[1] |
Huanhuan LIAN, Huiying HOU, Yunlei ZHAO.
Post-quantum verifier-based three-party password authenticated key exchange protocol
[J]. Journal on Communications, 2022, 43(4): 95-106.
|
[2] |
Zhen LIU,Yiliang HAN,Xiaoyuan YANG,Shuguang LIU.
Provable security signcryption scheme based on RLWE without trapdoor
[J]. Journal on Communications, 2020, 41(6): 14-25.
|
[3] |
Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG.
Efficient signcryption scheme based on Cocks’ identity cryptosystem
[J]. Journal on Communications, 2020, 41(12): 128-138.
|
[4] |
Youliang TIAN,Qiuxian LI,Duo ZHANG,Linjie WANG.
Provably secure rational delegation computation protocol
[J]. Journal on Communications, 2019, 40(7): 135-143.
|
[5] |
Jinxia YU,Huanhuan LIAN,Yongli TANG,Mengyao SHI,Zongqu ZHAO.
Password-based three-party authenticated key exchange protocol from lattices
[J]. Journal on Communications, 2018, 39(11): 87-97.
|
[6] |
Zhi-bo DU,UNYuan-hua S,ANGYi W.
Multi-point joint power analysis attack against AES
[J]. Journal on Communications, 2016, 37(Z1): 78-84.
|
[7] |
Hao-xing LI,Feng-hua LI,Cheng-gen SONG,Ya-long YAN.
Provable data possession scheme with authentication
[J]. Journal on Communications, 2016, 37(10): 117-127.
|
[8] |
.
Analysis and improvement of an identity-based signcryption
[J]. Journal on Communications, 2015, 36(11): 174-179.
|
[9] |
.
Fused access control scheme for sensitive data sharing
[J]. Journal on Communications, 2014, 35(8): 10-77.
|
[10] |
Xi-xi YAN,Tao GENG.
Fused access control scheme for sensitive data sharing
[J]. Journal on Communications, 2014, 35(8): 71-77.
|
[11] |
Hai-ying MA,Guo-sun ZENG,GZhan-jun WAN,Wei WANG.
Efficient and provably secure attribute-based online/offline encryption schemes
[J]. Journal on Communications, 2014, 35(7): 104-112.
|
[12] |
.
Provably secure and efficient escrowable
public key encryption schemes
[J]. Journal on Communications, 2014, 35(7): 4-37.
|
[13] |
.
Forward-secure ciphertext-policy attribute-based encryption scheme
[J]. Journal on Communications, 2014, 35(7): 5-45.
|
[14] |
.
Efficient and provably secure attribute-based online/
offline encryption schemes
[J]. Journal on Communications, 2014, 35(7): 13-112.
|
[15] |
EIJiang-hong W,IUWen-fen L,UXue-xian H.
Forward-secure ciphertext-policy attribute-based encryption scheme
[J]. Journal on Communications, 2014, 35(7): 38-45.
|