feature extraction method, then proposes a cryptosystem recognition scheme based on random forest. Experimental results show that the scheme can effectively classify plaintexts and ciphertexts or ciphertexts encrypted by block cipher in different mode (ECB mode and CBC mode). For ciphertexts encrypted by different cryptosystems such as AES, Blowfish, Camellia, DES, 3DES, IDEA, the proposed scheme can also give a recognition results which are obviously better than random guess. Compared to existing ciphertext features, some features proposed in this study have good recognition accuracy with less data size. The correlative research can further promote the research on ciphertext feature extraction and cryptosystem recognition.

Preface on Special Topics
Preface of Special Issue on Secure Multi-party Computing Technology Hot!
XU Q L, TANG C M
Journal of Cryptologic Research. 2019, 6 (2): 191-193. ;  doi: 10.13868/j.cnki.jcr.000294
Full Text: HTML (1 KB)  PDF (176 KB)  ( 65 )
Show Abstract ( 129 )
In the secure multi-party computation (SMPC), two or more participants who have private inputs, want to jointly calculate some functionalities, get their outputs, and achieve some secure properties such as correctness, privacy, fairness, and so on. In recent years, with the development of cloud computing, big data, artificial intelligence, block chains, and other technologies, the challenges of data security and privacy protection have become increasingly prominent. Secure multi-party computing has been highly expected, and is recognized as an important technique to solve such problems, which has attracted unprecedented attention.
In order to promote the theoretical and applied research of SMPC in China, Journal of Cryptologic Research organized the special column on "Secure Multi-party Computing Technology" by calling and inviting for papers widely, hoping to promote the development of this field. 6 papers are selected into this special column after the peer review process.
One review is included in this special column. ``Advances in Practical Secure Two-party Computation and Its Application in Genomic Sequence Comparison'' by Zhao Chuan et al. reviews the advances in practical secure two-party computation in recent years, and focuses on the major research results in the field of genomic sequence comparison based on secure two-party computation. The authors start with introducing two major construction techniques (i.e., homomorphic encryption and garbled circuit), and give a clear development trend, respectively. In addition, the existing deficiencies in this research area and some possible research directions are pointed out.
Three papers on specific secure multi-party computation protocol are included in this special column. The paper entitled ``Privately Determining Equality of Ranks of Matrix and Its Augmented Ones and Applications'' by Du Run-Meng et al. designs an SMPC protocol in semi-honest adversaries model to determine whether the rank of a matrix is equal to its augmented ones, and applies this protocol in privately determining the relationship between two lines, determining whether a polynomial divides another one. The paper entitled ``Secure Multiparty Computation of the Maximum and the Minimum in Cloud Environment and Its Statistics Application'' by Li Zhan-Li et al. adapts 0-1 encoding method to encode a private number into an array, and then using the multikey NTRU fully homomorphic encryption algorithm in cloud environment, designs the SMPC protocol in semi-honest adversaries model to compute the maximum and the minimum value. The paper entitled ``Histogram and Pie Chart of Confidentiality Generation Agreement'' by Ge Xue et al. uses homomorphic encryption algorithm to design an SMPC protocol to compute the summation, and further convert it to generate the histogram and pie chart. The protocol is also proved in semi-honest adversaries model.
Two papers on secure multi-party computation application protocol are included in this special column. The paper entitled ``Smart Contract Execution System over Blockchain Based on Secure Multi-party Computation'' by Zhu Yan et al. proposes three technologies: a smart contract framework based on secure multi-party computation (SMPC), a fair SMPC algorithm built on linear secret sharing, and a non-blocking message passing interface, to ensure the privacy of inputs and the correctness of computing result during smart contract execution. Thus, the execution security of smart contract can be enhanced by the proposed technologies in the Blockchain. The paper entitled ``Neural Network for Processing Privacy-protected Data'' by Wang Qi-Zheng et al. uses the homomorphic encryption based SMPC to design a neural network computation outsourcing protocol. It keeps the computability of data under the premise of ensuring data privacy.
SMPC is an important research field in cryptography. It has been developed for a long time with the emergence of public key cryptography. In recent years, with the improvement of the efficiency of secure multi-party computing protocols and the urgent requirement of security and privacy protection in various distributed application scenarios, the research of SMPC protocols has become one of the most liven research fields in cryptography. Through this special column, we hope that readers can get a glimpse of the research trends in SMPC technology.
Reviews in Special Topics
Advances in Practical Secure Two-party Computation and Its Application in Genomic Sequence Comparison Hot!
ZHAO C, ZHAO S N, JIA Z T, ZHANG B, ZHANG B
Journal of Cryptologic Research. 2019, 6 (2): 194-204. ;  doi: 10.13868/j.cnki.jcr.000295
Full Text: HTML (1 KB)  PDF (792 KB)  ( 68 )
Show Abstract ( 93 )

