Author of the publication

An efficient quantum blind digital signature scheme.

, , , , , and . Sci. China Inf. Sci., 60 (8): 082501:1-082501:14 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cube Attacks on Round-Reduced TinyJAMBU., , , , and . IACR Cryptol. ePrint Arch., (2021)A Multi-Level View Model for Secure Object-Oriented Databases., , and . Data Knowl. Eng., 23 (2): 97-117 (1997)On-the-fly web content integrity check boosts users's confidence., , and . Commun. ACM, 45 (11): 33-37 (2002)Signcryption schemes with insider security in an ideal permutation model., , and . J. Math. Cryptol., 13 (2): 117-150 (2019)Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding., , , , , and . Quantum Inf. Process., 17 (9): 246 (2018)Resource-saving quantum key distribution based on three-photon matrix product states., , , and . Quantum Inf. Process., 22 (6): 235 (2023)High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding., , , , , , and . Quantum Inf. Process., 15 (11): 4663-4679 (2016)Analysis of simplified variants of SHA-256., , , , and . WEWoRC, volume P-74 of LNI, page 123-134. GI, (2005)Cryptanalysis of LASH., , , , , , and . IACR Cryptology ePrint Archive, (2007)Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function., , , , and . IACR Cryptology ePrint Archive, (2014)