|
Search the dblp DataBase
Daxing Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Fanyu Kong, Daxing Li
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:223-235 [Conf]
- Daxing Li, Shaohan Ma
Two Notes on Low-Density Subset Sum Algorithms. [Citation Graph (0, 0)][DBLP] ISAAC, 1994, pp:164-171 [Conf]
- Rupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li
Key-Insulated Group Signature Scheme with Selective Revocation. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1057-1063 [Conf]
- Guowen Li, Jia Yu, Rupeng Li, Daxing Li
Two Threshold Multisignature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1041-1045 [Conf]
- Rupeng Li, Jia Yu, Guowen Li, Daxing Li
A New Identity-Based Blind Signature Scheme with Batch Verifications. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1051-1056 [Conf]
- Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li
Improved generalized Atkin algorithm for computing square roots in finite fields. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2006, v:98, n:1, pp:1-5 [Journal]
- Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:52-60 [Conf]
- Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:847-857 [Conf]
- Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP] TAMC, 2007, pp:189-198 [Conf]
- Jin Wang, Xi Bai, Jia Yu, Daxing Li
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. [Citation Graph (0, 0)][DBLP] TAMC, 2007, pp:148-158 [Conf]
- Chengyu Hu, Pengtao Liu, Daxing Li
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. [Citation Graph (0, 0)][DBLP] MCAM, 2007, pp:262-266 [Conf]
An Efficient Threshold Group Signature Scheme. [Citation Graph (, )][DBLP]
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. [Citation Graph (, )][DBLP]
A Proactive Secure Multisecret Sharing Threshold Scheme. [Citation Graph (, )][DBLP]
Ring Blind Signature Scheme. [Citation Graph (, )][DBLP]
An Approach to Convert Any Threshold Signature into a Threshold Group Signature. [Citation Graph (, )][DBLP]
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. [Citation Graph (, )][DBLP]
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. [Citation Graph (, )][DBLP]
Key-Insulated Group Signature Scheme with Verifier-Local Revocation. [Citation Graph (, )][DBLP]
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. [Citation Graph (, )][DBLP]
Forward-Secure Traceable Ring Signature. [Citation Graph (, )][DBLP]
A Biometric Identity Based Signature Scheme with Convenient Verification. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|