Secure two-party computation is an important research direction in cryptography. As a special case of secure multi-party computation, secure two-party computation involves only two participants. Compared with the cases of three or more parties, secure two-party computation is more challenging in theory and  has a wider range of applications. In recent years, research on practical secure two-party computation has achieved rapid development. Development has made important breakthroughs in the efficiency of generic protocol construction, and has received extensive attention in various applications involving data privacy computation, such as privacy-preserving genomic data analysis. This paper introduces basic concepts and tools of secure two-party computation, and gives a brief overview of some important research results of secure two-party computation in recent years. In addition, the application of secure two-party computation in genomic sequence comparison and its research progress is summarized. For a clear introduction on related work, we start with introducing two major construction techniques (i.e., homomorphic encryption and garbled circuit), and give a clear development direction. In addition, the existing deficiencies in this research area and some possible research directions are pointed out.

Articles in Special Topics
Privately Determining Equality of Ranks of Matrix and Its Augmented Ones and Applications Hot!
DU R M, LIU X H, LI S D, WEI Q
Journal of Cryptologic Research. 2019, 6 (2): 205-218. ;  doi: 10.13868/j.cnki.jcr.000296
Full Text: HTML (1 KB)  PDF (677 KB)  ( 61 )
Show Abstract ( 63 )

As a key technique of privacy-preserving and cyberspace security, secure multiparty computation (SMC) is an important research topic in cryptography and is a focus in the international cryptographic community. Secure scientific computation is an important branch of SMC. Matrix is an essential tool of modern science and technology, and it plays significant roles in almost all fields of natural science, engineering, and social science. The rank of a matrix reflects the inherent characteristics of the matrix. Many problems in scientific computation can be induced to the computation of ranks of matrices, and many secure multiparty scientific computations can therefore be induced to the private computation of ranks of matrices. Secure multiparty computation of ranks of matrices is a basic problem of SMC, and is of important theoretical and practical significance. This work studies how to privately determine whether the rank of a matrix is equal to its augmented ones. An efficient protocol is proposed to solve this problem, and the protocol is proved to be secure in the semi-honest model. The proposed protocol can be used as a basic building block to construct many secure multiparty computation protocols, and is further applied to solve other SMC problems, including privately determining the relationship between two lines, determining whether a polynomial divides another one, etc.. The computational and communication complexities are also analyzed, and the feasibility of the scheme are verified by some experiments. Efficiency analysis and experimental data show that the proposed schemes are efficient.

Secure Multiparty Computation of the Maximum and the Minimum in Cloud Environment and Its Statistics Application Hot!
LI Z L, CHEN L C, CHEN Z H, LIU Y R
Journal of Cryptologic Research. 2019, 6 (2): 219-233. ;  doi: 10.13868/j.cnki.jcr.000297
Full Text: HTML (1 KB)  PDF (503 KB)  ( 64 )
Show Abstract ( 89 )

Secure multiparty computation becomes a cryptography research hotspot in recent years. This work mainly studies how to compute the maximum and minimum values securely for some privately input numbers. This is a problem of private-preserving scientific computation. However, so far, very few results are known, and there are no solutions designed for the cloud computing environment. Aiming at these issues, we first adopt 0-1 encoding to encode a private number into an array. This coding technique can hide the confidential data in the array encoded with 0-1. The protocols to compute the maximum and the minimum values are designed by using the multikey NTRU fully homomorphic encryption algorithm in cloud environment. The security of the proposed protocols in this study is analyzed in the semi-honest model, the security proof utilizes the method of simulation paradigm. It is the first time to construct secure computation protocols for the maximum and the minimum values in cloud computing environment, and the solutions can also resist quantum attack. The schemes designed in this study have been adapted to the cloud environment, which can save a large amount of computation cost for users. Finally, the proposed protocols are applied to statistics, and a new problem about the secure multiparty computation of range problem is solved. The solution is simple and secure.

