2008 |
120 | EE | Hideki Imai,
Goichiro Hanaoka,
Ueli M. Maurer,
Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security.
IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) |
2007 |
119 | EE | Xintao Wu,
Yongge Wang,
Songtao Guo,
Yuliang Zheng:
Privacy Preserving Database Generation for Database Application Testing.
Fundam. Inform. 78(4): 595-612 (2007) |
118 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
J. Cryptology 20(2): 203-235 (2007) |
2006 |
117 | EE | Xian-Mo Zhang,
Josef Pieprzyk,
Yuliang Zheng:
On Algebraic Immunity and Annihilators.
ICISC 2006: 65-80 |
2005 |
116 | EE | Namje Park,
Kiyoung Moon,
Kyoil Chung,
Dongho Won,
Yuliang Zheng:
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services.
ICWE 2005: 191-196 |
115 | EE | Xintao Wu,
Chintan Sanghvi,
Yongge Wang,
Yuliang Zheng:
Privacy Aware Data Generation for Testing Database Applications.
IDEAS 2005: 317-326 |
114 | EE | Zhaoyu Liu,
Dichao Peng,
Yuliang Zheng,
Jeffrey Liu:
Communication Protection in IP-based Video Surveillance Systems.
ISM 2005: 69-78 |
113 | EE | Xintao Wu,
Yongge Wang,
Yuliang Zheng:
Statistical Database Modeling for Privacy Preserving Database Generation.
ISMIS 2005: 382-390 |
112 | EE | Yuliang Zheng:
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks.
MADNES 2005: 117 |
111 | EE | Mike Burmester,
Virgil D. Gligor,
Evangelos Kranakis,
J. D. Tygar,
Yuliang Zheng:
Panel: Authentication in Constrained Environments.
MADNES 2005: 186-191 |
110 | EE | Yuliang Zheng,
Yongge Wang:
Efficient and provably secure ciphers for storage device block level encryption.
StorageSS 2005: 103-107 |
2004 |
109 | | Kan Zhang,
Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Springer 2004 |
108 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Signature Scheme from the Bilinear Pairings.
ITCC (1) 2004: 124-128 |
107 | EE | Gautam Singaraju,
Lawrence Teo,
Yuliang Zheng:
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic.
IWIA 2004: 79-96 |
106 | EE | Joonsang Baek,
Yuliang Zheng:
Identity-Based Threshold Decryption.
Public Key Cryptography 2004: 262-276 |
105 | EE | Yongge Wang,
Xintao Wu,
Yuliang Zheng:
Privacy Preserving Data Generation for Database Application Performance Testing.
TrustBus 2004: 142-151 |
104 | EE | Ron Steinfeld,
Yuliang Zheng:
On the Security of RSA with Primes Sharing Least-Significant Bits.
Appl. Algebra Eng. Commun. Comput. 15(3-4): 179-200 (2004) |
103 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions 87-A(1): 120-130 (2004) |
102 | EE | Laurence Bull,
David McG. Squire,
Yuliang Zheng:
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content.
Int. J. on Digital Libraries 4(3): 208-222 (2004) |
101 | EE | Yuliang Zheng,
Xian-Mo Zhang:
The Generalized XOR Lemma.
Theor. Comput. Sci. 329(1-3): 331-337 (2004) |
2003 |
100 | EE | Laurence Bull,
David McG. Squire,
Jan Newmarch,
Yuliang Zheng:
Grouping Verifiable Content for Selective Disclosure.
ACISP 2003: 1-12 |
99 | EE | Seungjoo Kim,
Masahiro Mambo,
Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption.
CT-RSA 2003: 227-243 |
98 | | Yongge Wang,
Yuliang Zheng,
Bei-tseng Chu:
Efficient and Secure Storage Systems Based on Peer-to-Peer Systems.
IC-AI 2003: 17-22 |
97 | EE | Yongge Wang,
Yuliang Zheng:
Fast and Secure Magnetic WORM Storage Systems.
IEEE Security in Storage Workshop 2003: 11-19 |
96 | EE | Lawrence Teo,
Yuliang Zheng,
Gail-Joon Ahn:
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection.
IWIA 2003: 73-88 |
95 | EE | Lawrence Teo,
Gail-Joon Ahn,
Yuliang Zheng:
Dynamic and risk-aware network access management.
