2009 |
18 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW 4(1): 73-80 (2009) |
2008 |
17 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
ISECS 2008: 558-561 |
16 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
ISI Workshops 2008: 138-148 |
15 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
ProvSec 2008: 176-184 |
14 | EE | Jia Yu,
Fanyu Kong,
Xiangguo Cheng,
Rong Hao,
Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
ProvSec 2008: 83-97 |
13 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
WAIM 2008: 471-472 |
12 | EE | Baodong Qin,
Ming Li,
Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms.
J. Comput. Sci. Technol. 23(2): 214-221 (2008) |
11 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Dexiang Zhang,
Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM 3(7): 28-35 (2008) |
10 | EE | Jia Yu,
Fanyu Kong,
Rong Hao,
Xuliang Li,
Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM 3(7): 36-43 (2008) |
2007 |
9 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
ATC 2007: 52-60 |
8 | EE | Ming Li,
Baodong Qin,
Fanyu Kong,
Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
SNPD (2) 2007: 143-148 |
7 | EE | Jia Yu,
Fanyu Kong,
Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability.
SNPD (3) 2007: 194-199 |
6 | EE | Baodong Qin,
Ming Li,
Fanyu Kong,
Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
SNPD (3) 2007: 279-284 |
5 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Ming Li,
Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
SNPD (3) 2007: 923-926 |
4 | EE | Fanyu Kong,
Jia Yu,
Zhun Cai,
Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
TAMC 2007: 189-198 |
2006 |
3 | EE | Jia Yu,
Fanyu Kong,
Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings.
CIS 2006: 587-597 |
2 | EE | Fanyu Kong,
Zhun Cai,
Jia Yu,
Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett. 98(1): 1-5 (2006) |
2005 |
1 | EE | Fanyu Kong,
Daxing Li:
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
CANS 2005: 223-235 |