Histogram and Pie Chart of Confidentiality Generation Agreement Hot!
GE X, WANG Y N, DOU J W
Journal of Cryptologic Research. 2019, 6 (2): 234-245. ;  doi: 10.13868/j.cnki.jcr.000298
Full Text: HTML (1 KB)  PDF (560 KB)  ( 64 )
Show Abstract ( 50 )

 Secure multiparty computation (SMC) is an important aspect of cryptography and a research focus in the international cryptographic community. Though there are universal solutions to secure multiparty computation problems, for the efficiency reason, specific solutions should be developed for specific problems. Although many SMC problems have been investigated, more problems remain to be studied. How to privately generate a histogram or pie chart is a completely new problem which has not been studied. To privately generate a histogram or pie chart, this paper first proposes a new encoding scheme, based on the Paillier additively homomorphic encryption algorithm, and designs a protocol to privately generate a histogram or pie chart. Then a more efficient and more secure protocol is proposed based on elliptic curve additively homomorphic encryption algorithm and threshold encryption algorithms. Finally, the correctness of the proposed protocols are analyzed, and it is proved that these protocols are secure using simulation paradigm in the semi-honest model. The computational complexities and communication complexities of the proposed protocols are analyzed, which shows that these protocols are efficient. The second protocol can resist collision attack of any parties, and the ideas and the protocols in this paper can be used to solve other practical problems.

Smart Contract Execution System over Blockchain Based on Secure Multi-party Computation Hot!
ZHU Y, SONG X X, XUE X B, QIN B H, LIU G W
Journal of Cryptologic Research. 2019, 6 (2): 246-257. ;  doi: 10.13868/j.cnki.jcr.000299
Full Text: HTML (1 KB)  PDF (845 KB)  ( 105 )
Show Abstract ( 108 )

Smart contract is an executable computer protocol in compliance with the terms of interaction among two or more parties, and has legal effect in the real world. It is becoming more and more important as a core technology of Blockchain. However, how to ensure the confidentiality of private information hidden in digital assets and the resistance of smart contract against attacks is an important problem. This study proposes three techniques: a smart contract framework based on secure multi-party computation (SMPC), a fair SMPC algorithm built on linear secret sharing, and a non-blocking message passing interface (MPI). These techniques can be used to guarantee secure group communication after several nodes hit the fault, error, and failure. Moreover, the techniques regulate the workflow, language structure, and syntax specification of SMPC-based smart contract. In addition, the privacy of inputs and the correctness of computing result can be ensured during smart contract execution. Thus, the execution security of smart contract can be enhanced by the proposed techniques in the Blockchain.

Neural Network for Processing Privacy-protected Data Hot!
WANG Q Z, GAO L
Journal of Cryptologic Research. 2019, 6 (2): 258-268. ;  doi: 10.13868/j.cnki.jcr.000300
Full Text: HTML (1 KB)  PDF (1656 KB)  ( 115 )
Show Abstract ( 110 )

Neural network is an important data classification tool. A well-trained neural network can efficiently and accurately classify and predict input data. It has extensive applications in information processing and pattern recognition. At present, the study of neural network algorithms and the training of neural networks based on them have become the focus of attention in the industry and academia. Well-trained neural networks have gradually become important intellectual property rights for many data processing companies. Therefore, when ordinary users want to use neural networks for data classification, they often need to host data to professional organizations. How to protect data privacy becomes an important issue. In addition, the current neural network algorithm needs a large amount of computation and cannot run well on devices with limited computing resources. The introduction of cloud computing services provides a solution that can delegate complex neural network computing tasks to the cloud, but there is also the risk of privacy leakage. In order to solve the above problems, a privacy protection neural network based on homomorphic encryption is designed in this paper. The homomorphic encryption algorithm is used to encrypt the data, and the operation process of the neural network is rewritten by means of the properties of homomorphic addition and multiplication. While preserving the data privacy, the designed neural network preserves the computability of the data. Compared with the previous privacy protection neural networks, the proposed one can be applied to complex neural networks with higher security.

Journal of Cryptologic Research
Accepts
Note: The papers published below will continue to be available from this page until they are assigned to an issue. To see an article, click its [PDF] link. To review many abstracts, check the boxes to the left of the titles you want, and click the 'Selected articles' button. To see one abstract at a time, click its [Abstract] link.
Journal of Cryptologic Research
2019 Vol.6      No.1
2018 Vol.5      No.1      No.2      No.3      No.4      No.5      No.6
2017 Vol.4      No.1      No.2      No.3      No.4      No.5      No.6
2016 Vol.3      No.1      No.2      No.3      No.4      No.5      No.6
2015 Vol.2      No.1      No.2      No.3      No.4      No.5      No.6
2014 Vol.1      No.1      No.2      No.3      No.4      No.5      No.6
密码学报
 Top Read
»

