Funding for this research was provided by:
Program for New Century Excellent Talents in Fujian Province University, Zhangzhou Science and Technology Project (No.ZZ2018J23)
Program for New Century Excellent Talents in Fujian Province University, National Natural Science Foundation of China (Nos: 61672124, 61173183)
Program for New Century Excellent Talents in Fujian Province University, National Natural Science Foundation of China (61370145)
Program for Liaoning Excellent Talents in University (No:LR2012003)
the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No:MMJJ20170203)
The Natural Science Foundation of Fujian Province of China (No.2018J01100)
Article History
Received: 3 October 2017
Accepted: 30 May 2018
First Online: 1 August 2018
Compliance with ethical standards
:
: We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, and there is no professional or other personal interest of any nature or kind in any product, service and/or company that could be construed as influencing the position presented in, or the review of, this manuscript.