Search the dblp DataBase
Shaoquan Jiang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shaoquan Jiang Efficient Primitives from Exponentiation in Zp . [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:259-270 [Conf ] Shaoquan Jiang , Guang Gong Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:1-11 [Conf ] Shaoquan Jiang , Guang Gong A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:350-364 [Conf ] Shaoquan Jiang , Guang Gong Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:81-91 [Conf ] Shaoquan Jiang , Guang Gong Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:267-279 [Conf ] Shaoquan Jiang , Dengguo Feng , Sihan Qing Analysis and Design of E-voting Protocol. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:281-290 [Conf ] Shaoquan Jiang , Zongduo Dai , Guang Gong On interleaved sequences over finite fields. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2002, v:252, n:1-3, pp:161-178 [Journal ] Zongduo Dai , Shaoquan Jiang , Kyoki Imamura , Guang Gong Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:11, pp:2911-2915 [Journal ] Shaoquan Jiang , Zongduo Dai , Kyoki Imamura Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting kappa; symbols within one period. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:1174-1177 [Journal ] Non-interactive conference key distribution and its applications. [Citation Graph (, )][DBLP ] Deniable Authentication on the Internet. [Citation Graph (, )][DBLP ] Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP ] Corruption-Localizing Hashing. [Citation Graph (, )][DBLP ] An Efficient Deniable Key Exchange Protocol (Extended Abstract). [Citation Graph (, )][DBLP ] Optimal Secure Message Transmission by Public Discussion [Citation Graph (, )][DBLP ] Persistent Asymmetric Password-Based Key Exchange [Citation Graph (, )][DBLP ] More efficient DDH pseudorandom generators. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs