Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
international cryptology conference (1997)
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
Yuliang Zheng;Josef Pieprzyk;Jennifer Seberry.
theory and application of cryptographic techniques (1992)
How to construct efficient signcryption schemes on elliptic curves
Yuliang Zheng;Hideki Imai.
Information Processing Letters (1998)
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security (1997)
Content Extraction Signatures
Ron Steinfeld;Laurence Bull;Yuliang Zheng.
international conference on information security and cryptology (2001)
Identity-Based Threshold Decryption
Joonsang Baek;Yuliang Zheng.
public key cryptography (2004)
GAC — the Criterion for Global Avalanche Characteristics of Cryptographic Functions
Xian-Mo Zhang;Yuliang Zheng.
Journal of Universal Computer Science (1996)
Advances in Cryptology — AUSCRYPT '92
Jennifer Seberry;Yuliang Zheng.
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Yuliang Zheng;Tsutomu Matsumoto;Hideki Imai.
international cryptology conference (1989)
Systems and methods for enhanced network security
Yuliang Zheng;Lawrence Chin Shiun Teo.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: