Applied Cryptography and system security.
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme.
DRSA: Debug Register-based Self-relocating Attack against software-based remote authentication.
Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm.
A suvey of algorithms for addressing the Shortest Vector Problem (SVP).
Blockchain and applications.
PSWS: Private Support-Weighted Sum Protocol for Privacy-Preserving Blockchain-Based Voting With Ballot Secrecy.
Cross-chain trusted information match scheme with privacy-perserving and auditability.
Verifiable Attribute-Based Proxy Re-Encryption with Non-repudiation based on Block-Chain.
Blockchain-based Hierarchical Access Control with Efficient Revocation in mHealth System.