Advanced Search



26 results found in all.
index Title
1Optical encryption with cascaded fractional wavelet transforms
Author(s):BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu  Clicked:5201  Download:2901  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.8 P.1431-1435  DOI:10.1631/jzus.2006.A1431
2How to repair the Hill cipher
Author(s):ISMAIL I.A., AMIN Mohammed, DIAB Hossam  Clicked:5126  Download:3059  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.12 P.2022-2030  DOI:10.1631/jzus.2006.A2022
3Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN  Clicked:5603  Download:3515  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
4Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ  Clicked:5134  Download:3428  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
5Decryption of pure-position permutation algorithms
Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang  Clicked:4704  Download:2689  Cited:5  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.7 P.803-809  DOI:10.1631/jzus.2004.0803
6CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:7849  Download:3406  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
7A multipurpose audio watermarking algorithm with synchronization and encryption
Author(s):Baiying Lei, Ing Yann Soon  Clicked:7494  Download:4247  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.1 P.11-19  DOI:10.1631/jzus.C1100085
8Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:8331  Download:3466  Cited:6  <Full Text>  <PPT> 1865
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
9ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:5837  Download:2487  Cited:0  <Full Text>  <PPT> 2067
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
10BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:6226  Download:3990  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
11Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:5877  Download:2350  Cited:0  <Full Text>  <PPT> 1684
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
12Phase problems in optical imaging
Author(s):Guo-hai Situ, Hai-chao Wang  Clicked:5104  Download:1763  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1277-1287  DOI:10.1631/FITEE.1700298
13A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:5587  Download:2277  Cited:0  <Full Text>  <PPT> 1638
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
14Constructing pairing-free certificateless public key encryption with keyword search
Author(s):Yang Lu, Ji-guo Li  Clicked:5208  Download:1934  Cited:0  <Full Text>  <PPT> 1375
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.8 P.1049-1060  DOI:10.1631/FITEE.1700534
15Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5290  Download:2113  Cited:0  <Full Text>  <PPT> 1680
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE