[1] |
Runlian ZHANG, Mi ZHANG, Xiaonian WU, Rui SHU.
Differential property evaluation method based on GPU for large-state cryptographic S-boxes
[J]. Journal of Computer Applications, 2024, 44(9): 2785-2790.
|
[2] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[3] |
Guangyao ZHAO, Xuan SHEN, Bo YU, Chenhui YI, Zhen LI.
Impossible differential cryptanalysis of reduced-round ultra-lightweight block cipher PFP
[J]. Journal of Computer Applications, 2023, 43(9): 2784-2788.
|
[4] |
Dongdong LIN, Manman LI, Shaozhen CHEN.
Conditional differential cryptanalysis method of KATAN48 algorithm based on neural distinguishers
[J]. Journal of Computer Applications, 2023, 43(8): 2462-2470.
|
[5] |
Yipeng SHI, Jie LIU, Jinyuan ZU, Tao ZHANG, Guoqun ZHANG.
Compact constraint analysis of SPONGENT S-box based on mixed integer linear programming model
[J]. Journal of Computer Applications, 2023, 43(5): 1504-1510.
|
[6] |
Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG.
Efficient certificateless ring signature scheme based on elliptic curve
[J]. Journal of Computer Applications, 2023, 43(11): 3368-3374.
|
[7] |
ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin.
Analysis and improvement of certificateless signature scheme
[J]. Journal of Computer Applications, 2023, 43(1): 147-153.
|
[8] |
Suqing LIN, Shuhua ZHANG.
Attribute-based encryption scheme with verifiable search and non-monotonic access structure
[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779.
|
[9] |
Dong ZHU, Xinchun YIN, Jianting NING.
Certificateless signature scheme with strong privacy protection for internet of vehicles
[J]. Journal of Computer Applications, 2022, 42(10): 3091-3101.
|
[10] |
LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang.
Integral attack on PICO algorithm based on division property
[J]. Journal of Computer Applications, 2020, 40(10): 2967-2972.
|
[11] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[12] |
SU Jingfeng, LIU Juxia.
Efficient certificateless aggregate signcryption scheme without bilinear pairings
[J]. Journal of Computer Applications, 2018, 38(2): 374-378.
|
[13] |
XU Hailin, LU Yang.
Efficient bilinear-pairing-free certificate-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2018, 38(2): 379-385.
|
[14] |
ZUO Liming, CHEN Zuosong, XIA Pingping, YI Chuanjia.
Efficient and provably secure short proxy signature scheme
[J]. Journal of Computer Applications, 2018, 38(12): 3455-3461.
|
[15] |
CHENG Lu, WEI Yuechuan, PAN Xiaozhong, LI Anhui.
Multidimensional zero-correlation linear cryptanalysis on Zodiac cipher algorithm
[J]. Journal of Computer Applications, 2017, 37(6): 1605-1608.
|