Search the dblp DataBase
Yuliang Zheng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] AAECC, 1990, pp:379-390 [Conf ] Goichiro Hanaoka , Yuliang Zheng , Hideki Imai LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:215-226 [Conf ] Laurence Bull , David McG. Squire , Jan Newmarch , Yuliang Zheng Grouping Verifiable Content for Selective Disclosure. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:1-12 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng High Performance Agile Crypto Modules. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:74-88 [Conf ] Yi Mu , Yuliang Zheng An alternative model of quantum key agreement via photon coupling. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:320-331 [Conf ] Jussipekka Leiwo , Yuliang Zheng A Method to Implement a Denial of Service Protection Base. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:90-101 [Conf ] Ron Steinfeld , Joonsang Baek , Yuliang Zheng On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:241-256 [Conf ] Xian-Mo Zhang , Yuliang Zheng New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:147-158 [Conf ] Jussipekka Leiwo , Chandana Gamage , Yuliang Zheng Organizational Modeling for Efficient Specification of Information Security Requirements. [Citation Graph (0, 3)][DBLP ] ADBIS, 1999, pp:247-260 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:348-362 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:130-142 [Conf ] Thomas Hardjono , Yuliang Zheng A Practical Digital Multisignature Scheme Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:122-132 [Conf ] Babak Sadeghiyan , Yuliang Zheng , Josef Pieprzyk How to Construct A Family of Strong One Way Permutations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:97-110 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:119-132 [Conf ] Junji Shikata , Yuliang Zheng , Joe Suzuki , Hideki Imai Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:86-102 [Conf ] Yuliang Zheng , Thomas Hardjono , Josef Pieprzyk Sibling Intractable Function Families and Their Applications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:124-138 [Conf ] Yuliang Zheng , Josef Pieprzyk , Jennifer Seberry HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:83-104 [Conf ] Yuliang Zheng , Xian-Mo Zhang On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:470-482 [Conf ] Khaled M. Khan , Jun Han , Yuliang Zheng Characterizing User Data Protection of Software Components. [Citation Graph (0, 0)][DBLP ] Australian Software Engineering Conference, 2000, pp:3-12 [Conf ] Khaled M. Khan , Jun Han , Yuliang Zheng A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. [Citation Graph (0, 0)][DBLP ] Australian Software Engineering Conference, 2001, pp:117-126 [Conf ] Tim Ebringer , Yuliang Zheng , Peter Thorne Parasitic Authentication. [Citation Graph (0, 0)][DBLP ] CARDIS, 2000, pp:307-326 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:49-60 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:383-396 [Conf ] Yuliang Zheng Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:165-179 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:461-480 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:285-302 [Conf ] Yuliang Zheng , Jennifer Seberry Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:292-304 [Conf ] Seungjoo Kim , Masahiro Mambo , Yuliang Zheng Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:227-243 [Conf ] Ron Steinfeld , Yuliang Zheng An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:52-62 [Conf ] Azad Jiwa , Jennifer Seberry , Yuliang Zheng Beacon Based Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:125-141 [Conf ] Chris Charnes , Luke O'Connor , Josef Pieprzyk , Reihaneh Safavi-Naini , Yuliang Zheng Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:433-438 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:181-199 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:376-388 [Conf ] Junji Shikata , Goichiro Hanaoka , Yuliang Zheng , Hideki Imai Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:434-449 [Conf ] Xian-Mo Zhang , Yuliang Zheng On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:274-288 [Conf ] Xian-Mo Zhang , Yuliang Zheng Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:294-306 [Conf ] Yuliang Zheng How to Break and Repair Leighton and Micali's Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:299-305 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:412-422 [Conf ] Yuliang Zheng The SPEED Cipher. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:71-90 [Conf ] Yongge Wang , Yuliang Zheng , Bei-tseng Chu Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP ] IC-AI, 2003, pp:17-22 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:157-168 [Conf ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:159-169 [Conf ] Yuliang Zheng , Xian-Mo Zhang Plateaued Functions. