- [1] Han, Lidong. Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". IEEE Transactions on Information Forensics and Security, 18, 3934, 2023.
- [2] Han Lidong. Comments on "Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". IEEE Transactions on Information Forensics and Security, 18, 3934, 2023.
- [3] 赵梓伸. On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices. 2022.
- [4] 伍涵. More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. 2022.
- [5] Zhongxiang Zheng. Error estimation of practical convolution discrete Gaussian sampling with rejection sampling. Science China F, 2021.
- [6] 于伟. Pre-computation Scheme of Window tNAF for Koblitz Curves Revisited. 2021.
- [7] Jun Che. Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited. IEEE Transactions on Information Theory, 2021.
- [8] XU GUANGWU. 格的计算和密码学应用. 中国科学(A-G)辑, 50, 1417, 2020.
- [9] Zhongxiang Zheng. Discrete Gaussian measures and new bounds of the smoothing parameter for lattices. Applicable Algebra in Engineering, Communication and Computing, 2020.
- [10] XU GUANGWU. On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors. Springer Proceedings in Mathematics & Statistics, 2018.
- [11] XU GUANGWU. On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors. Springer Proceedings in Mathematics & Statistics, 2018.
|