[1] | XU Changbiao, XU Haonan, MING Zhifei. Image Encryption Scheme Based on 2D Discrete Chaotic System and Deoxyribonucleic Acid[J]. Journal of Southwest Jiaotong University, 2024, 59(3): 528-538. doi: 10.3969/j.issn.0258-2724.20220810 |
[2] | HONG Zhichao, LI Hui, ZHANG Jin, CHEN Haojie. Risk Evaluation Model of Blockchain Integration Based on CKKS Encryption Scheme[J]. Journal of Southwest Jiaotong University, 2023, 58(1): 100-108. doi: 10.3969/j.issn.0258-2724.20210082 |
[3] | WANG Yong, JIANG Gongkun, YIN Enmin. Image Encryption Based on 2D Coupled Map Lattices[J]. Journal of Southwest Jiaotong University, 2021, 56(6): 1337-1345, 1354. doi: 10.3969/j.issn.0258-2724.20200331 |
[4] | ZHANG Jian, HUO Da. Quantum Colour Image Encryption Algorithm Based on Chaotic Systems[J]. Journal of Southwest Jiaotong University, 2019, 54(2): 421-427. doi: 10.3969/j.issn.0258-2724.20170443 |
[5] | ZHANG Jian, HUO Da. Quantum Image Encryption Algorithm Based on Chaotic System and DNA Coding[J]. Journal of Southwest Jiaotong University, 2018, 53(6): 1142-1149. doi: 10.3969/j.issn.0258-2724.2018.06.008 |
[6] | YU Wangke, MA Wenping, CHEN Hefeng. Key Management Scheme for Clustered Wireless Sensor Networks[J]. Journal of Southwest Jiaotong University, 2011, 24(2): 310-314. doi: 10.3969/j.issn.0258-2724.2011.02.022 |
[7] | YANG Wenfeng, HU Yupu, GAO Juntao. Key Recovery Attack on Stream Cipher Grain v1 and Its Improvement[J]. Journal of Southwest Jiaotong University, 2010, 23(5): 745-750. doi: 10. 3969/ j. issn. 0258-2724. |
[8] | YE Feng, YUAN Jia-Bin. Key Search Quantum Circuit Design of AES Cipher[J]. Journal of Southwest Jiaotong University, 2010, 23(2): 302-307. doi: 10. 3969/ j. issn. 0258-2724. |
[9] | LI Guomin, HE Dake, LU Xianhui, MA Chunbo. Authenticated Group Key Agreement Protocol with Resistance to Leakage of Ephemeral Secret DH Exponents[J]. Journal of Southwest Jiaotong University, 2007, 20(6): 670-674. |
[10] | LU Rongbo, SU Hangli, HE Dake, MIAO Xianghua. Offline E-cash System with Finite Circulation Period Based on Elliptic Curve[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 314-318. |
[11] | MEIQi-xiang, HEDa-ke, ZHENG Yu. New Threshold Cryptosystem againstChosen C iphertextAttacks Based on Pairing[J]. Journal of Southwest Jiaotong University, 2005, 18(6): 727-730. |
[12] | WANG Da-yong, MEIZhi-hong, JINWei-dong. Security Scheme forM obile Agent inM aliciousHosts[J]. Journal of Southwest Jiaotong University, 2005, 18(4): 505-509. |
[13] | FENG Zhen-yong. Search for 3 TeV Gamma-Ray Bursts Coincident with the BASTE Experiment by Using the Data of Tibet HD Air Shower Array[J]. Journal of Southwest Jiaotong University, 2002, 15(3): 347-351. |
[14] | YUANDing, FANPing-zhi. A Secure and Efficient Conference Key Distribution Scheme[J]. Journal of Southwest Jiaotong University, 2002, 15(4): 408-412. |