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:284-300 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:120-131 [Conf ] Xian-Mo Zhang , Josef Pieprzyk , Yuliang Zheng On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:65-80 [Conf ] Yuliang Zheng , Xian-Mo Zhang New Results on Correlation Immunity. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:49-63 [Conf ] Yuliang Zheng , Xian-Mo Zhang The nonhomomorphicity of S-boxes. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:131-145 [Conf ] Yuliang Zheng , Xian-Mo Zhang Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:60-75 [Conf ] Ron Steinfeld , Laurence Bull , Yuliang Zheng Content Extraction Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:285-304 [Conf ] Namje Park , Kiyoung Moon , Kyoil Chung , Dongho Won , Yuliang Zheng A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. [Citation Graph (0, 0)][DBLP ] ICWE, 2005, pp:191-196 [Conf ] Xintao Wu , Chintan Sanghvi , Yongge Wang , Yuliang Zheng Privacy Aware Data Generation for Testing Database Applications. [Citation Graph (0, 0)][DBLP ] IDEAS, 2005, pp:317-326 [Conf ] Yuliang Zheng An Authentication and Security Protocol for Mobile Computing. [Citation Graph (0, 0)][DBLP ] IFIP World Conference on Mobile Communications, 1996, pp:249-257 [Conf ] Seungjoo Kim , Jung Hee Cheon , Marc Joye , Seongan Lim , Masahiro Mambo , Dongho Won , Yuliang Zheng Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:114-127 [Conf ] Yuliang Zheng , Hideki Imai Compact and Unforgeable Key Establishment over an ATM Network. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1998, pp:411-418 [Conf ] Kouichi Sakurai , Yuliang Zheng Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ISAAC, 1996, pp:376-385 [Conf ] Zhaoyu Liu , Dichao Peng , Yuliang Zheng , Jeffrey Liu Communication Protection in IP-based Video Surveillance Systems. [Citation Graph (0, 0)][DBLP ] ISM, 2005, pp:69-78 [Conf ] Xintao Wu , Yongge Wang , Yuliang Zheng Statistical Database Modeling for Privacy Preserving Database Generation. [Citation Graph (0, 0)][DBLP ] ISMIS, 2005, pp:382-390 [Conf ] Khaled M. Khan , Jun Han , Yuliang Zheng Security Properties of Software Components. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:52-56 [Conf ] Hye-Joo Lee , Ji-Hwan Park , Yuliang Zheng Digital Watermarking Robust Against JPEG Compression. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:167-190 [Conf ] Jussipekka Leiwo , Yuliang Zheng A Framework for the Management of Information Security. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:232-245 [Conf ] Ron Steinfeld , Yuliang Zheng A Signcryption Scheme Based on Integer Factorization. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:308-322 [Conf ] Sung-Ming Yen , Yuliang Zheng Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:135-148 [Conf ] Yuliang Zheng Signcryption and Its Applications in Efficient Public Key Solutions. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:291-312 [Conf ] Joonsang Baek , Yuliang Zheng Identity-Based Threshold Signature Scheme from the Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:124-128 [Conf ] Gautam Singaraju , Lawrence Teo , Yuliang Zheng A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. [Citation Graph (0, 0)][DBLP ] IWIA, 2004, pp:79-96 [Conf ] Lawrence Teo , Yuliang Zheng , Gail-Joon Ahn Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IWIA, 2003, pp:73-88 [Conf ] Mike Burmester , Virgil D. Gligor , Evangelos Kranakis , J. D. Tygar , Yuliang Zheng Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:186-191 [Conf ] Yuliang Zheng Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:117- [Conf ] Joonsang Baek , Ron Steinfeld , Yuliang Zheng Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:80-98 [Conf ] Joonsang Baek , Yuliang Zheng Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:262-276 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng Encrypted Message Authentication by Firewalls. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:69-81 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:64-79 [Conf ] Miodrag J. Mihaljevic , Yuliang Zheng , Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:217-233 [Conf ] Yuliang Zheng Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:48-63 [Conf ] Lawrence Teo , Gail-Joon Ahn , Yuliang Zheng Dynamic and risk-aware network access management. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:217-230 [Conf ] Xian-Mo Zhang , Yuliang Zheng The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:280-295 [Conf ] Yuliang Zheng , Xian-Mo Zhang Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:262-274 [Conf ] Yuliang Zheng , Xian-Mo Zhang Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:92-105 [Conf ] Jussipekka Leiwo , Yuliang Zheng A formal model to aid documenting and harmonizing of information security requirements. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:25-38 [Conf ] Yongge Wang , Yuliang Zheng Fast and Secure Magnetic WORM Storage Systems. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2003, pp:11-19 [Conf ] Yongge Wang , Xintao Wu , Yuliang Zheng Privacy Preserving Data Generation for Database Application Performance Testing. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:142-151 [Conf ] Thomas Hardjono , Yuliang Zheng , Jennifer Seberry Kuperee: An Approach to Authentication using Public Keys. [Citation Graph (0, 0)][DBLP ] ULPAA, 1994, pp:65-76 [Conf ] Xintao Wu , Yongge Wang , Yuliang Zheng Privacy preserving database application testing. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:118-128 [Conf ] Kanta Matsuura , Yuliang Zheng , Hideki Imai Compact and Flexible Resolution of CBT Multicast Key-Distribution. [Citation Graph (0, 0)][DBLP ] WWCA, 1998, pp:190-205 [Conf ] Khaled M. Khan , Jun Han , Yuliang Zheng Security Characterization of Software Components and Their Composition. [Citation Graph (0, 0)][DBLP ] TOOLS (36), 2000, pp:240-249 [Conf ] Ron Steinfeld , Yuliang Zheng On the Security of RSA with Primes Sharing Least-Significant Bits. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2004, v:15, n:3-4, pp:179-200 [Journal ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:3, pp:293-303 [Journal ] Yuliang Zheng , Thomas Hardjono , Jennifer Seberry Reusing Shares in Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Comput. J., 1994, v:37, n:3, pp:199-205 [Journal ] Thomas Hardjono , Yuliang Zheng , Jennifer Seberry Database authentication revisited. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:7, pp:573-580 [Journal ] Tim Ebringer , Peter Thorne , Yuliang Zheng Parasitic Authentication To Protect Your E-Wallet. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:10, pp:54-60 [Journal ] Xian-Mo Zhang , Yuliang Zheng Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:111-134 [Journal ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal ] Joonsang Baek , Yuliang Zheng Zheng and Seberry's public key encryption scheme revisited. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:2, n:1, pp:37-44 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal ] Yuliang Zheng On Key Agreement Protocols Based on Tamper-Proof Hardware. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:53, n:1, pp:49-54 [Journal ] Yuliang Zheng , Hideki Imai How to Construct Efficient Signcryption Schemes on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:68, n:5, pp:227-233 [Journal ] Laurence Bull , David McG. Squire , Yuliang Zheng A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:208-222 [Journal ] Yuliang Zheng , Jennifer Seberry Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:715-724 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] J. UCS, 1995, v:1, n:2, pp:136-150 [Journal ] Xian-Mo Zhang , Yuliang Zheng On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. [Citation Graph (0, 0)][DBLP ] J. UCS, 1996, v:2, n:3, pp:147-162 [Journal ] Yuliang Zheng , Xian-Mo Zhang The kth-Order Nonhomomorphicity of S-Boxes. [Citation Graph (0, 0)][DBLP ] J. UCS, 2000, v:6, n:8, pp:830-848 [Journal ] Yuliang Zheng , Xian-Mo Zhang Connections among nonlinearity, avalanche and correlation immunity. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:292, n:3, pp:697-710 [Journal ] Yuliang Zheng , Xian-Mo Zhang The Generalized XOR Lemma. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:329, n:1-3, pp:331-337 [Journal ] Yuliang Zheng , Xian-Mo Zhang , Hideki Imai Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal ] Xian-Mo Zhang , Yuliang Zheng Cryptographically resilient functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1997, v:43, n:5, pp:1740-1747 [Journal ] Yuliang Zheng , Xian-Mo Zhang On plateaued functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1215-1223 [Journal ] Xintao Wu , Yongge Wang , Songtao Guo , Yuliang Zheng Privacy Preserving Database Generation for Database Application Testing. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2007, v:78, n:4, pp:595-612 [Journal ] Joonsang Baek , Ron Steinfeld , Yuliang Zheng Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal ] Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP ] Efficient and provably secure ciphers for storage device block level encryption. [Citation Graph (, )][DBLP ] Search in 0.664secs, Finished in 0.669secs