


default search action
Yuliang Zheng 0001
Person information
- affiliation: University of Alabama at Birmingham, AB, USA
- affiliation (former): University of North Carolina at Charlotte, NC, USA
- affiliation (former): Monash University, Melbourne, VIC, Australia
- affiliation (former): University of Wollongong , NSW, Australia
Other persons with the same name
- Yuliang Zheng 0002 — TU Darmstadt, Institute for Microwave Engineering and Photonics, Germany
- Yuliang Zheng 0003 — Guangdong University of Technology, School of Computer Science and Technology, Guangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c100]Shawn C. Adams, Yuliang Zheng
:
A Blockchain Design Supporting Verifiable Reputation-based Selection of Committee Members and IPFS for Storage. ICSA-C 2023: 200-208 - 2021
- [c99]Shawn C. Adams, Yuliang Zheng
:
FAWAC: An Attack-Resistant, Multi-Enclave Distributed Ledger Architecture. BRAINS 2021: 35-36 - 2020
- [c98]Ragib Hasan
, Yuliang Zheng
, Jeffery T. Walker:
Digital Forensics Education Modules for Judicial Officials. NCS 2020: 46-60
2010 – 2019
- 2018
- [c97]Puwen Wei, Quan Yuan
, Yuliang Zheng
:
Security of the Blockchain Against Long Delay Attack. ASIACRYPT (3) 2018: 250-275 - [i9]Puwen Wei, Quan Yuan, Yuliang Zheng:
Security of the Blockchain against Long Delay Attack. IACR Cryptol. ePrint Arch. 2018: 800 (2018) - 2015
- [j36]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen
, Yuliang Zheng
:
New Impossible Differential Attack on SAFER Block Cipher Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 843-852 (2015) - [j35]Puwen Wei, Yuliang Zheng
:
On the Construction of Public Key Encryption with Sender Recovery. Int. J. Found. Comput. Sci. 26(1): 1-32 (2015) - [j34]Graham Enos, Yuliang Zheng
:
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. Inf. Process. Lett. 115(2): 128-133 (2015) - 2014
- [j33]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
A New Construction of Identity-Based Signcryption without Random Oracles. Int. J. Found. Comput. Sci. 25(1): 1-24 (2014) - [c96]Puwen Wei, Yuliang Zheng
, Wei Wang:
Multi-recipient Encryption in Heterogeneous Setting. ISPEC 2014: 462-480 - 2013
- [j32]Jia Fan, Yuliang Zheng, Xiaohu Tang:
Key-Insulated Signcryption. J. Univers. Comput. Sci. 19(10): 1351-1374 (2013) - [c95]Yuliang Zheng:
Public Key Cryptography for Mobile Cloud. ACISP 2013: 435 - 2012
- [j31]Puwen Wei, Xiaoyun Wang, Yuliang Zheng
:
Public key encryption without random oracle made truly practical. Comput. Electr. Eng. 38(4): 975-985 (2012) - [c94]Puwen Wei, Yuliang Zheng
, Xiaoyun Wang:
Public Key Encryption for the Forgetful. Cryptography and Security 2012: 185-206 - [c93]Puwen Wei, Yuliang Zheng
:
Efficient Public Key Encryption Admitting Decryption by Sender. EuroPKI 2012: 37-52 - [c92]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen
, Yuliang Zheng
:
New Impossible Differential Attack on SAFER + and SAFER + +. ICISC 2012: 170-183 - [i8]Graham Enos, Yuliang Zheng:
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. IACR Cryptol. ePrint Arch. 2012: 528 (2012) - [i7]Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng:
New Impossible Differential Attack on SAFER+ and SAFER++. IACR Cryptol. ePrint Arch. 2012: 715 (2012) - 2011
- [c91]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
A Single Key Pair is Adequate for the Zheng Signcryption. ACISP 2011: 371-388 - [i6]Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. IACR Cryptol. ePrint Arch. 2011: 197 (2011) - 2010
- [j30]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
Signcryption with Non-interactive Non-repudiation without Random Oracles. Trans. Comput. Sci. 10: 202-230 (2010) - [p2]Yuliang Zheng
:
Introduction. Practical Signcryption 2010: 1-18 - [e8]Alexander W. Dent, Yuliang Zheng:
Practical Signcryption. Information Security and Cryptography, Springer 2010, ISBN 978-3-540-89409-4 [contents] - [i5]Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng:
Skew-Frobenius map on twisted Edwards curve. IACR Cryptol. ePrint Arch. 2010: 5 (2010)
2000 – 2009
- 2009
- [c90]Puwen Wei, Xiaoyun Wang, Yuliang Zheng
