Cryptographers' World
 

Yuliang Zheng


Author's Web Page Link

38 papers in database with 1679 citations StarStarStar

Editor of 5 conference proceedings books

H-number: 18

Conference Proceedings

 
1. Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. Springer, 2002. ISBN 3-540-00171-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Springer, 2000. ISBN 3-540-66967-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Springer, 1999. ISBN 3-540-65644-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Springer, 1998. ISBN 3-540-64693-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

5. Jennifer SeberryYuliang Zheng, editors, Advances in Cryptology - ASIACRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings. Springer, 1993. ISBN 3-540-57220-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Joonsang Baek,  Ron Steinfeld,  Yuliang Zheng,  Formal Proofs for the Security of Signcryption, Journal of Cryptology, Volume 20(2), pp. 203 - 235, Springer, 2007.

[Cited 111 times Red StarRed Star]

2. Xian-Mo Zhang,  Yuliang Zheng,  Hideki Imai,  Relating Differential Distribution Tables to Other Properties of of Substitution Boxes, Designs, Codes and Cryptography, Volume 19(1), pp. 45 - 63, Springer, 2000.

[Electronic Edition][Cited 11 times ]

3. Xian-Mo Zhang,  Yuliang Zheng,  Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors, Designs, Codes and Cryptography, Volume 7(1), pp. 111 - 134, Springer, 1996.

[Electronic Edition][Cited 30 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Joonsang Baek,  Yuliang Zheng,  Identity-Based Threshold Decryption, pp. 262 - 276, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 110 times Red StarRed Star]

2. Seungjoo Kim,  Masahiro Mambo,  Yuliang Zheng,  Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption, pp. 227 - 243, CT-RSA 2003.

[Electronic Edition][No citation]

3. Junji Shikata,  Goichiro Hanaoka,  Yuliang Zheng,  Hideki Imai,  Security Notions for Unconditionally Secure Signature Schemes, pp. 434 - 449, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

4. Joonsang Baek,  Ron Steinfeld,  Yuliang Zheng,  Formal Proofs for the Security of Signcryption, pp. 80 - 98, PKC 2002.

[Electronic Edition][Cited 204 times Red StarRed Star]

5. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code, pp. 64 - 79, PKC 2002.

[Electronic Edition][Cited 6 times ]

6. Ron Steinfeld,  Yuliang Zheng,  An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits, pp. 52 - 62, CT-RSA 2001.

[Electronic Edition][Cited 23 times ]

7. Yuliang Zheng,  Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite, pp. 48 - 63, PKC 2001.

[Electronic Edition][Cited 11 times ]

8. Yuliang Zheng,  Xian-Mo Zhang,  On Relationships among Avalanche, Nonlinearity, and Correlation Immunity, pp. 470 - 482, ASIACRYPT 2000.

[Electronic Edition][Cited 12 times ]

9. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Unconditionally Secure Digital Signature Schemes Admitting Transferability, pp. 130 - 142, ASIACRYPT 2000.

[Electronic Edition][Cited 25 times ]

10. Yuliang Zheng,  Xian-Mo Zhang,  Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions, pp. 262 - 274, SAC 2000.

[Electronic Edition][Cited 52 times Red Star]

11. Junji Shikata,  Yuliang Zheng,  Joe Suzuki,  Hideki Imai,  Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves, pp. 86 - 102, ASIACRYPT 1999.

[Electronic Edition][Cited 5 times ]

12. Goichiro Hanaoka,  Tsuyoshi Nishioka,  Yuliang Zheng,  Hideki Imai,  An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks, pp. 348 - 362, ASIACRYPT 1999.

[Electronic Edition][Cited 25 times ]

13. Yuliang Zheng,  Xian-Mo Zhang,  Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors, pp. 92 - 105, SAC 1999.

[Electronic Edition][Cited 5 times ]

14. Chandana Gamage,  Jussipekka Leiwo,  Yuliang Zheng,  Encrypted Message Authentication by Firewalls, pp. 69 - 81, PKC 1999.

