[1] |
.
A Threshold Public Key Encryption via Dual Regev Scheme
[J]. , 2020, 43(4): 83-87.
|
[2] |
ZHANG Jun-song, ZHANG Qi-kun, GAN Yong, MENG Ying-hui.
A New Authentication Protocol for Wireless Medical Sensor Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 104-109.
|
[3] |
CHU Chun-yan, XIA Xu-jun, ZHANG Sheng-li.
Research on Continuous Variable Quantum Cryptography with Unbalanced Basis Choice
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 39-42.
|
[4] |
XIANG Xin-yin, LI Hui.
Lattice-Based Online/Offline Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(3): 117-120,134.
|
[5] |
LU Xiu-hua, WEN Qiao-yan, JIN Zheng-ping, WANG Li-cheng, YANG Chun-li.
Improvement of a Fuzzy Identity-Based Lattice Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 55-58.
|
[6] |
LAI Qi-qi, HU Yu-pu, CHEN Yuan, WANG Bao-cang, JIANG Ming-ming.
Construction of Auxiliary-Input Secure Lossy Trapdoor Functions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 6-10.
|
[7] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[8] |
WANG Xin, SUN Chen, WANG Xin-mei.
Application of Homomorphic Hash Function in Multivariate Public Key Cryptosystem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(5): 46-48.
|
[9] |
.
A Privacy-Preserving Dynamic Point-Point Distance Determination Protocol and Its Extension
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 47-51.
|
[10] |
.
Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 115-118.
|
[11] |
.
A Hybrid Multivariate Signature Scheme Based on HFEv and IPHFE
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(4): 105-108.
|
[12] |
WANG Yan yupu Hu Hu.
Autocorrelation Properties of Nonlinear Pseudorandom Sequences Output by TFunctions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(2): 104-107.
|
[13] |
ZHANG Feng-rong, GAO Jun-tao, HU Yu-pu, XIE Min.
Construction of Quadratic Bent Functions over Finite Fields
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 52-56.
|
[14] |
YUAN Feng, HU Yu-pu, LI Xun-bo, OU Hai-wen.
On the Equivalent Keys of Multivariate Public Key Cryptography
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 97-101.
|
[15] |
SUN Shi-feng;WEN Qiao-yan.
An Attack on a Certificateless Strong Proxy Signature Scheme and Its Improvement
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 80-83.
|