![]() | ![]() |
2007 | ||
---|---|---|
10 | EE | Muxiang Zhang: Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. INDOCRYPT 2007: 312-321 |
2005 | ||
9 | EE | Muxiang Zhang, Yuguang Fang: Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 4(2): 734-742 (2005) |
2004 | ||
8 | EE | Muxiang Zhang: Password Authenticated Key Exchange Using Quadratic Residues. ACNS 2004: 233-247 |
7 | EE | Muxiang Zhang: New Approaches to Password Authenticated Key Exchange Based on RSA. ASIACRYPT 2004: 230-244 |
6 | EE | Muxiang Zhang: Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. ISC 2004: 13-24 |
2003 | ||
5 | EE | Muxiang Zhang: Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. ICISC 2003: 166-183 |
2000 | ||
4 | EE | Muxiang Zhang, Agnes Hui Chan: Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. CRYPTO 2000: 501-514 |
3 | EE | Muxiang Zhang, Christopher Carroll, Agnes Hui Chan: The Software-Oriented Stream Cipher SSC2. FSE 2000: 31-48 |
2 | EE | Muxiang Zhang, Christopher Carroll, Agnes Hui Chan: Analysis of IS-95 CDMA Voice Privacy. Selected Areas in Cryptography 2000: 1-13 |
1 | EE | Muxiang Zhang: Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers. J. Cryptology 13(3): 301-314 (2000) |
1 | Christopher Carroll | [2] [3] |
2 | Agnes Hui Chan | [2] [3] [4] |
3 | Yuguang Fang | [9] |