[Electronic Edition][Cited 50 times Red Star]

15. Xian-Mo Zhang,  Yuliang Zheng,  The Nonhomomorphicity of Boolean Functions, pp. 280 - 295, SAC 1998.

[Electronic Edition][Cited 7 times ]

16. Miodrag J. Mihaljevic,  Yuliang Zheng,  Hideki Imai,  A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation, pp. 217 - 233, PKC 1998.

[Electronic Edition][Cited 15 times ]

17. Yuliang Zheng,  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption), pp. 165 - 179, CRYPTO 1997.

[Electronic Edition][Cited 519 times Red StarRed StarRed StarRed Star]

18. Yuliang Zheng,  The SPEED Cipher, pp. 71 - 90, FC 1997.

[Electronic Edition][Cited 19 times ]

19. Xian-Mo Zhang,  Yuliang Zheng,  Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions, pp. 294 - 306, EUROCRYPT 1996.

[Electronic Edition][Cited 26 times ]

20. Xian-Mo Zhang,  Yuliang Zheng,  On Nonlinear Resilient Functions (Extended Abstract), pp. 274 - 288, EUROCRYPT 1995.

[Electronic Edition][Cited 8 times ]

21. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract), pp. 119 - 132, ASIACRYPT 1994.

[Electronic Edition][Cited 11 times ]

22. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Pitfalls in Designing Substitution Boxes (Extended Abstract), pp. 383 - 396, CRYPTO 1994.

[Electronic Edition][Cited 13 times ]

23. Chris Charnes,  Luke O'Connor,  Josef Pieprzyk,  Reihaneh Safavi-Naini,  Yuliang Zheng,  Comments on Soviet Encryption Algorithm, pp. 433 - 438, EUROCRYPT 1994.

[Electronic Edition][Cited 10 times ]

24. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Relationships Among Nonlinear Criteria (Extended Abstract), pp. 376 - 388, EUROCRYPT 1994.

[Electronic Edition][No citation]

25. Yuliang Zheng,  How to Break and Repair Leighton and Micali's Key Agreement Protocol, pp. 299 - 305, EUROCRYPT 1994.

[Electronic Edition][Cited 1 times ]

26. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract), pp. 49 - 60, CRYPTO 1993.

[Electronic Edition][No citation]

27. Jennifer Seberry,  Xian-Mo Zhang,  Yuliang Zheng,  On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract), pp. 181 - 199, EUROCRYPT 1993.

[Electronic Edition][Cited 104 times Red StarRed Star]

28. Yuliang Zheng,  Josef Pieprzyk,  Jennifer Seberry,  HAVAL - A One-Way Hashing Algorithm with Variable Length of Output, pp. 83 - 104, ASIACRYPT 1992.

[Electronic Edition][Cited 161 times Red StarRed Star]

29. Thomas Hardjono,  Yuliang Zheng,  A Practical Digital Multisignature Scheme Based on Discrete Logarithms, pp. 122 - 132, ASIACRYPT 1992.

[Electronic Edition][Cited 36 times ]

30. Yuliang Zheng,  Jennifer Seberry,  Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract), pp. 292 - 304, CRYPTO 1992.

[Electronic Edition][Cited 52 times Red Star]

31. Yuliang Zheng,  Thomas Hardjono,  Josef Pieprzyk,  Sibling Intractable Function Families and Their Applications (Extended Abstract), pp. 124 - 138, ASIACRYPT 1991.

[Electronic Edition][Cited 15 times ]

32. Babak Sadeghiyan,  Yuliang Zheng,  Josef Pieprzyk,  How to Construct A Family of Strong One Way Permutations, pp. 97 - 110, ASIACRYPT 1991.

[Electronic Edition][Cited 4 times ]

33. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Structural Properties of One-way Hash Functions, pp. 285 - 302, CRYPTO 1990.

[Electronic Edition][Cited 30 times ]

34. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses, pp. 461 - 480, CRYPTO 1989.

[Electronic Edition][Cited 57 times Red Star]

35. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract), pp. 412 - 422, EUROCRYPT 1989.

[Electronic Edition][Cited 1 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...