Yuliang Zheng
Affiliations: | Applied Mathematics (PhD) | University of North Carolina, Charlotte, Charlotte, NC, United States |
Area:
Applied Mathematics, MathematicsGoogle:
"Yuliang Zheng"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Wei P, Zheng Y. (2015) On the Construction of Public Key Encryption with Sender Recovery International Journal of Foundations of Computer Science. 26: 1-31 |
Enos G, Zheng Y. (2015) An ID-based signcryption scheme with compartmented secret sharing for unsigncryption Information Processing Letters. 115: 128-133 |
Fan J, Zheng Y, Tang X. (2014) A New Construction Of Identity-Based Signcryption Without Random Oracles International Journal of Foundations of Computer Science. 25: 1-23 |
Wei P, Wang X, Zheng Y. (2012) Public key encryption without random oracle made truly practical Computers & Electrical Engineering. 38: 975-985 |
Imai H, Hanaoka G, Maurer U, et al. (2008) Introduction to the special issue on information theoretic security Ieee Transactions On Information Theory. 54: 2405-2407 |
Baek J, Steinfeld R, Zheng Y. (2007) Formal Proofs for the Security of Signcryption Journal of Cryptology. 20: 203-235 |
Zheng Y, Zhang X. (2004) The generalized XOR Lemma Theoretical Computer Science. 329: 331-337 |
Steinfeld R, Zheng Y. (2004) On the Security of RSA with Primes Sharing Least-Significant Bits Applicable Algebra in Engineering, Communication and Computing. 15: 179-200 |
Zheng Y, Zhang X. (2003) Connections among nonlinearity, avalanche and correlation immunity Theoretical Computer Science. 292: 697-710 |
Baek J, Zheng Y. (2003) Zheng and Seberry's public key encryption scheme revisited International Journal of Information Security. 2: 37-44 |