[1] |
Xie Jia, Hu Yupu, Jiang Mingming.
Lattice-Based Forward Secure Proxy Signatures
[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597.
|
[2] |
Li Jinhai, Li Yufei, Mi Yunlong, Wu Weizhi.
Meso-Granularity Labeled Method for Multi-Granularity Formal Concept Analysis
[J]. Journal of Computer Research and Development, 2020, 57(2): 447-458.
|
[3] |
Li Jianmin, Yu Huifang, Xie Yong.
ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
[J]. Journal of Computer Research and Development, 2019, 56(5): 1101-1111.
|
[4] |
Wang Xia, Jiang Shan, Li Junyu, Wu Weizh.
A Construction Method of Triadic Concepts
[J]. Journal of Computer Research and Development, 2019, 56(4): 844-853.
|
[5] |
Zhang Xiangwen, Lu Ziyao, Yang Jing, Lin Qian, Lu Yu, Wang Hongji, Su Jinsong.
Weighted Lattice Based Recurrent Neural Networks for Sentence Semantic Representation Modeling
[J]. Journal of Computer Research and Development, 2019, 56(4): 854-865.
|
[6] |
Li Zengpeng, Ma Chunguang, Zhao Minghao.
Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks
[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507.
|
[7] |
Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua.
Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem
[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701.
|
[8] |
Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo.
Post-Quantum Privacy Preserving Smart Metering System
[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242.
|
[9] |
Zou Li, Feng Kaihua,Liu Xin.
Linguistic-Valued Intuitionistic Fuzzy Concept Lattice and Its Application
[J]. Journal of Computer Research and Development, 2018, 55(8): 1726-1734.
|
[10] |
Wu Liqiang, Yang Xiaoyuan, Zhang Minqing.
Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model
[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173.
|
[11] |
Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye.
Lattice-Based Forward Secure and Certificateless Signature Scheme
[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524.
|
[12] |
Han Xixian, Liu Xianmin, Li Jianzhong,Gao Hong.
TMS: An Novel Algorithm for Top-k Queries with Multi-Dimensional Selections on Massive Data
[J]. Journal of Computer Research and Development, 2017, 54(3): 570-585.
|
[13] |
Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang.
Recent Advances in Lattice-Based Cryptography
[J]. Journal of Computer Research and Development, 2017, 54(10): 2121-2129.
|
[14] |
Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya.
RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192.
|
[15] |
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi.
Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204.
|