SACMAT 2003: 217-230 |
94 | EE | Xintao Wu,
Yongge Wang,
Yuliang Zheng:
Privacy preserving database application testing.
WPES 2003: 118-128 |
93 | EE | Joonsang Baek,
Yuliang Zheng:
Zheng and Seberry's public key encryption scheme revisited.
Int. J. Inf. Sec. 2(1): 37-44 (2003) |
92 | | Yuliang Zheng,
Xian-Mo Zhang:
Connections among nonlinearity, avalanche and correlation immunity.
Theor. Comput. Sci. 292(3): 697-710 (2003) |
2002 |
91 | | Yuliang Zheng:
Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings
Springer 2002 |
90 | EE | Ron Steinfeld,
Joonsang Baek,
Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
ACISP 2002: 241-256 |
89 | EE | Junji Shikata,
Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes.
EUROCRYPT 2002: 434-449 |
88 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Public Key Cryptography 2002: 64-79 |
87 | EE | Joonsang Baek,
Ron Steinfeld,
Yuliang Zheng:
Formal Proofs for the Security of Signcryption.
Public Key Cryptography 2002: 80-98 |
86 | EE | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J. 45(3): 293-303 (2002) |
2001 |
85 | EE | Khaled M. Khan,
Jun Han,
Yuliang Zheng:
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Australian Software Engineering Conference 2001: 117-126 |
84 | EE | Ron Steinfeld,
Yuliang Zheng:
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits.
CT-RSA 2001: 52-62 |
83 | EE | Ron Steinfeld,
Laurence Bull,
Yuliang Zheng:
Content Extraction Signatures.
ICISC 2001: 285-304 |
82 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
81 | EE | Yuliang Zheng:
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite.
Public Key Cryptography 2001: 48-63 |
80 | | Yuliang Zheng,
Xian-Mo Zhang:
On plateaued functions.
IEEE Transactions on Information Theory 47(3): 1215-1223 (2001) |
2000 |
79 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings
Springer 2000 |
78 | | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
High Performance Agile Crypto Modules.
ACISP 2000: 74-88 |
77 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
ASIACRYPT 2000: 130-142 |
76 | EE | Yuliang Zheng,
Xian-Mo Zhang:
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.
ASIACRYPT 2000: 470-482 |
75 | EE | Khaled M. Khan,
Jun Han,
Yuliang Zheng:
Characterizing User Data Protection of Software Components.
Australian Software Engineering Conference 2000: 3-12 |
74 | | Tim Ebringer,
Yuliang Zheng,
Peter Thorne:
Parasitic Authentication.
CARDIS 2000: 307-326 |
73 | EE | Yuliang Zheng,
Xian-Mo Zhang:
New Results on Correlation Immunity.
ICISC 2000: 49-63 |
72 | EE | Sung-Ming Yen,
Yuliang Zheng:
Weighted One-Way Hash Chain and Its Applications.
ISW 2000: 135-148 |
71 | EE | Ron Steinfeld,
Yuliang Zheng:
A Signcryption Scheme Based on Integer Factorization.
ISW 2000: 308-322 |
70 | EE | Yuliang Zheng,
Xian-Mo Zhang:
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.
Selected Areas in Cryptography 2000: 262-274 |
69 | EE | Khaled M. Khan,
Jun Han,
Yuliang Zheng:
Security Characterization of Software Components and Their Composition.
TOOLS (36) 2000: 240-249 |
68 | | Xian-Mo Zhang,
Yuliang Zheng,
Hideki Imai:
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptography 19(1): 45-63 (2000) |
67 | EE | Tim Ebringer,
Peter Thorne,
Yuliang Zheng:
Parasitic Authentication To Protect Your E-Wallet.
IEEE Computer 33(10): 54-60 (2000) |
66 | EE | Yuliang Zheng,
Xian-Mo Zhang:
The kth-Order Nonhomomorphicity of S-Boxes.
J. UCS 6(8): 830-848 (2000) |
1999 |
65 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings
Springer 1999 |
64 | | Masahiro Mambo,
Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings
Springer 1999 |
63 | EE | Jussipekka Leiwo,
Chandana Gamage,
Yuliang Zheng:
Organizational Modeling for Efficient Specification of Information Security Requirements.
ADBIS 1999: 247-260 |
62 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
ASIACRYPT 1999: 348-362 |
61 | | Junji Shikata,
Yuliang Zheng,
Joe Suzuki,
Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
ASIACRYPT 1999: 86-102 |
60 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
ICICS 1999: 157-168 |
59 | | Yuliang Zheng,
Xian-Mo Zhang:
Plateaued Functions.
