Deep search:Searching for "Hash function" in 'KEYWORDGot 3 items.
index Title
1Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Y...  Clicked:5747  Download:3682  Cited:0  <Full Text>  <PPT> 1566
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
2Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-...  Clicked:8088  Download:2845  Cited:0  <Full Text>  <PPT> 1727
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.176-186  DOI:10.1631/FITEE.1700005
3Certificateless broadcast multi-signature for network coding
Author(s):Huifang YU, Zhewei QI  Clicked:2313  Download:3998  Cited:0  <Full Text>  <PPT> 546
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1369-1377  DOI:10.1631/FITEE.2200271
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE