The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuliang Zheng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:379-390 [Conf]
  2. Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:215-226 [Conf]
  3. Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng
    Grouping Verifiable Content for Selective Disclosure. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:1-12 [Conf]
  4. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    High Performance Agile Crypto Modules. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:74-88 [Conf]
  5. Yi Mu, Yuliang Zheng
    An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:320-331 [Conf]
  6. Jussipekka Leiwo, Yuliang Zheng
    A Method to Implement a Denial of Service Protection Base. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:90-101 [Conf]
  7. Ron Steinfeld, Joonsang Baek, Yuliang Zheng
    On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:241-256 [Conf]
  8. Xian-Mo Zhang, Yuliang Zheng
    New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:147-158 [Conf]
  9. Jussipekka Leiwo, Chandana Gamage, Yuliang Zheng
    Organizational Modeling for Efficient Specification of Information Security Requirements. [Citation Graph (0, 3)][DBLP]
    ADBIS, 1999, pp:247-260 [Conf]
  10. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:348-362 [Conf]
  11. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:130-142 [Conf]
  12. Thomas Hardjono, Yuliang Zheng
    A Practical Digital Multisignature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:122-132 [Conf]
  13. Babak Sadeghiyan, Yuliang Zheng, Josef Pieprzyk
    How to Construct A Family of Strong One Way Permutations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:97-110 [Conf]
  14. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:119-132 [Conf]
  15. Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai
    Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:86-102 [Conf]
  16. Yuliang Zheng, Thomas Hardjono, Josef Pieprzyk
    Sibling Intractable Function Families and Their Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:124-138 [Conf]
  17. Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
    HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:83-104 [Conf]
  18. Yuliang Zheng, Xian-Mo Zhang
    On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:470-482 [Conf]
  19. Khaled M. Khan, Jun Han, Yuliang Zheng
    Characterizing User Data Protection of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2000, pp:3-12 [Conf]
  20. Khaled M. Khan, Jun Han, Yuliang Zheng
    A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. [Citation Graph (0, 0)][DBLP]
    Australian Software Engineering Conference, 2001, pp:117-126 [Conf]
  21. Tim Ebringer, Yuliang Zheng, Peter Thorne
    Parasitic Authentication. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:307-326 [Conf]
  22. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf]
  23. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:49-60 [Conf]
  24. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:383-396 [Conf]
  25. Yuliang Zheng
    Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:165-179 [Conf]
  26. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:461-480 [Conf]
  27. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:285-302 [Conf]
  28. Yuliang Zheng, Jennifer Seberry
    Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:292-304 [Conf]
  29. Seungjoo Kim, Masahiro Mambo, Yuliang Zheng
    Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:227-243 [Conf]
  30. Ron Steinfeld, Yuliang Zheng
    An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:52-62 [Conf]
  31. Azad Jiwa, Jennifer Seberry, Yuliang Zheng
    Beacon Based Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:125-141 [Conf]
  32. Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
    Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:433-438 [Conf]
  33. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:181-199 [Conf]
  34. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:376-388 [Conf]
  35. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:434-449 [Conf]
  36. Xian-Mo Zhang, Yuliang Zheng
    On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:274-288 [Conf]
  37. Xian-Mo Zhang, Yuliang Zheng
    Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:294-306 [Conf]
  38. Yuliang Zheng
    How to Break and Repair Leighton and Micali's Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:299-305 [Conf]
  39. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:412-422 [Conf]
  40. Yuliang Zheng
    The SPEED Cipher. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:71-90 [Conf]
  41. Yongge Wang, Yuliang Zheng, Bei-tseng Chu
    Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    IC-AI, 2003, pp:17-22 [Conf]
  42. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:157-168 [Conf]
  43. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:159-169 [Conf]
  44. Yuliang Zheng, Xian-Mo Zhang
    Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:284-300 [Conf]
  45. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:120-131 [Conf]
  46. Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng
    On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:65-80 [Conf]
  47. Yuliang Zheng, Xian-Mo Zhang
    New Results on Correlation Immunity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:49-63 [Conf]
  48. Yuliang Zheng, Xian-Mo Zhang
    The nonhomomorphicity of S-boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:131-145 [Conf]
  49. Yuliang Zheng, Xian-Mo Zhang
    Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:60-75 [Conf]
  50. Ron Steinfeld, Laurence Bull, Yuliang Zheng
    Content Extraction Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:285-304 [Conf]
  51. Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
    A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:191-196 [Conf]
  52. Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Zheng
    Privacy Aware Data Generation for Testing Database Applications. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2005, pp:317-326 [Conf]
  53. Yuliang Zheng
    An Authentication and Security Protocol for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on Mobile Communications, 1996, pp:249-257 [Conf]
  54. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  55. Yuliang Zheng, Hideki Imai
    Compact and Unforgeable Key Establishment over an ATM Network. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:411-418 [Conf]
  56. Kouichi Sakurai, Yuliang Zheng
    Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ISAAC, 1996, pp:376-385 [Conf]
  57. Zhaoyu Liu, Dichao Peng, Yuliang Zheng, Jeffrey Liu
    Communication Protection in IP-based Video Surveillance Systems. [Citation Graph (0, 0)][DBLP]
    ISM, 2005, pp:69-78 [Conf]
  58. Xintao Wu, Yongge Wang, Yuliang Zheng
    Statistical Database Modeling for Privacy Preserving Database Generation. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:382-390 [Conf]
  59. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Properties of Software Components. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:52-56 [Conf]
