Yuliang Zheng

From MaRDI portal
Person:293453

Available identifiers

zbMath Open zheng.yuliangDBLPz/YuliangZhengWikidataQ16887218 ScholiaQ16887218MaRDI QIDQ293453

List of research outcomes





PublicationDate of PublicationType
Implementing nonlinear least squares approach to simulate the dynamic response of laminated nanocomposite arch with magnetorheological elastomer matrix2024-08-06Paper
An alternative model of quantum key agreement via photon coupling2024-07-11Paper
Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis2023-01-25Paper
Beacon based authentication2021-12-20Paper
Security of the blockchain against long delay attack2019-01-23Paper
How to construct efficient signcryption schemes on elliptic curves2016-06-09Paper
On the Construction of Public Key Encryption with Sender Recovery2015-05-19Paper
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption2014-12-09Paper
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions2014-08-20Paper
A NEW CONSTRUCTION OF IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES2014-07-04Paper
Public Key Cryptography for Mobile Cloud2013-06-28Paper
New Impossible Differential Attack on SAFER +  and SAFER + +2013-06-04Paper
Public key encryption without random oracle made truly practical2012-10-19Paper
Public Key Encryption for the Forgetful2012-06-08Paper
A Single Key Pair is Adequate for the Zheng Signcryption2011-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
https://portal.mardi4nfdi.de/entity/Q35975302009-02-09Paper
On Algebraic Immunity and Annihilators2008-05-06Paper
https://portal.mardi4nfdi.de/entity/Q35928782007-09-24Paper
Formal proofs for the security of signcryption2007-05-03Paper
On the security of RSA with primes sharing least-significant bits2005-02-09Paper
The generalized XOR lemma2005-02-09Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439282004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724292004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44724072004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44525622004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525672004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44507272004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44185402003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44129822003-07-17Paper
Connections among nonlinearity, avalanche and correlation immunity2003-05-14Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q27244232002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q45366592002-10-10Paper
https://portal.mardi4nfdi.de/entity/Q49493292002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks2002-08-28Paper
On plateaued functions2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q45014942002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q27245812002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q49453912002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45025132002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q45024902002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27628922002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q27627592002-01-09Paper
https://portal.mardi4nfdi.de/entity/Q27572512001-11-25Paper
https://portal.mardi4nfdi.de/entity/Q27074412001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27211222001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q49420362001-05-01Paper
https://portal.mardi4nfdi.de/entity/Q45208362001-02-27Paper
https://portal.mardi4nfdi.de/entity/Q45202832001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45202782001-02-26Paper
https://portal.mardi4nfdi.de/entity/Q45203132001-02-26Paper
A new property of Maiorana-McFarland functions.2001-01-01Paper
https://portal.mardi4nfdi.de/entity/Q45014872000-09-04Paper
Restriction, terms and nonlinearity of Boolean functions2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q44950782000-08-10Paper
Relating differential distribution tables to other properties of substitution boxes2000-06-04Paper
https://portal.mardi4nfdi.de/entity/Q49422452000-05-11Paper
https://portal.mardi4nfdi.de/entity/Q49453972000-03-23Paper
https://portal.mardi4nfdi.de/entity/Q49407112000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49347182000-01-31Paper
https://portal.mardi4nfdi.de/entity/Q42510301999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42510231999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42634221999-09-22Paper
The Nonhomomorphicity of Boolean Functions1999-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38391791998-08-13Paper
Cryptographically resilient functions1998-07-03Paper
https://portal.mardi4nfdi.de/entity/Q43736271998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43657491998-01-26Paper
https://portal.mardi4nfdi.de/entity/Q43645501998-01-07Paper
https://portal.mardi4nfdi.de/entity/Q38400961998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43657561997-12-14Paper
https://portal.mardi4nfdi.de/entity/Q43417841997-10-20Paper
https://portal.mardi4nfdi.de/entity/Q43416751997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43417321997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43416771997-07-20Paper
On key agreement protocols based on tamper-proof hardware1997-02-28Paper
Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors1996-05-29Paper
https://portal.mardi4nfdi.de/entity/Q49422501996-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43187021995-08-24Paper
https://portal.mardi4nfdi.de/entity/Q43252861995-08-24Paper
Nonlinearity and propagation characteristics of balanced Boolean functions1995-08-01Paper
https://portal.mardi4nfdi.de/entity/Q43140201995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43140211994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q42795821994-09-20Paper
Improving the strict avalanche characteristics of cryptographic functions1994-05-03Paper
https://portal.mardi4nfdi.de/entity/Q33562341991-01-01Paper
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33596341990-01-01Paper

Research outcomes over time

This page was built for person: Yuliang Zheng