[1] |
Ruiqi XIA, Manman LI, Shaozhen CHEN.
Identification on the structures of block ciphers using machine learning
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89.
|
[2] |
Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN.
Post-quantum encryption technology based on BRLWE for internet of things
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 140-149.
|
[3] |
Feng LIU, Jie YANG, Jiayin QI.
Survey on blockchain privacy protection techniques in cryptography
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44.
|
[4] |
Jianlin NIU, Zhiyu REN, Xuehui DU.
Cross-domain authentication scheme based on consortium blockchain
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133.
|
[5] |
Yu ZHANG, Hailiang LI.
RSA-based image recognizable adversarial attack method
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 40-48.
|
[6] |
Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN.
Survey of code-based digital signatures
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 1-17.
|
[7] |
Zhen ZHOU, Debiao HE, Min LUO, Li LI.
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 64-76.
|
[8] |
ZHANG Ning,TAN Shichong,FU Xiaotong,DU Xiaogang,LI Hui.
Summary and study on the curriculum reform of modern cryptography based on SPOC and flip classroom
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 89-95.
|
[9] |
WU Wanqing,DU Ruizhong.
Evaluation of blended instruction based on network platform in cryptography teaching
[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 96-101.
|
[10] |
Zhong WANG,Yiliang HAN.
Simple Matrix encryption scheme with variable ciphertext length
[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 56-62.
|
[11] |
Peng-fei LI.
Construction of diffusion layers based on cipher structures
[J]. Chinese Journal of Network and Information Security, 2017, 3(6): 65-76.
|
[12] |
Heng-yue JIA,Xia WU,Jian-ming ZHU.
Survey of quantum crypto currency
[J]. Chinese Journal of Network and Information Security, 2017, 3(2): 1-8.
|
[13] |
Hui-hui JIA,Chao WANG,Jian GU,Hao-hao SONG,Di TANG.
Research and simulation of timing attacks on ECC
[J]. Chinese Journal of Network and Information Security, 2016, 2(4): 56-63.
|
[14] |
Fang REN,Dong ZHENG,Jiu-lun FAN.
Survey of digital signature technology based on error correcting codes
[J]. Chinese Journal of Network and Information Security, 2016, 2(11): 1-10.
|
[15] |
Kui REN.
Privacy-preserving image processing in cloud computing
[J]. Chinese Journal of Network and Information Security, 2016, 2(1): 12-17.
|