Key Points and Methodology in Constructions and Security Proofs of Public-key Cryptosysems

ZHAO Z, WU G, LAI J C, JIANG P, ZHU B R, MU Y, SUSILO W, GUO F C
2019, 6(1): 17-17. Full Text: PDF (711KB) (1479)
»

Z Cipher Scheme

ZHENG J H, REN S, JING Q, SONG R H
2018, 5(6): 590-590. Full Text: PDF (5714KB) (1689)
»

Preface of Special Issue on Blockchain Technology

FENG D G,OUYANG Y G
2018, 5(5): 457-457. Full Text: PDF (112KB) (744)
»

University Score Management System Based on Blockchain Technology

SUN Y Q, WANG Q C
2018, 5(5): 578-578. Full Text: PDF (9005KB) (3527)
»

Research Progress on Theory of Blockchains

SHAN J Y, GAO S
2018, 5(5): 500-500. Full Text: PDF (1237KB) (1248)
»

Survey on Security of Blockchain

SI X M, XU M X, YUAN C
2018, 5(5): 469-469. Full Text: PDF (2061KB) (1118)
»

Differential Analysis of Lightweight Block Cipher GIFT

ZHAO J Y, XU S Y, ZHANG Z J, DONG X Y, LI Z
2018, 5(4): 343-343. Full Text: PDF (894KB) (766)
»

Research on Mining Attacks in Bitcoin

HAN J, ZOU J, JIANG H, XU Q L
2018, 5(5): 483-483. Full Text: PDF (3452KB) (930)
»

Simulator of Quantum Computer Using Classical Computer

FAN H Q, HU B, YUAN Z.
2018, 5(3): 261-261. Full Text: PDF (808KB) (567)
»

Practical Cases of Side-channel Analysis

WANG A, GE J, SHANG N, ZHANG F, ZHANG G S
2018, 5(4): 398-398. Full Text: PDF (7618KB) (655)
»

Cloud-based RFID Mutual Authentication Protocol

CHEN M M, DONG Q K, LI L L}
2018, 5(3): 241-241. Full Text: PDF (709KB) (560)
»

Design of Blockchain for Clearing and Settlement

WANG Z P, WU Q H
2018, 5(5): 545-545. Full Text: PDF (1464KB) (654)
»

Research on Fault-correcting Blockchain Technology

LI P L, XU H X, MA T J, MU Y H
2018, 5(5): 509-509. Full Text: PDF (1013KB) (594)
»

Fair Multi-party Non-repudiation Protocol Based on Block Chain

YUAN B A, LIU J, LI G
2018, 5(5): 555-555. Full Text: PDF (2471KB) (601)
»

Preface of Elliptic Curve Cryptography Column (in Chinese and in English)#br#

XU M Z
2018, 5(3): 300-300. Full Text: PDF (257KB) (398)
»

Privacy Data Authentication Schemes Based on Borromean Ring Signature

ZHANG F, HUANG N N, GAO S
2018, 5(5): 537-537. Full Text: PDF (628KB) (549)
»

On Construction and Application of Deterministic Encoding Functions into Elliptic Curves

HE X Y, YU W, WANG K P
2018, 5(3): 314-314. Full Text: PDF (610KB) (496)
»

Improved Certificate-based Conditional Proxy Re-encryption Scheme

XU J R, CHEN K F, SHEN Z H, XU X D, LIU Y
2018, 5(4): 358-358. Full Text: PDF (992KB) (546)
»

Multi-valued Byzantine Consensus Scheme with High Transmission Efficiency

GUO B Y, LI X Y
2018, 5(5): 528-528. Full Text: PDF (492KB) (397)
»

Identification Scheme Based on Supersingular Isogenies

LIN Q P, GAO S
2018, 5(5): 515-515. Full Text: PDF (499KB) (335)
»

Implementation Scheme of SIS Lattice Signature Against Side Channel Attack

LI Z C, SUN Y F, YANG Y T, ZHANG J M, YANG W, LIANG L
2018, 5(3): 248-248. Full Text: PDF (837KB) (321)
»

Preface of Side-channel Analysis Column (in Chinese and in English)

BAI G Q, WANG A
2018, 5(4): 382-382. Full Text: PDF (387KB) (270)
»

Efficient Multi-party Fair Contract Signing Protocol Based on Blockchains

GAO Y, WU J X
2018, 5(5): 567-567. Full Text: PDF (1387KB) (431)
»

