Page 4 - 《软件学报》2025年第10期
P. 4

Journal of Software                        Vol.36, No.10        Oct. 2025


                                                       Contents


                 SPECIAL TOPIC ON POST-QUANTUM CRYPTOGRAPHY AND BLOCKCHAIN APPLICATIONS

                    4403       Preface
                            WENG Jian, ZHU Lie-Huang, ZHAO Yun-Lei
                    4405       Tighter Reductions of LWE Problems with Semi-uniform Seeds
                            WANG Yang, WANG Ming-Qiang
                    4417       SM3-OTS: Compact Post Quantum One-time Signature Scheme Based on Chinese Cryptographic Algorithm SM3
                            YANG Ya-Tao, YIN Fang-Rui, CHEN Liang-Yu, PAN Deng
                    4430       Efficient Authenticated Key Exchange Protocol Based on Kyber Public-key Encryption
                            MI Rui-Qi, JIANG Hao-Dong, ZHANG Zhen-Feng
                    4444       Lattice-based Group Signatures with User-controlled Linkability and Verifier Conditional Revocation
                            CHEN Ying, HE De-Biao, PENG Cong, LUO Min
                    4461       Hardware Optimization of Lattice-based Digital Signature Algorithm Based on FPGA
                            HU Yue, ZHAO Xu-Yang, WANG Wei, YUAN Qian, ZHENG Jie-Yu, YANG Ya-Fang
                    4483       Quantum-resistant and Efficient Blockchain Authentication Storage Scheme
                            ZHANG Chuan, REN Xu-Hao, DENG Hao-Tian, WANG Ya-Jie, LI Chun-Hai, WU Tong, WANG Li-Cheng
                    4507       Post-quantum Blockchain System Based on Multi-parent Chain Auxiliary Proof-of-work Consensus Mechanism
                            WANG Yu-Tian, JIA Shu-Rui, CHEN Ming-Xi, DONG Yi-Fan, YANG Ya-Fang


                 THEORETICAL COMPUTER SCIENCE

                    4525       Fine-grained Dichotomies for Symmetric 2-spin System on Regular Graphs
                            LIU Ying


                 ALGORITHM DESIGN AND ANALYSIS

                    4542       Safe and Efficient Scalar Multiplication Algorithms Based on Two New Scalar Representations
                            CHENG Shi, HU Zhi, TAO Zheng


                 SYSTEM SOFTWARE AND SOFTWARE ENGINEERING
                    4558       Impact of Mislabeled Changes by SZZ on Performance and Interpretation of Just-in-time Defect Prediction for Mobile
                          APP
                            LI Zhi-Qiang, MA Rui, ZHANG Hong-Yu, JING Xiao-Yuan, REN Jie, LIU Jin-Hui
                    4590       Vulnerability Sample Generation Method Based on Abstract Syntax Tree Variation
                            ZHENG Wei, LI Yun-Fan, GUI Kui, WU Xiao-Xue, CHEN Xiang, DENG Pei-Ran
                    4612       Trusted Verification Mechanism of Smart Contract Behaviour for Consortium Blockchain
                            ZHANG Jian-Biao, KANG Shuang, ZHANG Zhao-Qian, LIU De-Tian
                    4628       Ponzi Scheme Contract Detection Based on Code Control Flow Graph
                            HUANG Jing, WANG Meng-Xiao, HAN Hong-Gui
                    4645       Fuzz Testing for Sequential Decision-making Model with Intervening Inert Sequences
                            WU Bo-Yu, WANG Kai-Rui, WANG Ya-Wen, WANG Jun-Jie
   1   2   3   4   5   6   7   8   9