Wang, Chaoxiong
Li, Chao
Huang, Hai
Qiu, Jing
Qu, Jianfeng
Yin, Lihua
Funding for this research was provided by:
National Key R&D Program of China (2018YFB2100400)
Guangxi Key Laboratory of Cryptography and Information Security (GXIS202119)
National Natural Science Foundation of China (62102276)
Article History
Received: 13 July 2021
Revised: 27 September 2021
Accepted: 27 October 2021
First Online: 1 December 2021