:
Public Key Encryption without Random Oracle Made Truly Practical. ICICS 2009: 107-120 - [p1]Yuliang Zheng:
Coded Modulation and the Arrival of Signcryption. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 17-27 - [i4]Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng:
Optimal pairing revisited. IACR Cryptol. ePrint Arch. 2009: 564 (2009) - 2008
- [j29]Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng
:
Introduction to the Special Issue on Information Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2405-2407 (2008) - 2007
- [j28]Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng:
Privacy Preserving Database Generation for Database Application Testing. Fundam. Informaticae 78(4): 595-612 (2007) - [j27]Joonsang Baek
, Ron Steinfeld, Yuliang Zheng
:
Formal Proofs for the Security of Signcryption. J. Cryptol. 20(2): 203-235 (2007) - 2006
- [c89]Xian-Mo Zhang, Josef Pieprzyk
, Yuliang Zheng
:
On Algebraic Immunity and Annihilators. ICISC 2006: 65-80 - 2005
- [c88]Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
:
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services. ICWE 2005: 191-196 - [c87]Xintao Wu
, Chintan Sanghvi, Yongge Wang
, Yuliang Zheng
:
Privacy Aware Data Generation for Testing Database Applications. IDEAS 2005: 317-326 - [c86]Zhaoyu Liu, Dichao Peng, Yuliang Zheng
, Jeffrey Liu:
Communication Protection in IP-based Video Surveillance Systems. ISM 2005: 69-78 - [c85]Xintao Wu
, Yongge Wang
, Yuliang Zheng
:
Statistical Database Modeling for Privacy Preserving Database Generation. ISMIS 2005: 382-390 - [c84]Yuliang Zheng
:
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks. MADNES 2005: 117 - [c83]Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
:
Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 - [c82]Yuliang Zheng
, Yongge Wang
:
Efficient and provably secure ciphers for storage device block level encryption. StorageSS 2005: 103-107 - [i3]Neil Kauer, Tony Suarez, Yuliang Zheng:
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms. IACR Cryptol. ePrint Arch. 2005: 397 (2005) - 2004
- [j26]Ron Steinfeld, Yuliang Zheng
:
On the Security of RSA with Primes Sharing Least-Significant Bits. Appl. Algebra Eng. Commun. Comput. 15(3-4): 179-200 (2004) - [j25]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 120-130 (2004) - [j24]Laurence Bull, David McG. Squire
, Yuliang Zheng
:
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. Int. J. Digit. Libr. 4(3): 208-222 (2004) - [j23]Yuliang Zheng
, Xian-Mo Zhang:
The Generalized XOR Lemma. Theor. Comput. Sci. 329(1-3): 331-337 (2004) - [c81]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. ITCC (1) 2004: 124-128 - [c80]Gautam Singaraju, Lawrence Teo, Yuliang Zheng
:
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic. IWIA 2004: 79-96 - [c79]Joonsang Baek, Yuliang Zheng
:
Identity-Based Threshold Decryption. Public Key Cryptography 2004: 262-276 - [c78]Yongge Wang
, Xintao Wu
, Yuliang Zheng
:
Privacy Preserving Data Generation for Database Application Performance Testing. TrustBus 2004: 142-151 - [e7]Kan Zhang, Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3225, Springer 2004, ISBN 3-540-23208-7 [contents] - 2003
- [j22]Joonsang Baek, Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited. Int. J. Inf. Sec. 2(1): 37-44 (2003) - [j21]Yuliang Zheng
, Xian-Mo Zhang:
Connections among nonlinearity, avalanche and correlation immunity. Theor. Comput. Sci. 292(3): 697-710 (2003) - [c77]Laurence Bull, David McG. Squire
, Jan Newmarch, Yuliang Zheng
:
Grouping Verifiable Content for Selective Disclosure. ACISP 2003: 1-12 - [c76]Seungjoo Kim
, Masahiro Mambo, Yuliang Zheng
:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243 - [c75]Joonsang Baek, Yuliang Zheng:
Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group. GLOBECOM 2003: 1491-1495 - [c74]Yongge Wang, Yuliang Zheng, Bei-tseng Chu:
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems. IC-AI 2003: 17-22 - [c73]Lawrence Teo, Yuliang Zheng
, Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection. IWIA 2003: 73-88 - [c72]Lawrence Teo, Gail-Joon Ahn
