D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 8,090 157 World Ranking 7178 National Ranking 3382

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • The Internet

His primary areas of study are Cryptography, Theoretical computer science, Computer security, Public-key cryptography and Signcryption. His Cryptography study combines topics from a wide range of disciplines, such as Function, Discrete mathematics and Nonlinear system. Yuliang Zheng has researched Theoretical computer science in several fields, including CBC-MAC, Cipher, Digital signature, Hash function and Verifiable secret sharing.

His research in Computer security intersects with topics in Node and Information sharing. Signcryption is a subfield of Encryption that Yuliang Zheng tackles. His Probabilistic encryption research is multidisciplinary, incorporating elements of Multiple encryption, Filesystem-level encryption, On-the-fly encryption and 40-bit encryption.

His most cited work include:

  • Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) (977 citations)
  • How to construct efficient signcryption schemes on elliptic curves (191 citations)
  • Identity-Based Threshold Decryption (165 citations)

What are the main themes of his work throughout his whole career to date?

Yuliang Zheng mainly focuses on Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Encryption. His study in Computer security is interdisciplinary in nature, drawing from both Computer network and Digital signature. The Cryptography study combines topics in areas such as Distributed computing, Boolean function and Nonlinear system.

While the research belongs to areas of Theoretical computer science, Yuliang Zheng spends his time largely on the problem of Hash function, intersecting his research to questions surrounding Discrete mathematics. His Public-key cryptography research incorporates elements of Ciphertext and Cryptographic primitive. His research integrates issues of Identity and Substitution in his study of Encryption.

He most often published in these fields:

  • Computer security (32.74%)
  • Cryptography (26.01%)
  • Theoretical computer science (21.97%)

What were the highlights of his more recent work (between 2004-2018)?

  • Computer security (32.74%)
  • Public-key cryptography (19.28%)
  • Encryption (15.25%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Public-key cryptography, Encryption, Signcryption and Computer network. He focuses mostly in the field of Public-key cryptography, narrowing it down to topics relating to Ciphertext and, in certain cases, Plaintext, Hash function and Communication source. Probabilistic encryption is closely connected to Theoretical computer science in his research, which is encompassed under the umbrella topic of Encryption.

His studies in Signcryption integrate themes in fields like Overhead and Identity. His Computer network course of study focuses on Secret sharing and Digital signature. The concepts of his Cryptography study are interwoven with issues in Key and Synthetic data.

Between 2004 and 2018, his most popular works were:

  • Formal Proofs for the Security of Signcryption (156 citations)
  • Introduction to the Special Issue on Information Theoretic Security (14 citations)
  • On algebraic immunity and annihilators (13 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer network
  • The Internet

Yuliang Zheng mostly deals with Computer security, Signcryption, Physical data model, Database model and Database testing. Computer security is a component of his Random oracle, Encryption, Computer security model, On-the-fly encryption and Probabilistic encryption studies. His Encryption study frequently draws connections between adjacent fields such as Theoretical computer science.

Signcryption is closely attributed to Cryptography in his study. Yuliang Zheng has included themes like Computer network, Identity and Digital signature in his Cryptography study. His work carried out in the field of Public-key cryptography brings together such families of science as Cloud storage, Overhead and Security parameter.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

Yuliang Zheng.
international cryptology conference (1997)

1808 Citations

Formal Proofs for the Security of Signcryption

Joonsang Baek;Ron Steinfeld;Yuliang Zheng.
public key cryptography (2002)

341 Citations

HAVAL - A One-Way Hashing Algorithm with Variable Length of Output

Yuliang Zheng;Josef Pieprzyk;Jennifer Seberry.
theory and application of cryptographic techniques (1992)

334 Citations

How to construct efficient signcryption schemes on elliptic curves

Yuliang Zheng;Hideki Imai.
Information Processing Letters (1998)

315 Citations

Signcryption and Its Applications in Efficient Public Key Solutions

Yuliang Zheng.
ISW '97 Proceedings of the First International Workshop on Information Security (1997)

293 Citations

Identity-Based Threshold Decryption

Joonsang Baek;Yuliang Zheng.
public key cryptography (2004)

249 Citations

Advances in Cryptology — AUSCRYPT '92

Jennifer Seberry;Yuliang Zheng.
(1993)

249 Citations

GAC — the Criterion for Global Avalanche Characteristics of Cryptographic Functions

Xian-Mo Zhang;Yuliang Zheng.
Journal of Universal Computer Science (1996)

244 Citations

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses

Yuliang Zheng;Tsutomu Matsumoto;Hideki Imai.
international cryptology conference (1989)

220 Citations

Systems and methods for enhanced network security

Yuliang Zheng;Lawrence Chin Shiun Teo.
(2003)

207 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yuliang Zheng

Claude Carlet

Claude Carlet

Paris 8 University

Publications: 45

Subhamoy Maitra

Subhamoy Maitra

Indian Statistical Institute

Publications: 32

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 32

Bart Preneel

Bart Preneel

KU Leuven

Publications: 29

Yi Mu

Yi Mu

Fujian Normal University

Publications: 26

C.Pandu Rangan

C.Pandu Rangan

Indian Institute of Technology Madras

Publications: 22

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 21

Hideki Imai

Hideki Imai

Chuo University

Publications: 19

Phillip Rogaway

Phillip Rogaway

University of California, Davis

Publications: 17

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 17

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 16

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 15

Ed Dawson

Ed Dawson

Queensland University of Technology

Publications: 14

Palash Sarkar

Palash Sarkar

Indian Statistical Institute

Publications: 14

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 13

Marc Fischlin

Marc Fischlin

TU Darmstadt

Publications: 12

Something went wrong. Please try again later.