2008 |
9 | EE | Lihua Liu,
Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme.
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 181-187 |
8 | EE | Zhengjun Cao,
Mulan Liu:
Classification of signature-only signature models.
Science in China Series F: Information Sciences 51(8): 1083-1095 (2008) |
2007 |
7 | EE | Zhengjun Cao,
Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited.
ICICS 2007: 230-238 |
6 | EE | Zhengjun Cao,
Lihua Liu:
A Strong RSA Signature Scheme and Its Application.
SNPD (1) 2007: 111-115 |
2006 |
5 | EE | Zhengjun Cao:
Analysis of One Popular Group Signature Scheme.
ASIACRYPT 2006: 460-466 |
4 | EE | Haeryong Park,
Zhengjun Cao,
Lihua Liu,
Seongan Lim,
Ikkwon Yie,
Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Inscrypt 2006: 1-12 |
3 | EE | Lihua Liu,
Zhengjun Cao:
On computing ordN(2) and its application.
Inf. Comput. 204(7): 1173-1178 (2006) |
2005 |
2 | EE | Sherman S. M. Chow,
Zhengjun Cao,
Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
CISC 2005: 290-301 |
2004 |
1 | EE | Wen Song,
Zhengjun Cao:
The generalized decomposition theorem in Banach spaces and its applications.
Journal of Approximation Theory 129(2): 167-181 (2004) |