ICICS 1999: 284-300 |
58 | | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
ICISC 1999: 120-131 |
57 | | Yuliang Zheng,
Xian-Mo Zhang:
Relationships between Bent Functions and Complementary Plateaued Functions.
ICISC 1999: 60-75 |
56 | EE | Hye-Joo Lee,
Ji-Hwan Park,
Yuliang Zheng:
Digital Watermarking Robust Against JPEG Compression.
ISW 1999: 167-190 |
55 | EE | Khaled M. Khan,
Jun Han,
Yuliang Zheng:
Security Properties of Software Components.
ISW 1999: 52-56 |
54 | EE | Chandana Gamage,
Jussipekka Leiwo,
Yuliang Zheng:
Encrypted Message Authentication by Firewalls.
Public Key Cryptography 1999: 69-81 |
53 | EE | Yuliang Zheng,
Xian-Mo Zhang:
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.
Selected Areas in Cryptography 1999: 92-105 |
52 | EE | Yuliang Zheng,
Xian-Mo Zhang,
Hideki Imai:
Restriction, Terms and Nonlinearity of Boolean Functions.
Theor. Comput. Sci. 226(1-2): 207-223 (1999) |
1998 |
51 | | Hideki Imai,
Yuliang Zheng:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings
Springer 1998 |
50 | EE | Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
ACISP 1998: 215-226 |
49 | | Yuliang Zheng,
Xian-Mo Zhang:
The nonhomomorphicity of S-boxes.
ICISC 1998: 131-145 |
48 | | Yuliang Zheng,
Hideki Imai:
Compact and Unforgeable Key Establishment over an ATM Network.
INFOCOM 1998: 411-418 |
47 | EE | Miodrag J. Mihaljevic,
Yuliang Zheng,
Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Public Key Cryptography 1998: 217-233 |
46 | EE | Xian-Mo Zhang,
Yuliang Zheng:
The Nonhomomorphicity of Boolean Functions.
Selected Areas in Cryptography 1998: 280-295 |
45 | | Kanta Matsuura,
Yuliang Zheng,
Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution.
WWCA 1998: 190-205 |
44 | EE | Yuliang Zheng,
Hideki Imai:
How to Construct Efficient Signcryption Schemes on Elliptic Curves.
Inf. Process. Lett. 68(5): 227-233 (1998) |
1997 |
43 | | Xian-Mo Zhang,
Yuliang Zheng:
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions.
ACISP 1997: 147-158 |
42 | | Jussipekka Leiwo,
Yuliang Zheng:
A Method to Implement a Denial of Service Protection Base.
ACISP 1997: 90-101 |
41 | EE | Yuliang Zheng:
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption).
CRYPTO 1997: 165-179 |
40 | | Yuliang Zheng:
The SPEED Cipher.
Financial Cryptography 1997: 71-90 |
39 | | Xian-Mo Zhang,
Yuliang Zheng,
Hideki Imai:
Duality of Boolean functions and its cryptographic significance.
ICICS 1997: 159-169 |
38 | | Jussipekka Leiwo,
Yuliang Zheng:
A Framework for the Management of Information Security.
ISW 1997: 232-245 |
37 | | Yuliang Zheng:
Signcryption and Its Applications in Efficient Public Key Solutions.
ISW 1997: 291-312 |
36 | | Jussipekka Leiwo,
Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements.
SEC 1997: 25-38 |
35 | | Xian-Mo Zhang,
Yuliang Zheng:
Cryptographically resilient functions.
IEEE Transactions on Information Theory 43(5): 1740-1747 (1997) |
1996 |
34 | | Yi Mu,
Yuliang Zheng:
An alternative model of quantum key agreement via photon coupling.
ACISP 1996: 320-331 |
33 | EE | Xian-Mo Zhang,
Yuliang Zheng:
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions.
EUROCRYPT 1996: 294-306 |
32 | | Yuliang Zheng:
An Authentication and Security Protocol for Mobile Computing.
IFIP World Conference on Mobile Communications 1996: 249-257 |
31 | | Kouichi Sakurai,
Yuliang Zheng:
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
ISAAC 1996: 376-385 |
30 | | Xian-Mo Zhang,
Yuliang Zheng:
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors.
