Author of the publication

Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment".

, , , , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved hill-climbing methods in the design of bijective S-boxes., , , , and . ICNC, page 2378-2380. IEEE, (2010)Two-party authenticated key exchange protocol using lattice-based cryptography., and . IACR Cryptology ePrint Archive, (2016)High-order graph matching based on ant colony optimization., , , and . Neurocomputing, (2019)Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays., , and . Ad Hoc Networks, (2018)New optimal constructions of conflict-avoiding codes of odd length and weight 3., , and . Des. Codes Cryptogr., 73 (3): 791-804 (2014)WSN中基于非线性自适应PSO的分簇策略 (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm)., and . 计算机科学, 45 (5): 44-48 (2018)基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain)., , and . 计算机科学, 46 (9): 162-168 (2019)Lossy trapdoor functions based on the PLWE., , , and . Clust. Comput., 22 (Supplement): 5647-5654 (2019)A Light-Weighted Convolutional Neural Network for Bitemporal SAR Image Change Detection., , , , , , and . CoRR, (2020)Balanced quaternary sequences of even period with optimal autocorrelation., and . IET Commun., 13 (12): 1808-1812 (2019)