, Yuliang Zheng
:
Dynamic and risk-aware network access management. SACMAT 2003: 217-230 - [c71]Yongge Wang
, Yuliang Zheng
:
Fast and Secure Magnetic WORM Storage Systems. IEEE Security in Storage Workshop 2003: 11-19 - [c70]Xintao Wu
, Yongge Wang
, Yuliang Zheng
:
Privacy preserving database application testing. WPES 2003: 118-128 - [i2]Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. IACR Cryptol. ePrint Arch. 2003: 164 (2003) - 2002
- [j20]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng
, Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) - [j19]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
A Traitor Traceable Conference System with Dynamic Sender. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 167-174 (2002) - [c69]Ron Steinfeld, Joonsang Baek
, Yuliang Zheng
:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ACISP 2002: 241-256 - [c68]Junji Shikata, Goichiro Hanaoka, Yuliang Zheng
, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 - [c67]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng
, Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 - [c66]Joonsang Baek
, Ron Steinfeld, Yuliang Zheng
:
Formal Proofs for the Security of Signcryption. Public Key Cryptography 2002: 80-98 - [e6]Yuliang Zheng
:
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Lecture Notes in Computer Science 2501, Springer 2002, ISBN 3-540-00171-9 [contents] - [i1]Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. IACR Cryptol. ePrint Arch. 2002: 16 (2002) - 2001
- [j18]Yuliang Zheng
, Xian-Mo Zhang:
On plateaued functions. IEEE Trans. Inf. Theory 47(3): 1215-1223 (2001) - [c65]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126 - [c64]Ron Steinfeld, Yuliang Zheng
:
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. CT-RSA 2001: 52-62 - [c63]Ron Steinfeld, Laurence Bull, Yuliang Zheng
:
Content Extraction Signatures. ICISC 2001: 285-304 - [c62]Seungjoo Kim
, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMACC 2001: 114-127 - [c61]Yuliang Zheng
:
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Public Key Cryptography 2001: 48-63 - 2000
- [j17]Tim Ebringer, Peter Thorne, Yuliang Zheng
:
Parasitic Authentication To Protect Your E-Wallet. Computer 33(10): 54-60 (2000) - [j16]Xian-Mo Zhang, Yuliang Zheng
, Hideki Imai:
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. Des. Codes Cryptogr. 19(1): 45-63 (2000) - [j15]Yuliang Zheng, Xian-Mo Zhang:
The kth-Order Nonhomomorphicity of S-Boxes. J. Univers. Comput. Sci. 6(8): 830-848 (2000) - [c60]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
:
High Performance Agile Crypto Modules. ACISP 2000: 74-88 - [c59]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng
, Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 - [c58]Yuliang Zheng
, Xian-Mo Zhang:
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. ASIACRYPT 2000: 470-482 - [c57]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12 - [c56]Tim Ebringer, Yuliang Zheng, Peter Thorne:
Parasitic Authentication. CARDIS 2000: 307-326 - [c55]Yuliang Zheng
, Xian-Mo Zhang:
New Results on Correlation Immunity. ICISC 2000: 49-63 - [c54]Sung-Ming Yen, Yuliang Zheng:
Weighted One-Way Hash Chain and Its Applications. ISW 2000: 135-148 - [c53]Ron Steinfeld, Yuliang Zheng
:
A Signcryption Scheme Based on Integer Factorization. ISW 2000: 308-322 - [c52]Yuliang Zheng
, Xian-Mo Zhang:
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. Selected Areas in Cryptography 2000: 262-274 - [c51]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249 - [e5]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Lecture Notes in Computer Science 1751, Springer 2000, ISBN 3-540-66967-1 [contents]
1990 – 1999
- 1999
- [j14]Yuliang Zheng
, Xian-Mo Zhang, Hideki Imai:
Restriction, Terms and Nonlinearity of Boolean Functions. Theor. Comput. Sci. 226(1-2): 207-223 (1999) - [c50]Jussipekka Leiwo, Chandana Gamage, Yuliang Zheng
:
Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260 - [c49]Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102 - [c48]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 - [c47]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng
, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 - [c46]Yuliang Zheng, Xian-Mo Zhang:
Plateaued Functions. ICICS 1999: 284-300 - [c45]Yuliang Zheng
, Xian-Mo Zhang:
Relationships between Bent Functions and Complementary Plateaued Functions. ICISC 1999: 60-75 - [c44]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. ICISC 1999: 120-131 - [c43]Khaled M. Khan
, Jun Han, Yuliang Zheng
:
Security Properties of Software Components. ISW 1999: 52-56 - [c42]Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
:
Digital Watermarking Robust Against JPEG Compression. ISW 1999: 167-190 - [c41]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
:
Encrypted Message Authentication by Firewalls. Public Key Cryptography 1999: 69-81 - [c40]Yuliang Zheng
, Xian-Mo Zhang:
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. Selected Areas in Cryptography 1999: 92-105 - [e4]Masahiro Mambo, Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings. Lecture Notes in Computer Science 1729, Springer 1999, ISBN 3-540-66695-8 [contents] - [e3]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Lecture Notes in Computer Science 1560, Springer 1999, ISBN 3-540-65644-8 [contents] - 1998
- [j13]Yuliang Zheng
, Hideki Imai:
How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68(5): 227-233 (1998) - [c39]Goichiro Hanaoka, Yuliang Zheng
, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226 - [c38]Yuliang Zheng, Xian-Mo Zhang:
The nonhomomorphicity of S-boxes. ICISC 1998: 131-145 - [c37]Yuliang Zheng, Hideki Imai:
Compact and Unforgeable Key Establishment over an ATM Network. INFOCOM 1998: 411-418 - [c36]Miodrag J. Mihaljevic, Yuliang Zheng
, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233 - [c35]Xian-Mo Zhang, Yuliang Zheng
:
The Nonhomomorphicity of Boolean Functions. Selected Areas in Cryptography 1998: 280-295 - [c34]Kanta Matsuura
, Yuliang Zheng
, Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205 - [e2]Hideki Imai, Yuliang Zheng
:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Lecture Notes in Computer Science 1431, Springer 1998, ISBN 3-540-64693-0 [contents] - 1997
- [j12]Xian-Mo Zhang, Yuliang Zheng
:
Cryptographically resilient functions. IEEE Trans. Inf. Theory 43(5): 1740-1747 (1997) - [c33]Jussipekka Leiwo, Yuliang Zheng
:
A Method to Implement a Denial of Service Protection Base. ACISP 1997: 90-101 - [c32]Xian-Mo Zhang, Yuliang Zheng
:
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. ACISP 1997: 147-158 - [c31]Yuliang Zheng:
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). CRYPTO 1997: 165-179 - [c30]Yuliang Zheng
:
The SPEED Cipher. Financial Cryptography 1997: 71-90 - [c29]Xian-Mo Zhang, Yuliang Zheng, Hideki Imai:
Duality of Boolean functions and its cryptographic significance. ICICS 1997: 159-169 - [c28]Jussipekka Leiwo, Yuliang Zheng
:
A Framework for the Management of Information Security. ISW 1997: 232-245 - [c27]Yuliang Zheng:
Signcryption and Its Applications in Efficient Public Key Solutions. ISW 1997: 291-312 - [c26]Jussipekka Leiwo, Yuliang Zheng:
Layered Protection of Availability. PACIS 1997: 84 - [c25]Jussipekka Leiwo, Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38 - 1996
- [j11]Xian-Mo Zhang, Yuliang Zheng:
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. Des. Codes Cryptogr. 7(1-2): 111-134 (1996) - [j10]Xian-Mo Zhang, Yuliang Zheng:
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. J. Univers. Comput. Sci. 2(3): 147-162 (1996) - [c24]Yi Mu, Yuliang Zheng
:
An alternative model of quantum key agreement via photon coupling. ACISP 1996: 320-331 - [c23]Xian-Mo Zhang, Yuliang Zheng
:
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. EUROCRYPT 1996: 294-306 - [c22]Yuliang Zheng:
An Authentication and Security Protocol for Mobile Computing. IFIP World Conference on Mobile Communications 1996: 249-257 - [c21]Kouichi Sakurai, Yuliang Zheng
:
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385 - 1995
