Huanguo Zhang

From MaRDI portal
Person:350961

Available identifiers

zbMath Open zhang.huanguoMaRDI QIDQ350961

List of research outcomes

PublicationDate of PublicationType
A Symbolic Model for Systematically Analyzing TEE-Based Protocols2022-12-21Paper
Quantum protocols for secure multi-party summation2022-11-25Paper
A new perturbation algorithm and enhancing security of SFLASH signature scheme2022-10-28Paper
Design theory and method of multivariate hash function2022-10-28Paper
A public key cryptosystem based on data complexity under quantum environment2022-10-28Paper
On the coefficients of the polynomial in the number field sieve2022-10-28Paper
Entanglement swapping for Bell states and Greenberger-Horne-Zeilinger states in qubit systems2022-03-01Paper
https://portal.mardi4nfdi.de/entity/Q50355352022-02-22Paper
Cryptanalysis and improvement of several quantum private comparison protocols2021-01-12Paper
New quantum private comparison protocol without a third party2020-06-19Paper
Cryptanalysis of He’s quantum private comparison protocol and a new protocol2019-11-06Paper
https://portal.mardi4nfdi.de/entity/Q51960992019-10-02Paper
Two-party quantum private comparison protocol with maximally entangled seven-qubit state2019-09-23Paper
Cryptanalysis and improvement of Ye et al's quantum private comparison protocol2019-09-03Paper
Cryptanalysis of Zhang et al's quantum private comparison and the improvement2019-09-03Paper
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function2019-03-15Paper
Bit-oriented quantum public-key cryptosystem based on Bell states2018-08-02Paper
Quantum public key cryptosystem based on Bell states2018-02-05Paper
Quantum algorithm to solve function inversion with time-space trade-off2017-10-25Paper
https://portal.mardi4nfdi.de/entity/Q53714872017-10-20Paper
A new quantum algorithm for computing RSA ciphertext period2017-10-20Paper
New public-key cryptosystem based on the morphism of polynomials problem2017-07-14Paper
Cryptanalysis of public key cryptosystems based on non-Abelian factorization problems2017-07-14Paper
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function2017-05-05Paper
Cryptanalysis of schemes based on pseudoinverse matrix2016-10-06Paper
Toward reverse engineering on secret \(S\)-boxes in block ciphers2015-11-20Paper
A class of the hamming weight hierarchy of linear codes with dimension 52015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q52606072015-06-29Paper
Polynomial-time quantum algorithms for finding the linear structures of Boolean function2015-06-05Paper
Quantum algorithm to find invariant linear structure of \(MD\) hash functions2015-04-13Paper
https://portal.mardi4nfdi.de/entity/Q54001502014-02-28Paper
Capability of evolutionary cryptosystems against differential cryptanalysis2013-07-03Paper
Evolutionary cryptography against multidimensional linear cryptanalysis2013-07-03Paper
https://portal.mardi4nfdi.de/entity/Q49269072013-06-20Paper
https://portal.mardi4nfdi.de/entity/Q29167232012-10-05Paper
Polar differential power attacks and evaluation2012-08-17Paper
Extended multivariate public key cryptosystems with secure encryption function2012-05-09Paper
https://portal.mardi4nfdi.de/entity/Q31107352012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31107362012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31107442012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q30166792011-07-19Paper
Generation algorithm of a sort of P-permutations2011-07-19Paper
A fast pseudorandom number generator with BLAKE hash function2011-07-19Paper
https://portal.mardi4nfdi.de/entity/Q30547362010-11-05Paper
A new chaotic function and its cryptographic usage2010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q34032372010-02-12Paper
Research on cryptology mechanism of trusted computing platform module2009-11-22Paper
Cryptanalysis for stream cipher based on evolutionary computation2009-11-22Paper
https://portal.mardi4nfdi.de/entity/Q36095212009-03-06Paper
Self-dual permutation codes over finite chain rings2009-03-06Paper
A novel algorithm enumerating bent functions2009-01-28Paper
Complete Mapping Polynomials over Finite Field F 162007-11-15Paper
Survey of information security2007-10-12Paper
Analysis of affinely equivalent Boolean functions2007-10-12Paper
An extended hierarchical trusted model for wireless sensor networks2007-06-01Paper
Security analysis of broadcaster group key exchange protocols2007-06-01Paper
The mechanism about key and credential on trusted computing platform and the application study2007-06-01Paper
A new fast modular arithmetic method in public key cryptography2007-06-01Paper
A forward integrity and itinerary secrecy protocol for mobile agents2007-06-01Paper
An improved grid security infrastructure by trusted computing2007-06-01Paper
A dynamic active multicast group access control framework based on trust management system2007-06-01Paper
A behavior-based remote trust attestation model2007-06-01Paper
Analysis and application of covert channels of internet control message protocol2007-06-01Paper
A potential approach of internet worm propagation based on P2P2007-06-01Paper
On the degree of homogeneous bent functions2007-04-13Paper
https://portal.mardi4nfdi.de/entity/Q34225682007-02-13Paper
A fast attack algorithm on the MD5 hash function2006-11-15Paper
Weighted proximal support vector machines: Robust classification2005-11-21Paper
Trace representations of S-boxes and their application2005-10-27Paper
An improved non-repudiation protocol and its security analysis2005-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27196662001-06-25Paper
https://portal.mardi4nfdi.de/entity/Q42331781999-03-16Paper
Cryptanalysis on a finite automaton public key cryptosystem1997-09-07Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Huanguo Zhang