Chuangui Ma

From MaRDI portal
Person:744324


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
scientific article; zbMATH DE number 7492388 (Why is no real title available?)
 
2022-03-17Paper
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model
 
2019-10-31Paper
Strongly secure key exchange protocol with minimal KEM
 
2018-12-07Paper
Research on attacking a special elliptic curve discrete logarithm problem
Mathematical Problems in Engineering
2018-10-12Paper
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
Designs, Codes and Cryptography
2018-05-24Paper
A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing
Fundamenta Informaticae
2018-05-03Paper
New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs
Applicable Algebra in Engineering, Communication and Computing
2017-06-14Paper
scientific article; zbMATH DE number 6719494 (Why is no real title available?)
 
2017-05-17Paper
Privacy-preserving multi-factor key exchange protocol in the standard model
 
2017-01-06Paper
Fully secure IBE with tighter reduction in prime order bilinear groups
Information and Communications Security
2016-04-21Paper
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism
Journal of Computer Science and Technology
2014-10-07Paper
Fault attacks against the miller algorithm in Hessian coordinates
Information Security and Cryptology
2013-01-07Paper
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
Information Security and Privacy
2012-09-07Paper
A multiple scalar multiplication algorithm in elliptic curve cryptosystems
Journal of Software
2012-01-27Paper
Gateway-oriented password-authenticated key exchange protocol with stronger security
Provable Security
2011-09-16Paper
Multi-factor authenticated key exchange protocol in the three-party setting
Information Security and Cryptology
2011-07-29Paper
Analysis and improvement of an authenticated multiple key exchange protocol
Computers and Electrical Engineering
2011-07-28Paper
An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings
Advances in Information Security and Its Application
2010-05-10Paper
Password authenticated key exchange based on RSA in the three-party settings
Provable Security
2009-12-11Paper
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
Information Security and Cryptology
2009-02-10Paper
scientific article; zbMATH DE number 2242705 (Why is no real title available?)
 
2006-01-03Paper
scientific article; zbMATH DE number 1839519 (Why is no real title available?)
 
2003-05-01Paper
scientific article; zbMATH DE number 1829503 (Why is no real title available?)
 
2002-11-14Paper
scientific article; zbMATH DE number 1829253 (Why is no real title available?)
 
2002-11-14Paper
Two-operation homomorphic perfect sharing schemes over rings
Applied Mathematics. Series B (English Edition)
2002-05-14Paper
Soluble block-transitive automorphism groups of \(2\)-\((v,7,1)\) designs
Advances in Mathematics (Beijing)
2002-01-29Paper
On torsion-free Abelian groups of rank 2 in which all subgroups are characteristic subgroups
Journal of Zhejiang University. Natural Sciences Edition
2001-11-01Paper
scientific article; zbMATH DE number 1187298 (Why is no real title available?)
 
1998-01-01Paper


Research outcomes over time


This page was built for person: Chuangui Ma