![]() | ![]() |
2006 | ||
---|---|---|
5 | EE | Da-Zhi Sun, Zhen-Fu Cao, Yu Sun: How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. Applied Mathematics and Computation 176(1): 280-292 (2006) |
2005 | ||
4 | EE | Da-Zhi Sun, Zhen-Fu Cao: Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards. FSKD (2) 2005: 596-599 |
3 | EE | Da-Zhi Sun, Zhen-Fu Cao, Yu Sun: Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme. Applied Mathematics and Computation 164(3): 675-678 (2005) |
2 | EE | Da-Zhi Sun, Zhen-Fu Cao, Yu Sun: Remarks on a new key authentication scheme based on discrete logarithms. Applied Mathematics and Computation 167(1): 572-575 (2005) |
1 | EE | Da-Zhi Sun, Zhen-Fu Cao: Improved public key authentication scheme for non-repudiation. Applied Mathematics and Computation 168(2): 927-932 (2005) |
1 | Da-Zhi Sun | [1] [2] [3] [4] [5] |
2 | Yu Sun | [2] [3] [5] |