[1] |
LAI Chengzhe,CHEN Yao,GUO Qili,ZHENG Dong.
Game theory based incentive scheme for cooperative downloading in the internet of vehicles
[J]. Journal of Xidian University, 2021, 48(3): 9-20.
|
[2] |
YE Tao,WEI Yongzhuang,LI Lingchen.
Analysis of zero-sum distinguisher of the KNOT authenticated encryption algorithm
[J]. Journal of Xidian University, 2021, 48(1): 76-86.
|
[3] |
LIU Yingfeng,LIU Shengli.
Key distillation from passwords
[J]. Journal of Xidian University, 2021, 48(1): 61-68.
|
[4] |
ZHOU Yu,CHEN Zhixiong,ZHUO Zepeng,DU Xiaoni.
Survey of results of (n,m)-functions against differential power attack
[J]. Journal of Xidian University, 2021, 48(1): 50-60.
|
[5] |
DONG Xinfeng,ZHANG Wenzheng,XU Chunxiang.
8 bits lightweight S-box with the Feistel structure
[J]. Journal of Xidian University, 2021, 48(1): 69-75.
|
[6] |
FENG Dengguo.
On the significance and function of the Xiao-Massey theorem
[J]. Journal of Xidian University, 2021, 48(1): 7-13.
|
[7] |
LI Xiaowei,YANG Dengqi,ZHENG Xin,ZHU Xingwen,CHEN Benhui,ZHANG Yuqing.
Cross-domain authentication and the key agreement protocol in VANETs
[J]. Journal of Xidian University, 2021, 48(1): 141-148.
|
[8] |
LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa.
Spectrum sharing management method for the small-area-blockchain based on district partition
[J]. Journal of Xidian University, 2020, 47(6): 122-130.
|
[9] |
YAO Si,CHEN Jie,GONG Yating,XU Dong.
A new method for white-box implementation of CLEFIA algorithm
[J]. Journal of Xidian University, 2020, 47(5): 150-158.
|
[10] |
LUO Yuling,OUYANG Xue,CAO Lüchen,QIU Senhui,LIAO Zhixian,CEN Mingcan.
Image encryption using the genetic simulated annealing algorithmand chaotic systems
[J]. Journal of Xidian University, 2019, 46(5): 171-179.
|
[11] |
LIU Jingmei,HAN Qingqing,SHEN Zhiwei,LIU Jingwei.
Method for Secret key generation using k-means clustering
[J]. Journal of Xidian University, 2019, 46(1): 8-13.
|
[12] |
MA Hua;BAI Cuicui;LI Bin;LIU Zhenhua.
Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
[J]. J4, 2015, 42(6): 6-10+55.
|
[13] |
LUO Fang;ZHOU Xueguang;OU Qingyu.
Cryptanalysis of the LBlock using multiple zero-correlation linear approximations
[J]. J4, 2014, 41(5): 173-179.
|
[14] |
LIU Jingmei;WANG Yanli;LIANG Bin;ZHAO Senlin.
Attack method against the McEliece cryptosystem based on the correlative quasic-cyclic codes set
[J]. J4, 2014, 41(2): 15-19+50.
|
[15] |
XU Jie;DANG Lanjun;SHI Guangming.
Efficient mobile IP registration protocol with AAA using pairing-free certificateless public key cryptography
[J]. J4, 2014, 41(2): 51-57.
|