Advanced Search



27 results found in all.
index Title
1Optical encryption with cascaded fractional wavelet transforms
Author(s):BAO Liang-hua, CHEN Lin-fei, ZHAO Dao-mu  Clicked:5212  Download:2909  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.8 P.1431-1435  DOI:10.1631/jzus.2006.A1431
2How to repair the Hill cipher
Author(s):ISMAIL I.A., AMIN Mohammed, DIAB Hossam  Clicked:5137  Download:3067  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.12 P.2022-2030  DOI:10.1631/jzus.2006.A2022
3Cryptanalysis of an image encryption scheme based on the Hill cipher
Author(s):Cheng-qing LI, Dan ZHANG, Guan-rong CHEN  Clicked:5614  Download:3525  Cited:7  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.8 P.1118-1123  DOI:10.1631/jzus.A0720102
4Comments on “How to repair the Hill cipher”
Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ  Clicked:5143  Download:3432  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.2 P.211-214  DOI:10.1631/jzus.A072143
5Decryption of pure-position permutation algorithms
Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang  Clicked:4713  Download:2697  Cited:5  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.7 P.803-809  DOI:10.1631/jzus.2004.0803
6CCA2 secure biometric identity based encryption with constant-size ciphertext
Author(s):Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun  Clicked:7890  Download:3410  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.10 P.819-827  DOI:10.1631/jzus.C1000429
7A multipurpose audio watermarking algorithm with synchronization and encryption
Author(s):Baiying Lei, Ing Yann Soon  Clicked:7535  Download:4256  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.1 P.11-19  DOI:10.1631/jzus.C1100085
8Performance study of selective encryption in comparison to full encryption for still visual images
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:8371  Download:3474  Cited:6  <Full Text>  <PPT> 1872
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.435-444  DOI:10.1631/jzus.C1300262
9ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:5882  Download:2503  Cited:0  <Full Text>  <PPT> 2088
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
10BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:6273  Download:4010  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
11Efficient hierarchical identity based encryption scheme in the standard model over lattices
Author(s):Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu  Clicked:5914  Download:2357  Cited:0  <Full Text>  <PPT> 1689
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791  DOI:10.1631/FITEE.1500219
12Phase problems in optical imaging
Author(s):Guo-hai Situ, Hai-chao Wang  Clicked:5136  Download:1769  Cited:1  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.9 P.1277-1287  DOI:10.1631/FITEE.1700298
13A leakage-resilient certificateless public key encryption scheme with CCA2 security
Author(s):Yan-wei Zhou, Bo Yang, Hao Cheng, Qing-long Wang  Clicked:5627  Download:2288  Cited:0  <Full Text>  <PPT> 1646
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.4 P.481-493  DOI:10.1631/FITEE.1601849
14Constructing pairing-free certificateless public key encryption with keyword search
Author(s):Yang Lu, Ji-guo Li  Clicked:5252  Download:1938  Cited:0  <Full Text>  <PPT> 1380
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.8 P.1049-1060  DOI:10.1631/FITEE.1700534
15Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5332  Download:2130  Cited:0  <Full Text>  <PPT> 1689
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE