Deep search:Searching for "Symmetric encryption" in 'KEYWORD Got 4 items.
index Title
1A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communicat...
Author(s):JIANG Jun, HE Chen  Clicked:7173  Download:4024  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.399-404  DOI:10.1631/jzus.2005.A0399
2Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARC&Iac...  Clicked:5867  Download:3858  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
3Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin,...  Clicked:9704  Download:3851  Cited:6  <Full Text>  <PPT> 2159
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
4Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:7942  Download:2878  Cited:0  <Full Text>  <PPT> 2029
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE