[1] |
ZHANG Jing, LUO Shou-shan, YANG Yi-xian, XIN Yang.
Private Sets Intersection Protocols Based on Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(2): 13-18.
|
[2] |
WANG Yan, LI Shun-bo, ZHAO Song, XUE Gai-na.
Fermat Number and 2-Adic Complexity of a Class of Maximum Period Sequence
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(2): 81-85.
|
[3] |
CHANG Li-wei, ZHENG Shi-hui, XING You-song, JIN Lei, YANG Yi-xian.
Verifiable Multi-Use Dynamic Threshold Large Secret Sharing Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 86-90.
|
[4] |
DU Jiao, WEN Qiao-yan, ZHANG Jie, PANG Shan-qi, LIAO Xin.
Construction and Counting of Resilient 2-Rotation Symmetric Boolean Functions with 2p Variables
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 36-40.
|
[5] |
.
A Privacy-Preserving Dynamic Point-Point Distance Determination Protocol and Its Extension
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 47-51.
|
[6] |
.
Probability Distribution of XOR Difference between Ones Complement Addition and XOR
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(2): 35-38.
|
[7] |
CHEN Shi-wei, JIN Chen-hui, LI Xi-bin.
Analysis on the Consistent Degree of Addition Modulo 2n with XOR and Its Application
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 44-47.
|
[8] |
ZHUO Ze-peng, XIAO Guo-zhen.
CrossCorrelation Properties of Perfect Binary Sequences
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(2): 78-81.
|
[9] |
MA Min-yao1, LUO Shou-shan1,2, WANG Li-cheng1 .
Secure Two-party Computation Protocols for Mapping-equivalence Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 5-8.
|
[10] |
ZUO Hui-juan1,2, Tong Xin2 , WEN Qiao-yan2.
Constructions of ZCZ Sequence Set from a Perfect Sequence
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(4): 122-125.
|
[11] |
SUN Ying1, QIN Su-juan1, WEN Qiao-yan1, ZHU Fu-chen2.
利用GHZ态实现可控的量子秘密共享
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 9-13.
|
[12] |
ZHANG Wei-guo1, DING Yong2, ZHANG Ning1, XIAO Guo-zhen1.
A Characterization of Algebraic Immune Boolean Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(5): 55-57.
|
[13] |
TONG Xin1, WEN Qiao-yan1, ZHU Fu-chen2.
Quantum Secret Sharing Based on GHZ States Entanglement Swapping
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 44-48.
|
[14] |
ZHANG Long1, 2, WU Wen-ling3, WEN Qiao-yan1.
Probability Distribution and Recursive Formula of Difference between mod2n Sum and XOR over F2
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 85-89.
|
[15] |
MO Jiao , WEN Qiao-yan.
The Construction and Enumeration of Symmetric Balanced Boolean Functions with Even Number of Variables
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(6): 25-27.
|