
| index | Title |
| 1 | Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Y... Clicked:8986 Download:8150 Cited:0 <Full Text> <PPT> 2774 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1475-1499 DOI:10.1631/FITEE.1800576 |
| 2 | Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-... Clicked:11265 Download:4890 Cited:0 <Full Text> <PPT> 2307 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.2 P.176-186 DOI:10.1631/FITEE.1700005 |
| 3 | Certificateless broadcast multi-signature for network coding Author(s):Huifang YU, Zhewei QI Clicked:4336 Download:6503 Cited:0 <Full Text> <PPT> 1197 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.9 P.1369-1377 DOI:10.1631/FITEE.2200271 |