| Publication | Date of Publication | Type |
|---|
scientific article; zbMATH DE number 7492388 (Why is no real title available?) | 2022-03-17 | Paper |
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model | 2019-10-31 | Paper |
Strongly secure key exchange protocol with minimal KEM | 2018-12-07 | Paper |
Research on attacking a special elliptic curve discrete logarithm problem Mathematical Problems in Engineering | 2018-10-12 | Paper |
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings Designs, Codes and Cryptography | 2018-05-24 | Paper |
A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing Fundamenta Informaticae | 2018-05-03 | Paper |
New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs Applicable Algebra in Engineering, Communication and Computing | 2017-06-14 | Paper |
scientific article; zbMATH DE number 6719494 (Why is no real title available?) | 2017-05-17 | Paper |
Privacy-preserving multi-factor key exchange protocol in the standard model | 2017-01-06 | Paper |
Fully secure IBE with tighter reduction in prime order bilinear groups Information and Communications Security | 2016-04-21 | Paper |
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism Journal of Computer Science and Technology | 2014-10-07 | Paper |
Fault attacks against the miller algorithm in Hessian coordinates Information Security and Cryptology | 2013-01-07 | Paper |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts Information Security and Privacy | 2012-09-07 | Paper |
A multiple scalar multiplication algorithm in elliptic curve cryptosystems Journal of Software | 2012-01-27 | Paper |
Gateway-oriented password-authenticated key exchange protocol with stronger security Provable Security | 2011-09-16 | Paper |
Multi-factor authenticated key exchange protocol in the three-party setting Information Security and Cryptology | 2011-07-29 | Paper |
Analysis and improvement of an authenticated multiple key exchange protocol Computers and Electrical Engineering | 2011-07-28 | Paper |
An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings Advances in Information Security and Its Application | 2010-05-10 | Paper |
Password authenticated key exchange based on RSA in the three-party settings Provable Security | 2009-12-11 | Paper |
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks Information Security and Cryptology | 2009-02-10 | Paper |
scientific article; zbMATH DE number 2242705 (Why is no real title available?) | 2006-01-03 | Paper |
scientific article; zbMATH DE number 1839519 (Why is no real title available?) | 2003-05-01 | Paper |
scientific article; zbMATH DE number 1829503 (Why is no real title available?) | 2002-11-14 | Paper |
scientific article; zbMATH DE number 1829253 (Why is no real title available?) | 2002-11-14 | Paper |
Two-operation homomorphic perfect sharing schemes over rings Applied Mathematics. Series B (English Edition) | 2002-05-14 | Paper |
Soluble block-transitive automorphism groups of \(2\)-\((v,7,1)\) designs Advances in Mathematics (Beijing) | 2002-01-29 | Paper |
On torsion-free Abelian groups of rank 2 in which all subgroups are characteristic subgroups Journal of Zhejiang University. Natural Sciences Edition | 2001-11-01 | Paper |
scientific article; zbMATH DE number 1187298 (Why is no real title available?) | 1998-01-01 | Paper |