Author of the publication

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace.

, , , , and . Secur. Commun. Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function., , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 343-354. Springer, (2016)A public key cryptosystem based on data complexity under quantum environment., , , , , and . Sci. China Inf. Sci., 58 (11): 1-11 (2015)Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem., , , , , and . Sci. China Inf. Sci., 59 (5): 052109:1-052109:11 (2016)An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs., , , , and . NSS, volume 11058 of Lecture Notes in Computer Science, page 288-303. Springer, (2018)SwiftDir: Secure Cache Coherence without Overprotection., , , , and . MICRO, page 662-677. IEEE, (2022)Quantum protocols for secure multi-party summation., , , , , and . Quantum Inf. Process., 18 (6): 168 (2019)基于数据摘要奇偶性的集合相似性近似算法 (Set Similarity Approximation Algorithm Based on Parity of Data Sketch)., and . 计算机科学, 43 (6): 254-256 (2016)A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace., , , , and . Secur. Commun. Networks, (2017)Design scheme selection method of new rescue robot based on FAHP-FTOPSIS., , , , , , and . CAIBDA, page 1-4. VDE / IEEE, (2022)Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family., , , , and . Int. J. Found. Comput. Sci., 32 (1): 73-91 (2021)