Hao, Xuexuan
Zhang, Fengrong
Xia, Shixiong
Zhou, Yong
Funding for this research was provided by:
National Natural Science Foundation of China (61972400)
Natural Science Foundation of Jiangsu Province (BK20181352)
Guangxi Key Laboratory of Cryptography and Information Security (GCIS201712)
Article History
Received: 25 December 2019
Accepted: 17 July 2020
First Online: 30 July 2020