The SCEAS System
Navigation Menu

Search the dblp DataBase


Fanyu Kong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fanyu Kong, Daxing Li
    A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:223-235 [Conf]
  2. Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li
    Improved generalized Atkin algorithm for computing square roots in finite fields. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:98, n:1, pp:1-5 [Journal]
  3. Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
    Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:52-60 [Conf]
  4. Jia Yu, Fanyu Kong, Rong Hao
    Forward Secure Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:587-597 [Conf]
  5. Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li
    New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:189-198 [Conf]

  6. How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. [Citation Graph (, )][DBLP]

  7. Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. [Citation Graph (, )][DBLP]

  8. Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. [Citation Graph (, )][DBLP]

  9. Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]

  10. Publicly Verifiable Secret Sharing with Enrollment Ability. [Citation Graph (, )][DBLP]

  11. A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. [Citation Graph (, )][DBLP]

  12. Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. [Citation Graph (, )][DBLP]

  13. Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. [Citation Graph (, )][DBLP]

  14. Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. [Citation Graph (, )][DBLP]

  15. Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002