[1] |
Zhao Xiufeng, Fu Yu, Song Weitao.
Circular Secure Homomorphic Encryption Scheme
[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124.
|
[2] |
Chen Ming.
A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176.
|
[3] |
Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua.
Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem
[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701.
|
[4] |
Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo.
Post-Quantum Privacy Preserving Smart Metering System
[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242.
|
[5] |
Zhang Yanhua, Hu Yupu.
A New Verifiably Encrypted Signature Scheme from Lattices
[J]. Journal of Computer Research and Development, 2017, 54(2): 305-312.
|
[6] |
Zhang Pingyuan, Jiang Han, Cai Jie, Wang Chenguang, Zheng Zhihua, Xu Qiuliang.
Recent Advances in Lattice-Based Cryptography
[J]. Journal of Computer Research and Development, 2017, 54(10): 2121-2129.
|
[7] |
Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya.
RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE
[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192.
|
[8] |
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi.
Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204.
|
[9] |
Zhao Xiufeng, Gao Haiying, Wang Ailan.
An Identity-Based Authenticated Key Exchange Protocol from RLWE
[J]. Journal of Computer Research and Development, 2016, 53(11): 2482-2490.
|
[10] |
Chen Zhigang, Song Xinxia, Zhao Xiufeng.
A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE
[J]. Journal of Computer Research and Development, 2016, 53(10): 2216-2223.
|
[11] |
Ke Yan, Zhang Minqing, Su Tingting.
A Novel Multiple Bits Reversible Data Hiding in Encrypted Domain Based on R-LWE
[J]. Journal of Computer Research and Development, 2016, 53(10): 2307-2322.
|
[12] |
Yang Xiaoyuan, Zhou Tanping, Zhang Wei, Wu Liqiang.
Application of a Circular Secure Variant of LWE in the Homomorphic Encryption
[J]. Journal of Computer Research and Development, 2015, 52(6): 1389-1393.
|
[13] |
Sun Xiaochao, Li Bao, and Lu Xianhui.
LWE Problem with Uniform Secret and Errors and Its Application
[J]. 计算机研究与发展, 2014, 51(7): 1515-1519.
|