  60. Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
    Digital Watermarking Robust Against JPEG Compression. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:167-190 [Conf]
  61. Jussipekka Leiwo, Yuliang Zheng
    A Framework for the Management of Information Security. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:232-245 [Conf]
  62. Ron Steinfeld, Yuliang Zheng
    A Signcryption Scheme Based on Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:308-322 [Conf]
  63. Sung-Ming Yen, Yuliang Zheng
    Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:135-148 [Conf]
  64. Yuliang Zheng
    Signcryption and Its Applications in Efficient Public Key Solutions. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:291-312 [Conf]
  65. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:124-128 [Conf]
  66. Gautam Singaraju, Lawrence Teo, Yuliang Zheng
    A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:79-96 [Conf]
  67. Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn
    Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:73-88 [Conf]
  68. Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
    Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:186-191 [Conf]
  69. Yuliang Zheng
    Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:117- [Conf]
  70. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:80-98 [Conf]
  71. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:262-276 [Conf]
  72. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    Encrypted Message Authentication by Firewalls. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:69-81 [Conf]
  73. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:64-79 [Conf]
  74. Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
    A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:217-233 [Conf]
  75. Yuliang Zheng
    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:48-63 [Conf]
  76. Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
    Dynamic and risk-aware network access management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:217-230 [Conf]
  77. Xian-Mo Zhang, Yuliang Zheng
    The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:280-295 [Conf]
  78. Yuliang Zheng, Xian-Mo Zhang
    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:262-274 [Conf]
  79. Yuliang Zheng, Xian-Mo Zhang
    Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:92-105 [Conf]
  80. Jussipekka Leiwo, Yuliang Zheng
    A formal model to aid documenting and harmonizing of information security requirements. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:25-38 [Conf]
  81. Yongge Wang, Yuliang Zheng
    Fast and Secure Magnetic WORM Storage Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:11-19 [Conf]
  82. Yongge Wang, Xintao Wu, Yuliang Zheng
    Privacy Preserving Data Generation for Database Application Performance Testing. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:142-151 [Conf]
  83. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Kuperee: An Approach to Authentication using Public Keys. [Citation Graph (0, 0)][DBLP]
    ULPAA, 1994, pp:65-76 [Conf]
  84. Xintao Wu, Yongge Wang, Yuliang Zheng
    Privacy preserving database application testing. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:118-128 [Conf]
  85. Kanta Matsuura, Yuliang Zheng, Hideki Imai
    Compact and Flexible Resolution of CBT Multicast Key-Distribution. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:190-205 [Conf]
  86. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Characterization of Software Components and Their Composition. [Citation Graph (0, 0)][DBLP]
    TOOLS (36), 2000, pp:240-249 [Conf]
  87. Ron Steinfeld, Yuliang Zheng
    On the Security of RSA with Primes Sharing Least-Significant Bits. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2004, v:15, n:3-4, pp:179-200 [Journal]
  88. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:3, pp:293-303 [Journal]
  89. Yuliang Zheng, Thomas Hardjono, Jennifer Seberry
    Reusing Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:3, pp:199-205 [Journal]
  90. Thomas Hardjono, Yuliang Zheng, Jennifer Seberry
    Database authentication revisited. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:573-580 [Journal]
  91. Tim Ebringer, Peter Thorne, Yuliang Zheng
    Parasitic Authentication To Protect Your E-Wallet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:10, pp:54-60 [Journal]
  92. Xian-Mo Zhang, Yuliang Zheng
    Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:111-134 [Journal]
  93. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal]
  94. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal]
  95. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal]
  96. Joonsang Baek, Yuliang Zheng
    Zheng and Seberry's public key encryption scheme revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal]
  97. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal]
  98. Yuliang Zheng
    On Key Agreement Protocols Based on Tamper-Proof Hardware. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:1, pp:49-54 [Journal]
  99. Yuliang Zheng, Hideki Imai
    How to Construct Efficient Signcryption Schemes on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:68, n:5, pp:227-233 [Journal]
  100. Laurence Bull, David McG. Squire, Yuliang Zheng
    A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:208-222 [Journal]
  101. Yuliang Zheng, Jennifer Seberry
    Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal]
  102. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:2, pp:136-150 [Journal]
  103. Xian-Mo Zhang, Yuliang Zheng
    On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1996, v:2, n:3, pp:147-162 [Journal]
  104. Yuliang Zheng, Xian-Mo Zhang
    The kth-Order Nonhomomorphicity of S-Boxes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2000, v:6, n:8, pp:830-848 [Journal]
  105. Yuliang Zheng, Xian-Mo Zhang
    Connections among nonlinearity, avalanche and correlation immunity. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:292, n:3, pp:697-710 [Journal]
  106. Yuliang Zheng, Xian-Mo Zhang
    The Generalized XOR Lemma. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:329, n:1-3, pp:331-337 [Journal]
  107. Yuliang Zheng, Xian-Mo Zhang, Hideki Imai
    Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal]
  108. Xian-Mo Zhang, Yuliang Zheng
    Cryptographically resilient functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:5, pp:1740-1747 [Journal]
  109. Yuliang Zheng, Xian-Mo Zhang
    On plateaued functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1215-1223 [Journal]
  110. Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng
    Privacy Preserving Database Generation for Database Application Testing. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:78, n:4, pp:595-612 [Journal]
  111. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal]

  112. Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP]


  113. Efficient and provably secure ciphers for storage device block level encryption. [Citation Graph (, )][DBLP]


Search in 0.028secs, Finished in 0.031secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002