Cryptographers' World
 

Feng Bao


Author's Web Page Link

17 papers in database with 361 citations Star

Editor of 2 conference proceedings books

H-number: 9

Conference Proceedings

 
1. Jianying ZhouMoti YungFeng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Springer, 2006. ISBN 3-540-34703-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Feng BaoRobert H. DengJianying Zhou, editors, Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Springer, 2004. ISBN 3-540-21018-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Joonsang Baek,  Jianying Zhou,  Feng Bao,  Generic Constructions of Stateful Public Key Encryption and Their Applications, pp. 75 - 93, ACNS 2008.

[Electronic Edition][Cited 5 times ]

2. Guilin Wang,  Joonsang Baek,  Duncan S. Wong,  Feng Bao,  On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures, pp. 43 - 60, PKC 2007.

[Electronic Edition][Cited 9 times ]

3. Huafei Zhu,  Feng Bao,  Stand-Alone and Setup-Free Verifiably Committed Signatures, pp. 159 - 173, CT-RSA 2006.

[Electronic Edition][Cited 13 times ]

4. Bin Zhang,  Hongjun Wu,  Dengguo Feng,  Feng Bao,  A Fast Correlation Attack on the Shrinking Generator, pp. 72 - 86, CT-RSA 2005.

[Electronic Edition][Cited 13 times ]

5. Bin Zhang,  Hongjun Wu,  Dengguo Feng,  Feng Bao,  Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers, pp. 73 - 83, INDOCRYPT 2004.

[Electronic Edition][Cited 4 times ]

6. Guilin Wang,  Feng Bao,  Jianying Zhou,  On the Security of a Certified E-Mail Scheme, pp. 48 - 60, INDOCRYPT 2004.

[Electronic Edition][Cited 10 times ]

7. Feng Bao,  Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes, pp. 417 - 429, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

8. Bok-Min Goi,  Raphael Chung-Wei Phan,  Yanjiang Yang,  Feng Bao,  Robert H. Deng,  M. U. Siddiqi,  Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity, pp. 369 - 382, ACNS 2004.

[Electronic Edition][Cited 37 times ]

9. Bin Zhang,  Hongjun Wu,  Dengguo Feng,  Feng Bao,  Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem, pp. 303 - 309, ACNS 2004.

[Electronic Edition][Cited 5 times ]

10. Gang Yao,  Kui Ren,  Feng Bao,  Robert H. Deng,  Dengguo Feng,  Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient, pp. 343 - 356, ACNS 2003.

[Electronic Edition][Cited 19 times ]

11. Hongjun Wu,  Feng Bao,  Robert H. Deng,  Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures, pp. 173 - 179, PKC 2001.

[Electronic Edition][No citation]

12. Feng Bao,  Robert H. Deng,  Willi Geiselmann,  Claus-Peter Schnorr,  Rainer Steinwandt,  Hongjun Wu,  Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems, pp. 153 - 164, PKC 2001.

[Electronic Edition][Cited 10 times ]

13. Jianying Zhou,  Robert H. Deng,  Feng Bao,  Some Remarks on a Fair Exchange Protocol, pp. 46 - 57, PKC 2000.

[Electronic Edition][Cited 63 times Red Star]

14. Feng Bao,  Robert H. Deng,  A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation, pp. 1 - 11, PKC 1999.

[Electronic Edition][Cited 3 times ]

15. Hongjun Wu,  Feng Bao,  Robert H. Deng,  Qin-Zhong Ye,  Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers, pp. 126 - 132, ASIACRYPT 1998.

[Electronic Edition][Cited 5 times ]

16. Hongjun Wu,  Feng Bao,  Robert H. Deng,  Qin-Zhong Ye,  Improved Truncated Differential Attacks on SAFER, pp. 133 - 147, ASIACRYPT 1998.

[Electronic Edition][Cited 6 times ]

17. Feng Bao,  Robert H. Deng,  A Signcryption Scheme with Signature Directly Verifiable by Public Key, pp. 55 - 59, PKC 1998.

[Electronic Edition][Cited 134 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...