| index | Title |
| 1 | A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications Author(s):JIANG Jun, HE Chen Clicked:8428 Download:4693 Cited:1 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.5 P.399-404 DOI:10.1631/jzus.2005.A0399 |
| 2 | Optical encryption with cascaded fractional wavelet transforms Author(s):BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu Clicked:7358 Download:3898 Cited:1 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.8 P.1431-1435 DOI:10.1631/jzus.2006.A1431 |
| 3 | How to repair the Hill cipher Author(s):ISMAIL I.A., AMIN Mohammed, DIAB Hossam Clicked:6729 Download:5832 Cited:5 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.12 P.2022-2030 DOI:10.1631/jzus.2006.A2022 |
| 4 | Multiple hashes of single key with passcode for multiple accounts Author(s):LEE Kok-wah, EWE Hong-tat Clicked:7368 Download:4409 Cited:2 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.8 P.1183-1190 DOI:10.1631/jzus.2007.A1183 |
| 5 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN Clicked:7429 Download:4722 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 6 | Improved Feistel-based ciphers for wireless sensor network security Author(s):Tamara PAZYNYUK, Jian-zhong LI, George S. OREKU Clicked:8431 Download:6667 Cited:1 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1111-1117 DOI:10.1631/jzus.A0720108 |
| 7 | A recoverable stress testing algorithm for compression and encryption cards Author(s):Bao-jun ZHANG, Xue-zeng PAN, Jie-bing WANG, Ling-di PING Clicked:6933 Download:4147 Cited:0 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.10 P.1398-1405 DOI:10.1631/jzus.A0720130 |
| 8 | Comments on “How to repair the Hill cipher” Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ Clicked:7438 Download:4506 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.2 P.211-214 DOI:10.1631/jzus.A072143 |
| 9 | WAPN: a distributed wormhole attack detection approach for wireless sensor networks Author(s):Fan-rui KONG, Chun-wen LI, Qing-qing DING, Guang-zhao CUI, Bing-yi CUI Clicked:9683 Download:4819 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.279-289 DOI:10.1631/jzus.A0820178 |
| 10 | Decryption of pure-position permutation algorithms Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang Clicked:6096 Download:3587 Cited:5 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.7 P.803-809 DOI:10.1631/jzus.2004.0803 |
| 11 | CCA2 secure biometric identity based encryption with constant-size ciphertext Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun Clicked:10550 Download:4619 Cited:1 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.10 P.819-827 DOI:10.1631/jzus.C1000429 |
| 12 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12860 Download:10190 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 13 | Performance study of selective encryption in comparison to full encryption for still visual images Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:11658 Download:5330 Cited:6 <Full Text> <PPT> 2824 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.435-444 DOI:10.1631/jzus.C1300262 |
| 14 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:9191 Download:5049 Cited:0 <Full Text> <PPT> 3135 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
| 15 | Low-computation certificateless hybrid signcryption scheme Author(s):Hui-fang Yu, Bo Yang Clicked:10355 Download:4348 Cited:0 <Full Text> <PPT> 2669 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.7 P.928-940 DOI:10.1631/FITEE.1601054 |
