English  简体中文
搜索   
首页 中心概况 新闻动态 科研成果 研究队伍 技术园地 公共信息 联系我们

2016年期刊论文


2017-04-16       


1.          Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wentao Zhu, Jiwu Jing: An Efficient Elliptic Curve Cryptography Signature Server with GPU Acceleration. IEEE Transactions on Information Forensics and Security, vol.12, no.1, pp.111-122, 2017. SCI, CCF-A类.

2.          Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang: Cryptanalysis of Dual RSA. Designs, Codes and Cryptography, vol.83, no.1, pp.1-21, 2016. SCI, CCF-B类.

3.          Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, Xiaoshuang Ma: Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON. SCIENCE CHINA Information Sciences, vol.60, no.3, 2017. SCI, CCF-B类.

4.          Fei Tang, Rui Zhang, Hongda Li: Attribute-based Non-interactive Key Exchange. SCIENCE CHINA Information Sciences, vol.60, no.1, 2016. SCI, CCF-B类.

5.          Zhiguo Wan, Wentao Zhu, Guilin Wang: PRAC: Efficient Privacy Protection for Vehicle-to-grid Communications in the Smart Grid.  Computer & Security, vol.62, pp.246-256, 2016. SCI, CCF-B类.

6.          Liping Wang, Guang Zeng: On the Matrix Feedback Shift Register Synthesis for Matrix Sequences. SCIENCE CHINA Information Sciences, vol.59, no.3, pp.1-10, 2016. SCI, CCF-B类.

7.          Ting Wang, Dongyao Ji: Comment on “Design and Formal Security Evaluation of NeMHIP”. Computers & Security, vol.52, no.7, pp.159-161, 2015. SCI, CCF-B类.

8.          Weiqiong Wang, Liping Wang, Haiyan Zhou: Subset Sums of Quadratic Residues over Finite Fields. Finite Fields and Their Applications, vol.43, pp.106-122, 2017. SCI.

9.          Chenmiao Wu, Li Yang: Bit-oriented Quantum Public-key Encryption Based on Quantum Perfect Encryption. Quantum Information Processing, vol.15, no.8, pp. 3285-3300, 2016.SCI.

10.      Chenmiao Wu, Li Yang: Qubit-wise Teleportation and Its Application in Public-key Secret Communication. SCIENCE CHINA Information Sciences, vol.60 no.3, 2016. SCI, CCF-B类.

11.      Zhengbang Zha, Lei Hu: Some Classes of Permutation Polynomials of the Form over . Finite Fields and Their Applications, vol.40, pp.150-162, 2016. SCI.

12.      Wentao Zhu, Jingqiang Lin: Generating Correlated Digital Certificates: Framework and Applications. IEEE Transactions on Information Forensics and Security, vol.11, no.6, pp.1127-1127, 2016. EI, CCF-A类.

13.      李强, 李丹仪, 任丽月: 身份认证技术发展简史. 中国密码学会通讯, no.44, pp.25-28, 2016.

14.      李玉玲, 王鹏: CCTR 认证模式的不可证明安全性. 密码学报, vol.3, no.4, pp.374-381, 2016.

15.      祁冠杰, 周展飞: 标准信道下的抗敌手的理性秘密共享方案. 密码学报, vol.3, no.4, pp.408-418, 2016.

16.      孙哲蕾, 王鹏: OFBNLF加密工作模式的分析, 中国科学:信息科学, vol.46, no.6, pp.729-742, 2016. IIE-C类.

17.      汤胜军, 贾世杰, 夏鲁宁: 基于位置跳变的闪存数据安全存储方法. 软件, vol.38, no.2, pp. 68-74, 2017.

18.      张国柱, 夏鲁宁, 贾世杰, 嵇亚飞:“牵星”法: 一种基于射频指纹的高频RFID克隆卡检测方法. 信息安全学报, vol.2, no.2, pp.33-47, 2017. IIE-B类.

19.      于伟, 王鲲鹏, 李宝, 李维晅, 田松: 特征3有限域上椭圆曲线的Co-Z Montgomery算法. 计算机学报. IIE-C类.


评论人:          
lois.local\

中国科学院DCS中心版权所有
地址:北京市海淀区闵庄路甲89号 4号楼
联系电话:010-82546536 010-82546537
京ICP备05046059号