| Publication | Date of Publication | Type |
|---|
Universally composable secure TNC model and EAP-TNC protocol in IF-T Science China Information Sciences | 2022-10-28 | Paper |
A new approach for UC security concurrent deniable authentication Science in China. Series F | 2009-01-26 | Paper |
A New Formal Proof Model for RFID Location Privacy Computer Security - ESORICS 2008 | 2008-10-27 | Paper |
Improvement on Ha-Moon Randomized Exponentiation Algorithm Lecture Notes in Computer Science | 2008-03-17 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves Selected Areas in Cryptography | 2007-11-15 | Paper |
Universally composable anonymous hash certification model Science in China. Series F | 2007-10-12 | Paper |
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements Applied Mathematics and Computation | 2007-09-17 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security extension for the Canetti-Krawczyk model in identity-based systems Science in China. Series F | 2007-02-20 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
A common-multiplicand method to the Montgomery algorithm for speeding up exponentiation. Information Processing Letters | 2006-01-17 | Paper |
scientific article; zbMATH DE number 2048537 (Why is no real title available?) | 2004-03-01 | Paper |
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders Information Security and Privacy | 2004-02-16 | Paper |
scientific article; zbMATH DE number 2043329 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1979309 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1977206 (Why is no real title available?) | 2003-09-08 | Paper |
scientific article; zbMATH DE number 1950625 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1759668 (Why is no real title available?) | 2002-11-23 | Paper |
scientific article; zbMATH DE number 1759669 (Why is no real title available?) | 2002-11-23 | Paper |
New Public-Key Cryptosystem Using Divisor Class Groups Information Security and Privacy | 2002-09-26 | Paper |
Parallel stream cipher for secure high-speed communications Signal Processing | 2002-03-03 | Paper |
scientific article; zbMATH DE number 1440073 (Why is no real title available?) | 2001-10-02 | Paper |
scientific article; zbMATH DE number 1612528 (Why is no real title available?) | 2001-07-01 | Paper |