Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption) Y Zheng Advances in Cryptology—CRYPTO'97, 165-179, 1997 | 2090 | 1997 |
Formal proofs for the security of signcryption J Baek, R Steinfeld, Y Zheng International Workshop on Public Key Cryptography, 80-98, 2002 | 358 | 2002 |
HAVAL—a one-way hashing algorithm with variable length of output Y Zheng, J Pieprzyk, J Seberry Advances in Cryptology—AUSCRYPT'92, 81-104, 1992 | 353 | 1992 |
Efficient signcryption schemes on elliptic curves Y Zheng, H Imai Proc. of IFIP SEC 98, 2008 | 351* | 2008 |
How to construct efficient signcryption schemes on elliptic curves Y Zheng, H Imai Information Processing Letters 68 (5), 227-233, 1998 | 350 | 1998 |
Content extraction signatures R Steinfeld, L Bull, Y Zheng Information Security and Cryptology—ICISC 2001, 285-304, 2001 | 322 | 2001 |
Signcryption and its applications in efficient public key solutions Y Zheng International Workshop on Information Security, 291-312, 1997 | 311 | 1997 |
On the construction of block ciphers provably secure and not relying on any unproved hypotheses Y Zheng, T Matsumoto, H Imai Advances in Cryptology—CRYPTO’89 Proceedings, 461-480, 1989 | 286 | 1989 |
GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions K Zhang, Y Zheng Journal of Universal Computer Science 1 (5), 320-337, 1995 | 283 | 1995 |
Identity-based threshold decryption J Baek, Y Zheng Public Key Cryptography–PKC 2004, 262-276, 2004 | 268 | 2004 |
Systems and methods for enhanced network security Y Zheng, LCS Teo US Patent 8,065,725, 2011 | 252 | 2011 |
Systems and methods for enhanced network security Y Zheng, LCS Teo US Patent 8,065,725, 2011 | 252 | 2011 |
Plateaued functions Y Zheng, XM Zhang International Conference on Information and Communications Security, 284-300, 1999 | 194 | 1999 |
Formal proofs for the security of signcryption J Baek, R Steinfeld, Y Zheng Journal of cryptology 20 (2), 203-235, 2007 | 177 | 2007 |
On constructions and nonlinearity of correlation immune functions J Seberry, XM Zhang, Y Zheng Advances in Cryptology—EUROCRYPT’93, 181-199, 1993 | 174 | 1993 |
Encrypted message authentication by firewalls C Gamage, J Leiwo, Y Zheng International Workshop on Public Key Cryptography, 69-81, 1999 | 162 | 1999 |
Cryptographic key backup and escrow system Y Zheng, NK Kauer, DV Badia US Patent 8,139,770, 2012 | 152 | 2012 |
Cryptographic key backup and escrow system Y Zheng, NK Kauer, DV Badia US Patent 8,139,770, 2012 | 152 | 2012 |
On plateaued functions Y Zheng, XM Zhang IEEE Transactions on Information Theory 47 (3), 1215-1223, 2001 | 152 | 2001 |
Nonlinearly balanced boolean functions and their propagation characteristics J Seberry, XM Zhang, Y Zheng Advances in Cryptology—CRYPTO’93, 49-60, 1993 | 152 | 1993 |