| 2007 |
| 22 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
ATC 2007: 52-60 |
| 21 | EE | Xiaodong Liu,
Quan Miao,
Daxing Li:
A Biometric Identity Based Signature Scheme with Convenient Verification.
FGCN (1) 2007: 114-117 |
| 20 | | Chengyu Hu,
Daxing Li:
An Efficient Threshold Group Signature Scheme.
IMECS 2007: 338-340 |
| 19 | EE | Chengyu Hu,
Pengtao Liu,
Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
MCAM 2007: 262-266 |
| 18 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
Two Threshold Multisignature Schemes from Bilinear Pairings.
MUE 2007: 1041-1045 |
| 17 | EE | Rupeng Li,
Jia Yu,
Guowen Li,
Daxing Li:
A New Identity-Based Blind Signature Scheme with Batch Verifications.
MUE 2007: 1051-1056 |
| 16 | EE | Rupeng Li,
Xianghua Du,
Guowen Li,
Jia Yu,
Daxing Li:
Key-Insulated Group Signature Scheme with Selective Revocation.
MUE 2007: 1057-1063 |
| 15 | EE | Feng Li,
Jianwei Shang,
Daxing Li:
A Proactive Secure Multisecret Sharing Threshold Scheme.
SNPD (1) 2007: 105-110 |
| 14 | EE | Chengyu Hu,
Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity.
SNPD (1) 2007: 866-868 |
| 13 | EE | Chengyu Hu,
Daxing Li:
Ring Blind Signature Scheme.
SNPD (1) 2007: 869-871 |
| 12 | EE | Ming Li,
Baodong Qin,
Fanyu Kong,
Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves.
SNPD (2) 2007: 143-148 |
| 11 | EE | Guowen Li,
Jia Yu,
Rupeng Li,
Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
SNPD (2) 2007: 723-726 |
| 10 | EE | Chengyu Hu,
Daxing Li:
Forward-Secure Traceable Ring Signature.
SNPD (3) 2007: 200-204 |
| 9 | EE | Rupeng Li,
Jia Yu,
Jin Wang,
Guowen Li,
Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
SNPD (3) 2007: 273-278 |
| 8 | EE | Baodong Qin,
Ming Li,
Fanyu Kong,
Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication.
SNPD (3) 2007: 279-284 |
| 7 | EE | Fanyu Kong,
Jia Yu,
Baodong Qin,
Ming Li,
Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
SNPD (3) 2007: 923-926 |
| 6 | EE | Jin Wang,
Xi Bai,
Jia Yu,
Daxing Li:
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
TAMC 2007: 148-158 |
| 5 | EE | Fanyu Kong,
Jia Yu,
Zhun Cai,
Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
TAMC 2007: 189-198 |
| 2006 |
| 4 | EE | Jin Wang,
Jia Yu,
Daxing Li,
Xi Bai,
Zhongtian Jia:
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
CIS 2006: 847-857 |
| 3 | EE | Fanyu Kong,
Zhun Cai,
Jia Yu,
Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett. 98(1): 1-5 (2006) |
| 2005 |
| 2 | EE | Fanyu Kong,
Daxing Li:
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems.
CANS 2005: 223-235 |
| 1994 |
| 1 | | Daxing Li,
Shaohan Ma:
Two Notes on Low-Density Subset Sum Algorithms.
ISAAC 1994: 164-171 |