Advanced Search



43 results found in all.
index Title
1A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
Author(s):JIANG Jun, HE Chen  Clicked:8147  Download:4550  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.399-404  DOI:10.1631/jzus.2005.A0399
2Optical encryption with cascaded fractional wavelet transforms
Author(s):BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu  Clicked:6989  Download:3729  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.8 P.1431-1435  DOI:10.1631/jzus.2006.A1431
3How to repair the Hill cipher
Author(s):ISMAIL I.A., AMIN Mohammed, DIAB Hossam  Clicked:6533  Download:5641  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.12 P.2022-2030  DOI:10.1631/jzus.2006.A2022
4Multiple hashes of single key with passcode for multiple accounts
Author(s):LEE Kok-wah, EWE Hong-tat  Clicked:7152  Download:4265  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.8 P.1183-1190  DOI:10.1631/jzus.2007.A1183
5Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN  Clicked:7115  Download:4617  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
6Improved Feistel-based ciphers for wireless sensor network security
Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU  Clicked:8200  Download:6561  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1111-1117  DOI:10.1631/jzus.A0720108
7A recoverable stress testing algorithm for compression and encryption cards
Author(s):Bao-jun ZHANG, Xue-zeng PAN, Jie-bing WANG, Ling-di PING  Clicked:6755  Download:4053  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.10 P.1398-1405  DOI:10.1631/jzus.A0720130
8Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ  Clicked:7144  Download:4346  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
9WAPN: a distributed wormhole attack detection approach for wireless sensor networks
Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI  Clicked:9308  Download:4680  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.279-289  DOI:10.1631/jzus.A0820178
10Decryption of pure-position permutation algorithms
Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang  Clicked:5878  Download:3438  Cited:5  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.7 P.803-809  DOI:10.1631/jzus.2004.0803
11CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:10200  Download:4327  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
12Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:12581  Download:9592  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
13Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:11312  Download:4819  Cited:6  <Full Text>  <PPT> 2674
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
14ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:8959  Download:4537  Cited:0  <Full Text>  <PPT> 3046
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
15Low-computation certificateless hybrid signcryption scheme
Author(s):Hui-fang Yu, Bo Yang  Clicked:10050  Download:3823  Cited:0  <Full Text>  <PPT> 2545
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.928-940  DOI:10.1631/FITEE.1601054
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE