Author of the publication

Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment".

, , , , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WSN中基于非线性自适应PSO的分簇策略 (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm)., and . 计算机科学, 45 (5): 44-48 (2018)基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain)., , and . 计算机科学, 46 (9): 162-168 (2019)New optimal constructions of conflict-avoiding codes of odd length and weight 3., , and . Des. Codes Cryptogr., 73 (3): 791-804 (2014)A Light-Weighted Convolutional Neural Network for Bitemporal SAR Image Change Detection., , , , , , and . CoRR, (2020)Lossy trapdoor functions based on the PLWE., , , and . Clust. Comput., 22 (Supplement): 5647-5654 (2019)Two-party authenticated key exchange protocol using lattice-based cryptography., and . IACR Cryptology ePrint Archive, (2016)High-order graph matching based on ant colony optimization., , , and . Neurocomputing, (2019)Evolutionary Multiform Optimization With Two-Stage Bidirectional Knowledge Transfer Strategy for Point Cloud Registration., , , , , , and . IEEE Trans. Evol. Comput., 28 (1): 62-76 (February 2024)A Classified Adversarial Network for Multi-Spectral Remote Sensing Image Change Detection., , , , , and . Remote. Sens., 12 (13): 2098 (2020)Classification and saliency detection by semi-supervised low-rank representation., , , , and . Pattern Recognit., (2016)