Author of the publication

Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem.

, , , , , and . Sci. China Inf. Sci., 59 (5): 052109:1-052109:11 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function., , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 343-354. Springer, (2016)A public key cryptosystem based on data complexity under quantum environment., , , , , and . Sci. China Inf. Sci., 58 (11): 1-11 (2015)Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem., , , , , and . Sci. China Inf. Sci., 59 (5): 052109:1-052109:11 (2016)An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs., , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 288-303. Springer, (2018)基于数据摘要奇偶性的集合相似性近似算法 (Set Similarity Approximation Algorithm Based on Parity of Data Sketch)., and . 计算机科学, 43 (6): 254-256 (2016)Quantum protocols for secure multi-party summation., , , , , and . Quantum Inf. Process., 18 (6): 168 (2019)A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace., , , , and . Secur. Commun. Networks, (2017)SwiftDir: Secure Cache Coherence without Overprotection., , , , and . MICRO, page 662-677. IEEE, (2022)Design scheme selection method of new rescue robot based on FAHP-FTOPSIS., , , , , , and . CAIBDA, page 1-4. VDE / IEEE, (2022)Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family., , , , and . Int. J. Found. Comput. Sci., 32 (1): 73-91 (2021)