Följ
Yuliang Zheng
Yuliang Zheng
Professor & Chair, Computer Science, University of Alabama at Birmingham
Verifierad e-postadress på uab.edu - Startsida
Titel
Citeras av
Citeras av
År
Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption)
Y Zheng
Advances in Cryptology—CRYPTO'97, 165-179, 1997
20951997
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
International Workshop on Public Key Cryptography, 80-98, 2002
3552002
HAVAL—a one-way hashing algorithm with variable length of output
Y Zheng, J Pieprzyk, J Seberry
Advances in Cryptology—AUSCRYPT'92, 81-104, 1992
3531992
Efficient signcryption schemes on elliptic curves
Y Zheng, H Imai
Proc. of IFIP SEC 98, 2008
351*2008
How to construct efficient signcryption schemes on elliptic curves
Y Zheng, H Imai
Information Processing Letters 68 (5), 227-233, 1998
3501998
Content extraction signatures
R Steinfeld, L Bull, Y Zheng
Information Security and Cryptology—ICISC 2001, 285-304, 2001
3252001
Signcryption and its applications in efficient public key solutions
Y Zheng
International Workshop on Information Security, 291-312, 1997
3131997
On the construction of block ciphers provably secure and not relying on any unproved hypotheses
Y Zheng, T Matsumoto, H Imai
Advances in Cryptology—CRYPTO’89 Proceedings, 461-480, 1989
2921989
GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions
K Zhang, Y Zheng
Journal of Universal Computer Science 1 (5), 320-337, 1995
2781995
Identity-based threshold decryption
J Baek, Y Zheng
Public Key Cryptography–PKC 2004, 262-276, 2004
2702004
Systems and methods for enhanced network security
Y Zheng, LCS Teo
US Patent 8,065,725, 2011
2542011
Systems and methods for enhanced network security
Y Zheng, LCS Teo
US Patent 8,065,725, 2011
2542011
Plateaued functions
Y Zheng, XM Zhang
International Conference on Information and Communications Security, 284-300, 1999
1951999
Formal proofs for the security of signcryption
J Baek, R Steinfeld, Y Zheng
Journal of cryptology 20 (2), 203-235, 2007
1832007
On constructions and nonlinearity of correlation immune functions
J Seberry, XM Zhang, Y Zheng
Advances in Cryptology—EUROCRYPT’93, 181-199, 1993
1731993
Encrypted message authentication by firewalls
C Gamage, J Leiwo, Y Zheng
International Workshop on Public Key Cryptography, 69-81, 1999
1621999
Cryptographic key backup and escrow system
Y Zheng, NK Kauer, DV Badia
US Patent 8,139,770, 2012
1542012
Cryptographic key backup and escrow system
Y Zheng, NK Kauer, DV Badia
US Patent 8,139,770, 2012
1542012
On plateaued functions
Y Zheng, XM Zhang
IEEE Transactions on Information Theory 47 (3), 1215-1223, 2001
1532001
Nonlinearly balanced boolean functions and their propagation characteristics
J Seberry, XM Zhang, Y Zheng
Advances in Cryptology—CRYPTO’93, 49-60, 1993
1521993
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20