What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuliang Zheng
Google Scholar
ORCID:
0000-0002-9815-9727
61
publications in security and cryptology related venues
Year
Venue
Title
2018
conf/asiacrypt
Security of the Blockchain Against Long Delay Attack.
Puwen Wei
Quan Yuan
Yuliang Zheng
2013
conf/acisp
Public Key Cryptography for Mobile Cloud.
Yuliang Zheng
2012
conf/icisc
New Impossible Differential Attack on SAFER + and SAFER + +.
Jingyuan Zhao
Meiqin Wang
Jiazhe Chen
Yuliang Zheng
2011
conf/acisp
A Single Key Pair is Adequate for the Zheng Signcryption.
Jia Fan
Yuliang Zheng
Xiaohu Tang
2009
conf/icics
Public Key Encryption without Random Oracle Made Truly Practical.
Puwen Wei
Xiaoyun Wang
Yuliang Zheng
2007
journals/joc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2006
conf/icisc
On Algebraic Immunity and Annihilators.
Xian-Mo Zhang
Josef Pieprzyk
Yuliang Zheng
2004
conf/pkc
Identity-Based Threshold Decryption.
Joonsang Baek
Yuliang Zheng
2003
conf/acisp
Grouping Verifiable Content for Selective Disclosure.
Laurence Bull
David McG. Squire
Jan Newmarch
Yuliang Zheng
2003
conf/ctrsa
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.
Seungjoo Kim
Masahiro Mambo
Yuliang Zheng
2002
conf/acisp
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Ron Steinfeld
Joonsang Baek
Yuliang Zheng
2002
conf/pkc
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
2002
conf/pkc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2002
conf/eurocrypt
Security Notions for Unconditionally Secure Signature Schemes.
Junji Shikata
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
2001
conf/icisc
Content Extraction Signatures.
Ron Steinfeld
Laurence Bull
Yuliang Zheng
2001
conf/pkc
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite.
Yuliang Zheng
2001
conf/ctrsa
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits.
Ron Steinfeld
Yuliang Zheng
2000
conf/acisp
High Performance Agile Crypto Modules.
Chandana Gamage
Jussipekka Leiwo
Yuliang Zheng
2000
conf/icisc
New Results on Correlation Immunity.
Yuliang Zheng
Xian-Mo Zhang
2000
conf/asiacrypt
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
2000
conf/asiacrypt
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.
Yuliang Zheng
Xian-Mo Zhang
2000
conf/sacrypt
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/icisc
Relationships between Bent Functions and Complementary Plateaued Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/icisc
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
Chandana Gamage
Jussipekka Leiwo
Yuliang Zheng
1999
conf/pkc
Encrypted Message Authentication by Firewalls.
Chandana Gamage
Jussipekka Leiwo
Yuliang Zheng
1999
conf/icics
Plateaued Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/icics
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
1999
conf/asiacrypt
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
1999
conf/asiacrypt
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Junji Shikata
Yuliang Zheng
Joe Suzuki
Hideki Imai
1999
conf/sacrypt
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.
Yuliang Zheng
Xian-Mo Zhang
1998
conf/acisp
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
1998
conf/icisc
The nonhomomorphicity of S-boxes.
Yuliang Zheng
Xian-Mo Zhang
1998
conf/pkc
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Miodrag J. Mihaljevic
Yuliang Zheng
Hideki Imai
1998
conf/sacrypt
The Nonhomomorphicity of Boolean Functions.
Xian-Mo Zhang
Yuliang Zheng
1997
conf/sec
A formal model to aid documenting and harmonizing of information security requirements.
Jussipekka Leiwo
Yuliang Zheng
1997
conf/acisp
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions.
Xian-Mo Zhang
Yuliang Zheng
1997
conf/acisp
A Method to Implement a Denial of Service Protection Base.
Jussipekka Leiwo
Yuliang Zheng
1997
conf/crypto
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption).
Yuliang Zheng
1997
conf/fc
The SPEED Cipher.
Yuliang Zheng
1997
conf/icics
Duality of Boolean functions and its cryptographic significance.
Xian-Mo Zhang
Yuliang Zheng
Hideki Imai
1996
conf/acisp
An alternative model of quantum key agreement via photon coupling.
Yi Mu
Yuliang Zheng
1996
conf/eurocrypt
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions.
Xian-Mo Zhang
Yuliang Zheng
1995
conf/eurocrypt
On Nonlinear Resilient Functions (Extended Abstract).
Xian-Mo Zhang
Yuliang Zheng
1994
journals/compsec
Database authentication revisited.
Thomas Hardjono
Yuliang Zheng
Jennifer Seberry
1994
conf/crypto
Pitfalls in Designing Substitution Boxes (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/esorics
Beacon Based Authentication.
Azad Jiwa
Jennifer Seberry
Yuliang Zheng
1994
conf/eurocrypt
How to Break and Repair Leighton and Micali's Key Agreement Protocol.
Yuliang Zheng
1994
conf/eurocrypt
Relationships Among Nonlinear Criteria (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/eurocrypt
Comments on Soviet Encryption Algorithm.
Chris Charnes
Luke O'Connor
Josef Pieprzyk
Reihaneh Safavi-Naini
Yuliang Zheng
1994
conf/asiacrypt
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/ccs
Systematic Generation of Cryptographically Robust S-Boxes.
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/crypto
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/eurocrypt
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1992
conf/crypto
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
Yuliang Zheng
Jennifer Seberry
1992
conf/asiacrypt
A Practical Digital Multisignature Scheme Based on Discrete Logarithms.
Thomas Hardjono
Yuliang Zheng
1992
conf/asiacrypt
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
Yuliang Zheng
Josef Pieprzyk
Jennifer Seberry
1991
conf/asiacrypt
Sibling Intractable Function Families and Their Applications (Extended Abstract).
Yuliang Zheng
Thomas Hardjono
Josef Pieprzyk
1991
conf/asiacrypt
How to Construct A Family of Strong One Way Permutations.
Babak Sadeghiyan
Yuliang Zheng
Josef Pieprzyk
1990
conf/crypto
Structural Properties of One-way Hash Functions.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1989
conf/crypto
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1989
conf/eurocrypt
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
Coauthors
Azad Jiwa
(1)
Babak Sadeghiyan
(1)
Chandana Gamage
(3)
Chris Charnes
(1)
David McG. Squire
(1)
Goichiro Hanaoka
(6)
Hideki Imai
(12)
Jan Newmarch
(1)
Jennifer Seberry
(10)
Jia Fan
(1)
Jiazhe Chen
(1)
Jingyuan Zhao
(1)
Joe Suzuki
(1)
Joonsang Baek
(4)
Josef Pieprzyk
(5)
Junji Shikata
(4)
Jussipekka Leiwo
(5)
Laurence Bull
(2)
Luke O'Connor
(1)
Masahiro Mambo
(1)
Meiqin Wang
(1)
Miodrag J. Mihaljevic
(1)
Puwen Wei
(2)
Quan Yuan
(1)
Reihaneh Safavi-Naini
(1)
Ron Steinfeld
(5)
Seungjoo Kim
(1)
Thomas Hardjono
(3)
Tsutomu Matsumoto
(3)
Tsuyoshi Nishioka
(2)
Xian-Mo Zhang
(19)
Xiaohu Tang
(1)
Xiaoyun Wang
(1)
Yi Mu
(1)
Yuliang Zheng
(61)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to