Post quantum secure fair data trading with deterability based on machine learning | 0 | 0.34 | 2022 |
A Symbolic Model for Systematically Analyzing TEE-Based Protocols. | 1 | 0.35 | 2020 |
zkrpChain: Privacy-Preserving Data Auditing for Consortium Blockchains Based on Zero-Knowledge Range Proofs | 0 | 0.34 | 2020 |
Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations | 0 | 0.34 | 2020 |
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs | 0 | 0.34 | 2020 |
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function. | 0 | 0.34 | 2019 |
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States. | 0 | 0.34 | 2019 |
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework. | 0 | 0.34 | 2018 |
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. | 1 | 0.35 | 2018 |
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes. | 1 | 0.35 | 2018 |
Quantum algorithm to solve function inversion with time–space trade-off | 1 | 0.35 | 2017 |
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. | 0 | 0.34 | 2017 |
POSTER: An E2E Trusted Cloud Infrastructure | 4 | 0.44 | 2014 |
Finding Key Leakage in Hierarchical Distribution of Encrypted Data | 0 | 0.34 | 2013 |
Hash-based Multivariate Public Key Cryptosystems. | 1 | 0.34 | 2010 |
A Trusted Start-Up Based on Embedded System | 1 | 0.41 | 2009 |
Research and Implementation of Evolution Cipher Chip | 0 | 0.34 | 2009 |
Speeding up scalar multiplication using a new signed binary representation for integers | 1 | 0.43 | 2007 |
Analysis of affinely equivalent Boolean functions | 2 | 0.38 | 2007 |
Grid System Integrated with Trusted Computing Platform | 5 | 0.64 | 2006 |
Group Key Management in Grid Environment | 5 | 0.50 | 2006 |