- [j9]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
Nonlinearity and Propagation Characteristics of Balanced Boolean Functions. Inf. Comput. 119(1): 1-13 (1995) - [j8]Yuliang Zheng
:
On Key Agreement Protocols Based on Tamper-Proof Hardware. Inf. Process. Lett. 53(1): 49-54 (1995) - [j7]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. J. Univers. Comput. Sci. 1(2): 136-150 (1995) - [j6]Xian-Mo Zhang, Yuliang Zheng:
GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions. J. Univers. Comput. Sci. 1(5): 320-337 (1995) - [c20]Xian-Mo Zhang, Yuliang Zheng
:
On Nonlinear Resilient Functions (Extended Abstract). EUROCRYPT 1995: 274-288 - 1994
- [j5]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Cryptographic Boolean functions via group Hadamard matrices. Australas. J Comb. 10: 131-146 (1994) - [j4]Yuliang Zheng
, Thomas Hardjono, Jennifer Seberry:
Reusing Shares in Secret Sharing Schemes. Comput. J. 37(3): 199-205 (1994) - [j3]Thomas Hardjono, Yuliang Zheng
, Jennifer Seberry:
Database authentication revisited. Comput. Secur. 13(7): 573-580 (1994) - [j2]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
Improving the Strict Avalanche Characteristics of Cryptographic Functions. Inf. Process. Lett. 50(1): 37-41 (1994) - [c19]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). ASIACRYPT 1994: 119-132 - [c18]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
Pitfalls in Designing Substitution Boxes (Extended Abstract). CRYPTO 1994: 383-396 - [c17]Azad Jiwa, Jennifer Seberry, Yuliang Zheng:
Beacon Based Authentication. ESORICS 1994: 125-141 - [c16]Yuliang Zheng
:
How to Break and Repair Leighton and Micali's Key Agreement Protocol. EUROCRYPT 1994: 299-305 - [c15]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
Relationships Among Nonlinear Criteria (Extended Abstract). EUROCRYPT 1994: 376-388 - [c14]Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng:
Comments on Soviet Encryption Algorithm. EUROCRYPT 1994: 433-438 - [c13]Thomas Hardjono, Yuliang Zheng, Jennifer Seberry:
Kuperee: An Approach to Authentication using Public Keys. ULPAA 1994: 65-76 - 1993
- [j1]Yuliang Zheng
, Jennifer Seberry:
Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks. IEEE J. Sel. Areas Commun. 11(5): 715-724 (1993) - [c12]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng:
Systematic Generation of Cryptographically Robust S-Boxes. CCS 1993: 171-182 - [c11]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). CRYPTO 1993: 49-60 - [c10]Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
:
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). EUROCRYPT 1993: 181-199 - [e1]Jennifer Seberry, Yuliang Zheng:
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings. Lecture Notes in Computer Science 718, Springer 1993, ISBN 3-540-57220-1 [contents] - 1992
- [c9]Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry:
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. AUSCRYPT 1992: 83-104 - [c8]Thomas Hardjono, Yuliang Zheng
:
A Practical Digital Multisignature Scheme Based on Discrete Logarithms. AUSCRYPT 1992: 122-132 - [c7]Yuliang Zheng
, Jennifer Seberry:
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract). CRYPTO 1992: 292-304 - 1991
- [c6]Babak Sadeghiyan, Yuliang Zheng
, Josef Pieprzyk
:
How to Construct A Family of Strong One Way Permutations. ASIACRYPT 1991: 97-110 - [c5]Yuliang Zheng
, Thomas Hardjono, Josef Pieprzyk
:
Sibling Intractable Function Families and Their Applications (Extended Abstract). ASIACRYPT 1991: 124-138 - 1990
- [c4]Yuliang Zheng
, Tsutomu Matsumoto, Hideki Imai:
Duality between Two Cryptographic Primitives. AAECC 1990: 379-390 - [c3]Yuliang Zheng
, Tsutomu Matsumoto, Hideki Imai:
Structural Properties of One-way Hash Functions. CRYPTO 1990: 285-302
1980 – 1989
- 1989
- [c2]Yuliang Zheng
, Tsutomu Matsumoto, Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. CRYPTO 1989: 461-480 - [c1]Yuliang Zheng
, Tsutomu Matsumoto, Hideki Imai:
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). EUROCRYPT 1989: 412-422
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint