Volume 4,Issue 2,2019 Table of Contents

Other Issues:  


A Survey on the Analysis of the Concrete Hardness of LWE
  BI Lei, LI Shuaigang, LIU Yamin, ZHANG Jiang and FAN Shuqin
  Published June 1, 2019
  2019,4(2):1-12 [Abstract]  [View PDF(637.58 K)]
On Post-Quantum Provable Security
  JIANG Haodong and LIU Yamin
  Published June 1, 2019
  2019,4(2):13-19 [Abstract]  [View PDF(287.67 K)]
Recent progress of code-based post-quantum public key cryptography
  WANG Liping and QI Yanhong
  Published June 1, 2019
  2019,4(2):20-28 [Abstract]  [View PDF(359.39 K)]
Encryption and Signature Algorithms from NTRU
  HE Jingnan and ZHANG Zhenfei
  Published June 1, 2019
  2019,4(2):29-36 [Abstract]  [View PDF(712.16 K)]
Research on Mimic DNS Architectural Strategy Based on Generalized Stochastic Petri Net
  REN Quan, WU Jiangxing and HE Lei
  Published June 1, 2019
  2019,4(2):37-52 [Abstract]  [View PDF(1.17 M)]
Android malware detection method based on data-flow deep learning algorithm
  ZHU Dali, JIN Hao, WU Di, JING Pengfei and YANG Ying
  Published June 1, 2019
  2019,4(2):53-68 [Abstract]  [View PDF(744.10 K)]
Diskaller:Kernel Vulnerability Parallel Mining Model Based on Coverage Guidance
  TU Xuwen, WANG Xiaofeng, GAN Shuitao and CHEN Aiguo
  Published June 1, 2019
  2019,4(2):69-82 [Abstract]  [View PDF(1.01 M)]
Event Database Construction Techniques
  XUE Cong, GAO Neng, ZHA Daren, WANG Lei, YIN Zhiyi and ZENG Zehua
  Published June 1, 2019
  2019,4(2):83-106 [Abstract]  [View PDF(2.49 M)]