Security Deduplication Method of Encrypted Data Without Any Additional Server

ZHANG S G, XIAN H Q, WANG L M, LIU H Y, HOU R T
2018, 5(3): 296-296. Full Text: PDF (3018KB) (277)
»

Discrete Logarithm Problem in p-groups of Elliptic Curves in Characteristic p

ZHU Y Q, ZHUANG J C, YU W, LIN D D
2018, 5(4): 375-375. Full Text: PDF (597KB) (254)
»

Algorithm of Converting Weierstrass Form into Edwards Form for Elliptic Curves over Binary Fields

ZHANG J W, ZHAO C A
2018, 5(3): 323-323. Full Text: PDF (499KB) (311)
»

Homomorphically Encrypted Arithmetic Operations over Symmetric Ternary Coding

FU H J, CAI B, XIANG H, SANG J
2018, 5(3): 270-270. Full Text: PDF (658KB) (263)
»

On AES Random Transform Masking Scheme Against DPA

LI L, OU Y, ZOU Y
2018, 5(4): 454-454. Full Text: PDF (3273KB) (325)
»

Applications of Game Theory in Blockchain

SONG L H, LI T, WANG Y L
2019, 6(1): 111-111. Full Text: PDF (4274KB) (734)
»

Multiple Impossible Differentials Cryptanalysis on 8-round Kiasu-BC

JIANG Z L, JIN C H
2018, 5(4): 367-367. Full Text: PDF (2208KB) (238)
Journal of Cryptologic Research
 Top Download
»

Survey of Lattice-based Cryptography

WANG X Y, LIU M J
2014, 1(1): 27-27. Full Text: PDF (678KB) (8532)
»

Research on Attribute-based Cryptography

FENG D G, CHEN C
2014, 1(1): 12-12. Full Text: PDF (769KB) (8332)
»

An Overview on the Security Techniques and Challenges of the Internet of Things

WU C K
2015, 2(1): 53-53. Full Text: PDF (401KB) (6468)
»

Research on White-box Cryptography

LIN T T, LAI X J
2015, 2(3): 267-267. Full Text: PDF (333KB) (5946)
»

Secret Key Extraction in Wireless Channel

LI G Y, HU A Q, SHI L
2014, 1(3): 224-224. Full Text: PDF (1519KB) (4682)
»

Provable Security for Public Key Encryption——Challenges and Approaches

LIU S L
2014, 1(6): 550-550. Full Text: PDF (447KB) (4285)
»

A Threshold Scheme for SM2 Elliptic Curve Cryptographic Algorithm

SHANG M, MA Y, LIN J Q, JING J W
2014, 1(2): 166-166. Full Text: PDF (1051KB) (4270)
»

Cryptanalysis of Quantum Cryptographic Protocols

WEN Q Y, QIN S J, GAO F
2014, 1(2): 210-210. Full Text: PDF (866KB) (4190)
»

Bitcoin and Digital Fiat Currency

QIN B, CHEN L C H, WU Q H, ZHANG Y F, ZHONG L, ZHENG H B
2017, 4(2): 186-186. Full Text: PDF (1282KB) (3986)
»

Faster Cryptanalytic Time-memory Trade-off Using Rainbow Table

ZHENG Z X, JI Q B, YU H B
2014, 1(1): 110-110. Full Text: PDF (778KB) (3696)
Top Cited

Top CitedTop CitedTop CitedTop CitedTop Cited
  Email Alert
Supervised&Sponsored
Supervised by China Association for Science and Technology(CAST)
Sponsored by Chinese Association for Cryptologic Research(CACR),Beijing Academy of Information Science & Technology(BAIST) and China Science and Technology Press
Announcement
· Recall Notification
· Recommended Academic Periodicals and International Conferences List by CACR (2018)
· Contents and Front Covers of Journal of Cryptologic Research
· 2018 Open Fund of State Key Laboratory of Cryptology Now Release
· Call for Papers of 2018 Conference on Identification, Certification and Authentication (CICA2018)
· Call for Papers for Special Column “Blockchain Technique”
· Call for Papers for Special Column “Secure Multi-party Computation”
· Call for Papers of 2018 CACR Conference on Cryptology Algorithm
· Call for Papers of 2018 CACR Conference on Cryptology Test and Evaluation
· Subscription Notification of Journal of Cryptologic Research
more>>     
Links
   » CACR
   » MathMagic
   » Journal of Software
Copyright © Journal of Cryptologic Research