Deep search:Searching for "Post-quantum cryptography" in 'KEYWORD Got 3 items.
index Title
1Quantum security analysis of a lattice-based oblivious transfer protocol
Author(s):Mo-meng Liu, Juliane Krämer, Yu-p...  Clicked:9478  Download:3254  Cited:0  <Full Text>  <PPT> 1208
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1348-1369  DOI:10.1631/FITEE.1700039
2Novel efficient identity-based signature on lattices
Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-me...  Clicked:8254  Download:7392  Cited:0  <Full Text>  <PPT> 2047
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.2 P.244-250  DOI:10.1631/FITEE.1900318
3Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:8671  Download:13368  Cited:0  <Full Text>  <PPT> 1265
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE