2009 |
9 | EE | Da-Zhi Sun,
Jin-Peng Huai,
Ji-Zhou Sun,
Jian-Xin Li:
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards.
Computer Communications 32(6): 1015-1017 (2009) |
2007 |
8 | EE | Da-Zhi Sun:
A note on Chang-Lai's modular square algorithm based on the generalized Chinese remainder theorem.
Applied Mathematics and Computation 188(1): 411-416 (2007) |
7 | EE | Da-Zhi Sun,
Jin-Peng Huai,
Ji-Zhou Sun,
Jia-Wan Zhang:
Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm.
Applied Mathematics and Computation 190(2): 1848-1854 (2007) |
2006 |
6 | EE | Da-Zhi Sun,
Zhen-Fu Cao,
Yu Sun:
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm.
Applied Mathematics and Computation 176(1): 280-292 (2006) |
2005 |
5 | EE | Da-Zhi Sun,
Zhen-Fu Cao:
Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards.
FSKD (2) 2005: 596-599 |
4 | EE | Da-Zhi Sun,
Zhen-Fu Cao,
Yu Sun:
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Applied Mathematics and Computation 164(3): 675-678 (2005) |
3 | EE | Da-Zhi Sun,
Zhen-Fu Cao,
Yu Sun:
Remarks on a new key authentication scheme based on discrete logarithms.
Applied Mathematics and Computation 167(1): 572-575 (2005) |
2 | EE | Da-Zhi Sun,
Zhen-Fu Cao:
Improved public key authentication scheme for non-repudiation.
Applied Mathematics and Computation 168(2): 927-932 (2005) |
1 | EE | Da-Zhi Sun,
Ji-Dong Zhong,
Yu Sun:
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme.
Applied Mathematics and Computation 170(2): 1185-1193 (2005) |