The following pages link to Zhen Fu Cao (Q1763260):
Displayed 50 items.
- Item:Q1763260 (redirect page) (← links)
- Item:Q182043 (redirect page) (← links)
- Blake-Wilson, Johnson \& Menezes protocol revisited (Q350869) (← links)
- Identity based signature scheme based on cubic residues (Q350965) (← links)
- Concurrent non-malleable statistically hiding commitment (Q436560) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- Efficient certificateless threshold signatures without random oracles (Q545431) (← links)
- Item:Q1763260 (redirect page) (← links)
- Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme (Q556094) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode (Q848272) (← links)
- Proofs of security for improved Rabin signature scheme (Q849938) (← links)
- The braid-based bit commitment protocol (Q849940) (← links)
- An ID-based authenticated key agreement protocol for peer-to-peer computing (Q849942) (← links)
- A self-encryption remote user anonymous authentication scheme using smart cards (Q849943) (← links)
- Combinatorial characterizations of one-coincidence frequency-hopping sequences (Q851786) (← links)
- Simulatability and security of certificateless threshold signatures (Q865909) (← links)
- A new threshold proxy signature scheme from bilinear pairings (Q866107) (← links)
- An efficient provable secure ID-based proxy signature scheme based on CDH assumption (Q879701) (← links)
- Constant-round adaptive zero-knowledge proofs for NP (Q903613) (← links)
- New designing of cryptosystems based on quadratic fields (Q954438) (← links)
- An efficient anonymous authentication mechanism for delay tolerant networks (Q974147) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Secure threshold multi authority attribute based encryption without a central authority (Q985083) (← links)
- Non-interactive and non-malleable commitment scheme based on \(q\)-one way group homomorphisms (Q999185) (← links)
- A secure identity-based proxy multi-signature scheme (Q1007844) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- A secure identity-based multi-proxy signature scheme (Q1013338) (← links)
- On the equation \(\sum ^{s}_{j=1}(1/x_ j)+(1/(x_ 1\,\dots \,x_ s))=1\) and Znám's problem (Q1090359) (← links)
- An upper bound for the number of solutions of the exponential diophantine equation \(a^x+b^y=c^z\) (Q1125417) (← links)
- On the equation \(ax^ m - by^ n = 2\) (Q1176003) (← links)
- On the diophantine equation \({(ax^ m-1) \over{} (abx-1)} = by^ 2\) (Q1179321) (← links)
- Fermat's type equations in the set of \(2\times 2\) integral matrices (Q1293147) (← links)
- Nonrepudiable proxy multi-signature scheme (Q1415953) (← links)
- Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\). (Q1428519) (← links)
- A new conjecture concerning the Diophantine equation \(x^2+b^y=c^z\). (Q1565798) (← links)
- A new proof of a conjecture of Antoniadis (Q1581868) (← links)
- The negative Pell equation and Pythagorean triples (Q1587886) (← links)
- The multi-dimension RSA and its low exponent security (Q1589779) (← links)
- Cryptanalysis of RSA with small prime difference (Q1598120) (← links)
- Some remarks on the Diophantine equation \((x^ 2-1)(y^ 2-1)=(z^ 2-1)^ 2\). (Q1609935) (← links)
- Threshold undeniable signature scheme based on conic (Q1763261) (← links)
- Provably secure proxy-protected signature schemes based on factoring (Q1774844) (← links)
- Proxy blind multi-signature scheme without a secure channel (Q1774851) (← links)
- Super-simple balanced incomplete block designs with block size 4 and index 6 (Q1781533) (← links)
- The diophantine equation \(ax^5+by^5+cz^5=au^5+bv^5+cw^5\) (Q1806232) (← links)
- Finite set theory and its application to cryptology (Q1918188) (← links)
- Threshold proxy re-signature (Q1937783) (← links)
- On constant-round concurrent non-malleable proof systems (Q1944155) (← links)
- Fuzzy identity based signature with applications to biometric authentication (Q1952519) (← links)
- Concerning the Sierpinski-Schinzel system of Diophantine equations (Q1972517) (← links)