
| index | Title |
| 1 | Applying two channels to vector space secret sharing based multi-signature scheme Author(s):XIAO Qing-hua, PING Ling-di, CHEN ... Clicked:8666 Download:4142 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.1 P.56-62 DOI:10.1631/jzus.2005.A0056 |
| 2 | Untraceable partially blind signature based on DLOG problem Author(s):HUANG Zheng, CHEN Ke-fei, KOU Wei-... Clicked:6152 Download:3248 Cited:3 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.1 P.40-44 DOI:10.1631/jzus.2004.0040 |
| 3 | A novel group signature with one time secret key Author(s):XIE Qi, YU Xiu-yuan Clicked:7496 Download:3613 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.560-564 DOI:10.1631/jzus.2005.A0560 |
| 4 | Efficient identity-based signature over NTRU lattice Author(s):Jia Xie, Yu-pu Hu, Jun-tao Gao, We... Clicked:10086 Download:4652 Cited:4 <Full Text> <PPT> 2541 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.2 P.135-142 DOI:10.1631/FITEE.1500197 |
| 5 | Low-computation certificateless hybrid signcryption scheme Author(s):Hui-fang Yu, Bo Yang Clicked:10322 Download:4312 Cited:0 <Full Text> <PPT> 2658 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.7 P.928-940 DOI:10.1631/FITEE.1601054 |
| 6 | Quantum security analysis of a lattice-based oblivious transfer protocol Author(s):Mo-meng Liu, Juliane Krämer, Yu-p... Clicked:9922 Download:3844 Cited:0 <Full Text> <PPT> 1208 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.9 P.1348-1369 DOI:10.1631/FITEE.1700039 |