The following pages link to Yuliang Zheng (Q293453):
Displaying 50 items.
- How to construct efficient signcryption schemes on elliptic curves (Q293455) (← links)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (Q477604) (← links)
- On key agreement protocols based on tamper-proof hardware (Q674296) (← links)
- The generalized XOR lemma (Q706639) (← links)
- Public key encryption without random oracle made truly practical (Q714193) (← links)
- Beacon based authentication (Q826059) (← links)
- Formal proofs for the security of signcryption (Q877813) (← links)
- Improving the strict avalanche characteristics of cryptographic functions (Q1321834) (← links)
- Restriction, terms and nonlinearity of Boolean functions (Q1575850) (← links)
- Security of the blockchain against long delay attack (Q1710674) (← links)
- On the security of RSA with primes sharing least-significant bits (Q1762562) (← links)
- Connections among nonlinearity, avalanche and correlation immunity (Q1870563) (← links)
- Nonlinearity and propagation characteristics of balanced Boolean functions (Q1893724) (← links)
- Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors (Q1910426) (← links)
- Relating differential distribution tables to other properties of substitution boxes (Q1970570) (← links)
- (Q2707409) (← links)
- (Q2707441) (← links)
- (Q2721122) (← links)
- (Q2724423) (← links)
- (Q2724581) (← links)
- (Q2757251) (← links)
- (Q2762759) (← links)
- (Q2762892) (← links)
- (Q2765162) (← links)
- Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions (Q2876909) (← links)
- Public Key Encryption for the Forgetful (Q2889762) (← links)
- A Single Key Pair is Adequate for the Zheng Signcryption (Q3013004) (← links)
- (Q3043927) (← links)
- (Q3043928) (← links)
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses (Q3211253) (← links)
- (Q3356234) (← links)
- (Q3359634) (← links)
- (Q3592878) (← links)
- (Q3597530) (← links)
- Introduction to the Special Issue on Information Theoretic Security (Q3604426) (← links)
- (Q3839179) (← links)
- (Q3840096) (← links)
- The Nonhomomorphicity of Boolean Functions (Q4250824) (← links)
- (Q4251023) (← links)
- (Q4251030) (← links)
- (Q4263422) (← links)
- (Q4279582) (← links)
- (Q4314020) (← links)
- (Q4314021) (← links)
- (Q4318702) (← links)
- (Q4325286) (← links)
- (Q4341675) (← links)
- (Q4341677) (← links)
- (Q4341732) (← links)
- (Q4341784) (← links)