Des. Codes Cryptography 7(1-2): 111-134 (1996) |
29 | | Xian-Mo Zhang,
Yuliang Zheng:
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes.
J. UCS 2(3): 147-162 (1996) |
1995 |
28 | EE | Xian-Mo Zhang,
Yuliang Zheng:
On Nonlinear Resilient Functions (Extended Abstract).
EUROCRYPT 1995: 274-288 |
27 | | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Nonlinearity and Propagation Characteristics of Balanced Boolean Functions
Inf. Comput. 119(1): 1-13 (1995) |
26 | EE | Yuliang Zheng:
On Key Agreement Protocols Based on Tamper-Proof Hardware.
Inf. Process. Lett. 53(1): 49-54 (1995) |
25 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions.
J. UCS 1(2): 136-150 (1995) |
1994 |
24 | | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
ASIACRYPT 1994: 119-132 |
23 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Pitfalls in Designing Substitution Boxes (Extended Abstract).
CRYPTO 1994: 383-396 |
22 | EE | Azad Jiwa,
Jennifer Seberry,
Yuliang Zheng:
Beacon Based Authentication.
ESORICS 1994: 125-141 |
21 | EE | Yuliang Zheng:
How to Break and Repair Leighton and Micali's Key Agreement Protocol.
EUROCRYPT 1994: 299-305 |
20 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Relationships Among Nonlinear Criteria (Extended Abstract).
EUROCRYPT 1994: 376-388 |
19 | EE | Chris Charnes,
Luke O'Connor,
Josef Pieprzyk,
Reihaneh Safavi-Naini,
Yuliang Zheng:
Comments on Soviet Encryption Algorithm.
EUROCRYPT 1994: 433-438 |
18 | | Thomas Hardjono,
Yuliang Zheng,
Jennifer Seberry:
Kuperee: An Approach to Authentication using Public Keys.
ULPAA 1994: 65-76 |
17 | | Yuliang Zheng,
Thomas Hardjono,
Jennifer Seberry:
Reusing Shares in Secret Sharing Schemes.
Comput. J. 37(3): 199-205 (1994) |
16 | EE | Thomas Hardjono,
Yuliang Zheng,
Jennifer Seberry:
Database authentication revisited.
Computers & Security 13(7): 573-580 (1994) |
15 | | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Improving the Strict Avalanche Characteristics of Cryptographic Functions.
Inf. Process. Lett. 50(1): 37-41 (1994) |
1993 |
14 | | Jennifer Seberry,
Yuliang Zheng:
Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings
Springer 1993 |
13 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Systematic Generation of Cryptographically Robust S-Boxes.
ACM Conference on Computer and Communications Security 1993: 171-182 |
12 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
CRYPTO 1993: 49-60 |
11 | EE | Jennifer Seberry,
Xian-Mo Zhang,
Yuliang Zheng:
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
EUROCRYPT 1993: 181-199 |
10 | | Yuliang Zheng,
Jennifer Seberry:
Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks.
IEEE Journal on Selected Areas in Communications 11(5): 715-724 (1993) |
1992 |
9 | | Thomas Hardjono,
Yuliang Zheng:
A Practical Digital Multisignature Scheme Based on Discrete Logarithms.
AUSCRYPT 1992: 122-132 |
8 | | Yuliang Zheng,
Josef Pieprzyk,
Jennifer Seberry:
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output.
AUSCRYPT 1992: 83-104 |
7 | EE | Yuliang Zheng,
Jennifer Seberry:
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract).
CRYPTO 1992: 292-304 |
1991 |
6 | | Yuliang Zheng,
Thomas Hardjono,
Josef Pieprzyk:
Sibling Intractable Function Families and Their Applications (Extended Abstract).
ASIACRYPT 1991: 124-138 |
5 | | Babak Sadeghiyan,
Yuliang Zheng,
Josef Pieprzyk:
How to Construct A Family of Strong One Way Permutations.
ASIACRYPT 1991: 97-110 |
1990 |
4 | | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Duality between Two Cryptographic Primitives.
AAECC 1990: 379-390 |
3 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Structural Properties of One-way Hash Functions.
CRYPTO 1990: 285-302 |
1989 |
2 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
CRYPTO 1989: 461-480 |
1 | EE | Yuliang Zheng,
Tsutomu Matsumoto,
Hideki Imai:
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
EUROCRYPT 1989: 412-422 |