[1] |
GE Bin,CHEN Xu,CHEN Gang.
Fast hyper-chaotic image encryption algorithm using vector operation
[J]. Journal of Xidian University, 2021, 48(6): 187-196.
|
[2] |
WANG Xingxin,HU Wei,TAN Jing,ZHU Jiacheng,TANG Shibo.
Correlation fault attack on AES
[J]. Journal of Xidian University, 2021, 48(4): 192-199.
|
[3] |
YANG Yanbo,ZHANG Jiawei,MA Jianfeng.
Method for using the blockchain to protect data privacy of IoV
[J]. Journal of Xidian University, 2021, 48(3): 21-30.
|
[4] |
QIU Yingqiang,CAI Canhui,ZENG Huanqiang,FENG Gui,LIN Xiaodan,QIAN Zhenxing.
Joint reversible data hiding in encrypted images with the self-correcting ability
[J]. Journal of Xidian University, 2021, 48(1): 107-116.
|
[5] |
YE Tao,WEI Yongzhuang,LI Lingchen.
Analysis of zero-sum distinguisher of the KNOT authenticated encryption algorithm
[J]. Journal of Xidian University, 2021, 48(1): 76-86.
|
[6] |
CHE Xiaoliang,ZHOU Haonan,YANG Xiaoyuan,ZHOU Tanping,LIU Longfei,LI Ningbo.
Efficient multi-key fully homomorphic encryption scheme from RLWE
[J]. Journal of Xidian University, 2021, 48(1): 87-95.
|
[7] |
ZHAI Sheping,WANG Yijing,CHEN Siji.
Research on the application of blockchain technology in the sharing of electronic medical records
[J]. Journal of Xidian University, 2020, 47(5): 103-112.
|
[8] |
LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu.
Algorithm for encrypted search with forward secure updates and verification
[J]. Journal of Xidian University, 2020, 47(5): 48-56.
|
[9] |
ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng.
Recommendation of platoon members by combining the blockchain and vehicular social network
[J]. Journal of Xidian University, 2020, 47(5): 122-129.
|
[10] |
LUO Yuling,OUYANG Xue,CAO Lüchen,QIU Senhui,LIAO Zhixian,CEN Mingcan.
Image encryption using the genetic simulated annealing algorithmand chaotic systems
[J]. Journal of Xidian University, 2019, 46(5): 171-179.
|
[11] |
YU Jinxia,HE Xu,YAN Xixi.
Ciphertext-policy attribute-based encryption scheme with verifiability on authority
[J]. Journal of Xidian University, 2019, 46(4): 49-57.
|
[12] |
GUO Songge;LV Donghui;REN Yanli.
Improved (k, n) tagged visual cryptography scheme
[J]. Journal of Xidian University, 2018, 45(5): 170-176+183.
|
[13] |
YAN Xixi;LIU Yuan;LI Zichen;TANG Yongli;YE Qing.
Multi-authority attribute-based encryption scheme from LWE problem
[J]. Journal of Xidian University, 2018, 45(4): 129-136.
|
[14] |
YAN Xixi;LIU Yuan;LI Zichen;TANG Yongli.
Multi-authority attribute-based encryption scheme with policy semi-hidden and dynamic updating
[J]. Journal of Xidian University, 2018, 45(2): 122-128+147.
|
[15] |
MIAO Yinbin;MA Jianfeng;ZHANG Junwei;LIU Zhiquan.
Efficient verifiable multi-keyword search over encrypted data
[J]. Journal of Xidian University, 2017, 44(4): 18-23+68.
|