His primary areas of study are Cryptography, Theoretical computer science, Computer security, Public-key cryptography and Signcryption. His Cryptography study combines topics from a wide range of disciplines, such as Function, Discrete mathematics and Nonlinear system. Yuliang Zheng has researched Theoretical computer science in several fields, including CBC-MAC, Cipher, Digital signature, Hash function and Verifiable secret sharing.
His research in Computer security intersects with topics in Node and Information sharing. Signcryption is a subfield of Encryption that Yuliang Zheng tackles. His Probabilistic encryption research is multidisciplinary, incorporating elements of Multiple encryption, Filesystem-level encryption, On-the-fly encryption and 40-bit encryption.
Yuliang Zheng mainly focuses on Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Encryption. His study in Computer security is interdisciplinary in nature, drawing from both Computer network and Digital signature. The Cryptography study combines topics in areas such as Distributed computing, Boolean function and Nonlinear system.
While the research belongs to areas of Theoretical computer science, Yuliang Zheng spends his time largely on the problem of Hash function, intersecting his research to questions surrounding Discrete mathematics. His Public-key cryptography research incorporates elements of Ciphertext and Cryptographic primitive. His research integrates issues of Identity and Substitution in his study of Encryption.
His scientific interests lie mostly in Computer security, Public-key cryptography, Encryption, Signcryption and Computer network. He focuses mostly in the field of Public-key cryptography, narrowing it down to topics relating to Ciphertext and, in certain cases, Plaintext, Hash function and Communication source. Probabilistic encryption is closely connected to Theoretical computer science in his research, which is encompassed under the umbrella topic of Encryption.
His studies in Signcryption integrate themes in fields like Overhead and Identity. His Computer network course of study focuses on Secret sharing and Digital signature. The concepts of his Cryptography study are interwoven with issues in Key and Synthetic data.
Yuliang Zheng mostly deals with Computer security, Signcryption, Physical data model, Database model and Database testing. Computer security is a component of his Random oracle, Encryption, Computer security model, On-the-fly encryption and Probabilistic encryption studies. His Encryption study frequently draws connections between adjacent fields such as Theoretical computer science.
Signcryption is closely attributed to Cryptography in his study. Yuliang Zheng has included themes like Computer network, Identity and Digital signature in his Cryptography study. His work carried out in the field of Public-key cryptography brings together such families of science as Cloud storage, Overhead and Security parameter.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
international cryptology conference (1997)
Formal Proofs for the Security of Signcryption
Joonsang Baek;Ron Steinfeld;Yuliang Zheng.
public key cryptography (2002)
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
Yuliang Zheng;Josef Pieprzyk;Jennifer Seberry.
theory and application of cryptographic techniques (1992)
How to construct efficient signcryption schemes on elliptic curves
Yuliang Zheng;Hideki Imai.
Information Processing Letters (1998)
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security (1997)
Identity-Based Threshold Decryption
Joonsang Baek;Yuliang Zheng.
public key cryptography (2004)
Advances in Cryptology — AUSCRYPT '92
Jennifer Seberry;Yuliang Zheng.
GAC — the Criterion for Global Avalanche Characteristics of Cryptographic Functions
Xian-Mo Zhang;Yuliang Zheng.
Journal of Universal Computer Science (1996)
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
Yuliang Zheng;Tsutomu Matsumoto;Hideki Imai.
international cryptology conference (1989)
Systems and methods for enhanced network security
Yuliang Zheng;Lawrence Chin Shiun Teo.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: