| Publication | Date of Publication | Type |
|---|
Structure-preserving linearly homomorphic signature with designated combiner for subspace Information Security and Privacy | 2023-07-26 | Paper |
A dual-explicit model-based integration algorithm with higher-order accuracy for structural dynamics Applied Mathematical Modelling | 2022-12-21 | Paper |
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution International Journal of Foundations of Computer Science | 2021-04-20 | Paper |
Certificateless aggregate signature scheme secure against fully chosen-key attacks Information Sciences | 2021-03-31 | Paper |
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model Information and Communications Security | 2020-07-20 | Paper |
Revocable identity-based encryption with server-aided ciphertext evolution Theoretical Computer Science | 2020-04-06 | Paper |
Continuous leakage-resilient certificate-based encryption Information Sciences | 2019-12-13 | Paper |
| Revocable certificateless encryption with ciphertext evolution | 2018-09-26 | Paper |
Attacks to some verifiable multi-secret sharing schemes and two improved schemes Information Sciences | 2018-05-22 | Paper |
Provably secure certificate-based encryption with leakage resilience Theoretical Computer Science | 2018-02-16 | Paper |
Notes on the security of certificateless aggregate signature schemes Information Sciences | 2017-02-07 | Paper |
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage Provable Security | 2017-01-06 | Paper |
| Efficient revocable certificateless signature against signing key exposure | 2016-08-10 | Paper |
On security of a certificateless signcryption scheme Information Sciences | 2014-08-01 | Paper |
Delegation of signing rights using certificateless proxy signatures Information Sciences | 2012-06-08 | Paper |
Certificateless threshold signature scheme from bilinear maps Information Sciences | 2011-01-28 | Paper |
Efficient many-to-one authentication with certificateless aggregate signatures Computer Networks | 2010-11-25 | Paper |
Simulatable certificateless two-party authenticated key agreement protocol Information Sciences | 2010-03-11 | Paper |
A new certificateless public key encryption scheme Wuhan University Journal of Natural Sciences | 2010-02-12 | Paper |
| An efficient certificateless ring signature scheme | 2010-02-12 | Paper |
Novel efficient certificateless aggregate signatures Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography Provable Security | 2008-06-10 | Paper |
Strongly Secure Certificateless Public Key Encryption Without Pairing Cryptology and Network Security | 2008-04-15 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
| scientific article; zbMATH DE number 2080678 (Why is no real title available?) | 2004-08-04 | Paper |
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield Journal of Computer Science and Technology | 2004-07-01 | Paper |
Nonstandard proofs of the existence and uniqueness of solutions to a class of hyperbolic partial differential equations Journal of Shaanxi Normal University. Natural Science Edition | 2001-07-30 | Paper |
| scientific article; zbMATH DE number 1145300 (Why is no real title available?) | 1998-09-21 | Paper |