[1] |
Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI.
Quantum cryptanalysis of lightweight block cipher Piccolo
[J]. Journal on Communications, 2023, 44(6): 175-182.
|
[2] |
Wei LI, Chun LIU, Dawu GU, Wenqian SUN, Jianning GAO, Mengyang QIN.
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
[J]. Journal on Communications, 2023, 44(4): 167-175.
|
[3] |
Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG.
Adaptor signature scheme based on ISRSAC digital signature algorithm
[J]. Journal on Communications, 2023, 44(3): 178-185.
|
[4] |
Zhengbin LIU, Yongqiang LI, Chaoxi ZHU.
Fast algorithm to search for the minimum number of active S-boxes of block cipher
[J]. Journal on Communications, 2023, 44(1): 118-128.
|
[5] |
Xiaoyan ZHANG, Zhihao LIU, Xiaofeng DU, Tianbo LU.
Research on a real-time receiving scheme of streaming data
[J]. Journal on Communications, 2022, 43(4): 154-163.
|
[6] |
Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN.
Provably secure quantum resistance two-server password-authenticated key exchange protocol
[J]. Journal on Communications, 2022, 43(3): 14-29.
|
[7] |
Yiming XUE, Shurong LIU, Shuheng GUO, Yan LI, Cai’e HU.
High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm
[J]. Journal on Communications, 2022, 43(3): 101-112.
|
[8] |
Hong WANG, Chengzhe LAI, Xiangyang LIU, Han ZENG.
Orthogonal Latin square theory based group and batch verification for digital signatures
[J]. Journal on Communications, 2022, 43(2): 44-54.
|
[9] |
Nianping WANG, Qing YIN.
Differential security evaluation of Piccolo-like structure
[J]. Journal on Communications, 2022, 43(2): 55-64.
|
[10] |
Zhaocun ZHOU, Dengguo FENG.
Survey on approaches of stream cipher cryptanalysis
[J]. Journal on Communications, 2022, 43(11): 183-198.
|
[11] |
Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG.
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
[J]. Journal on Communications, 2022, 43(10): 26-41.
|
[12] |
Nianping WANG, Zhicheng GUO.
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
[J]. Journal on Communications, 2021, 42(8): 70-79.
|
[13] |
Lei HE, Jianfeng MA, Dawei WEI.
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
[J]. Journal on Communications, 2021, 42(11): 87-96.
|
[14] |
Guoshuang ZHANG,Xiao CHEN,Dongdai LIN,Fengmei LIU.
State recovery attack on ACORN v3 in nonce-reuse setting
[J]. Journal on Communications, 2020, 41(8): 11-21.
|
[15] |
Jian ZOU,Le DONG.
Improved preimage and pseudo-collision attacks on SM3 hash function
[J]. Journal on Communications, 2018, 39(1): 46-55.
|