Shaoquan Jiang

From MaRDI portal
(Redirected from Person:477190)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A lower bound on the share size of leakage-resilient secret-sharing schemes2024-10-02Paper
Lower bounds on the share size of leakage resilient cheating detectable secret sharing2024-06-05Paper
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
Lecture Notes in Computer Science
2022-10-13Paper
A new framework for deniable secure key exchange
Information and Computation
2022-06-08Paper
On Optimal Secure Message Transmission by Public Discussion
IEEE Transactions on Information Theory
2017-07-27Paper
On message authentication with a correlated setup
Information Processing Letters
2016-01-05Paper
On \(\tau\)-time secure key agreement
Science China Information Sciences
2015-08-05Paper
Timed encryption with application to deniable key exchange
Theoretical Computer Science
2014-12-02Paper
Persistent asymmetric password-based key exchange
Journal of Mathematical Cryptology
2014-02-05Paper
An efficient conditionally anonymous ring signature in the random oracle model
Theoretical Computer Science
2012-11-27Paper
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
2012-11-16Paper
Timed encryption with application to deniable key exchange
Lecture Notes in Computer Science
2012-07-16Paper
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
International Journal of Foundations of Computer Science
2011-10-10Paper
A New Conditionally Anonymous Ring Signature
Lecture Notes in Computer Science
2011-08-17Paper
Dwork-Naor ZAP and its application in deniable authentication, revisited
Information Security and Cryptology
2011-07-29Paper
More efficient DDH pseudorandom generators
Designs, Codes and Cryptography
2010-03-26Paper
Plaintext-awareness of hybrid encryption
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
An Efficient Deniable Key Exchange Protocol (Extended Abstract)
Financial Cryptography and Data Security
2009-02-12Paper
Deniable Authentication on the Internet
Information Security and Cryptology
2009-02-10Paper
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences
IEEE Transactions on Information Theory
2008-12-21Paper
Efficient Primitives from Exponentiation in ℤ p
Information Security and Privacy
2007-09-07Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Notes on \(q\)-ary interleaved sequences
Chinese Science Bulletin
2004-05-18Paper
scientific article; zbMATH DE number 1943100 (Why is no real title available?)2004-01-08Paper
On interleaved sequences over finite fields
Discrete Mathematics
2002-08-29Paper
scientific article; zbMATH DE number 1740047 (Why is no real title available?)2002-05-14Paper
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
IEEE Transactions on Information Theory
2000-09-07Paper


Research outcomes over time


This page was built for person: Shaoquan Jiang