dblp.uni-trier.dewww.uni-trier.de

Fanyu Kong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
18EEJia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao: A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. JSW 4(1): 73-80 (2009)
2008
17EEJia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang: Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ISECS 2008: 558-561
16EEJia Yu, Fanyu Kong, Rong Hao, Xuliang Li: How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ISI Workshops 2008: 138-148
15EEJia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li: Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184
14EEJia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li: Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97
13EEJia Yu, Fanyu Kong, Rong Hao, Zhen Cheng: A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. WAIM 2008: 471-472
12EEBaodong Qin, Ming Li, Fanyu Kong: Cryptanalysis of a Type of CRT-Based RSA Algorithms. J. Comput. Sci. Technol. 23(2): 214-221 (2008)
11EEJia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li: How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. JCM 3(7): 28-35 (2008)
10EEJia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li: Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. JCM 3(7): 36-43 (2008)
2007
9EEFanyu Kong, Jia Yu, Baodong Qin, Daxing Li: Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60
8EEMing Li, Baodong Qin, Fanyu Kong, Daxing Li: Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. SNPD (2) 2007: 143-148
7EEJia Yu, Fanyu Kong, Rong Hao: Publicly Verifiable Secret Sharing with Enrollment Ability. SNPD (3) 2007: 194-199
6EEBaodong Qin, Ming Li, Fanyu Kong, Daxing Li: Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. SNPD (3) 2007: 279-284
5EEFanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li: Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926
4EEFanyu Kong, Jia Yu, Zhun Cai, Daxing Li: New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. TAMC 2007: 189-198
2006
3EEJia Yu, Fanyu Kong, Rong Hao: Forward Secure Threshold Signature Scheme from Bilinear Pairings. CIS 2006: 587-597
2EEFanyu Kong, Zhun Cai, Jia Yu, Daxing Li: Improved generalized Atkin algorithm for computing square roots in finite fields. Inf. Process. Lett. 98(1): 1-5 (2006)
2005
1EEFanyu Kong, Daxing Li: A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. CANS 2005: 223-235

Coauthor Index

1Zhun Cai [2] [4]
2Xiangguo Cheng [14] [15] [18]
3Zhen Cheng [13]
4Rong Hao [3] [7] [10] [11] [13] [14] [15] [16] [17] [18]
5Daxing Li [1] [2] [4] [5] [6] [8] [9]
6Guowen Li [10] [11] [14] [15]
7Ming Li [5] [6] [8] [12]
8Xuliang Li [10] [16]
9Baodong Qin [5] [6] [8] [9] [12]
10Jia Yu [2] [3] [4] [5] [7] [9] [10] [11] [13] [14] [15] [16] [17] [18]
11Dexiang Zhang [11] [17]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)