default search action
Zhengjun Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j25]Zhengjun Cao:
A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network". IEEE Syst. J. 18(1): 391-393 (2024) - [j24]Zhengjun Cao:
Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device". Telecommun. Syst. 86(3): 393-397 (2024) - [i110]Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". IACR Cryptol. ePrint Arch. 2024: 13 (2024) - [i109]Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2024: 454 (2024) - [i108]Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. IACR Cryptol. ePrint Arch. 2024: 608 (2024) - [i107]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". IACR Cryptol. ePrint Arch. 2024: 638 (2024) - [i106]Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". IACR Cryptol. ePrint Arch. 2024: 683 (2024) - [i105]Zhengjun Cao, Lihua Liu:
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain". IACR Cryptol. ePrint Arch. 2024: 1144 (2024) - [i104]Zhengjun Cao, Lihua Liu:
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters". IACR Cryptol. ePrint Arch. 2024: 1158 (2024) - [i103]Zhengjun Cao, Lihua Liu:
A note on "a novel authentication protocol for IoT-enabled devices". IACR Cryptol. ePrint Arch. 2024: 1191 (2024) - [i102]Zhengjun Cao, Lihua Liu:
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. IACR Cryptol. ePrint Arch. 2024: 1205 (2024) - [i101]Zhengjun Cao, Lihua Liu:
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2024: 1244 (2024) - [i100]Zhengjun Cao, Lihua Liu:
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IACR Cryptol. ePrint Arch. 2024: 1326 (2024) - [i99]Zhengjun Cao, Lihua Liu:
Design issues of "an anonymous authentication and key agreement protocol in smart living". IACR Cryptol. ePrint Arch. 2024: 1411 (2024) - [i98]Zhengjun Cao, Lihua Liu:
The Zeros of Zeta Function Revisited. IACR Cryptol. ePrint Arch. 2024: 1412 (2024) - [i97]Zhengjun Cao, Lihua Liu:
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud. IACR Cryptol. ePrint Arch. 2024: 1491 (2024) - 2023
- [j23]Zhengjun Cao:
A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services". Wirel. Pers. Commun. 133(4): 2439-2444 (2023) - [i96]Zhengjun Cao, Lihua Liu:
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT". IACR Cryptol. ePrint Arch. 2023: 646 (2023) - [i95]Zhengjun Cao, Lihua Liu:
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things". IACR Cryptol. ePrint Arch. 2023: 658 (2023) - [i94]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment". IACR Cryptol. ePrint Arch. 2023: 684 (2023) - [i93]Zhengjun Cao, Lihua Liu:
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT". IACR Cryptol. ePrint Arch. 2023: 726 (2023) - [i92]Zhengjun Cao, Lihua Liu:
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System". IACR Cryptol. ePrint Arch. 2023: 757 (2023) - [i91]Zhengjun Cao, Lihua Liu:
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems". IACR Cryptol. ePrint Arch. 2023: 814 (2023) - [i90]Zhengjun Cao, Lihua Liu:
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network". IACR Cryptol. ePrint Arch. 2023: 889 (2023) - [i89]Zhengjun Cao, Lihua Liu:
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function". IACR Cryptol. ePrint Arch. 2023: 993 (2023) - [i88]Zhengjun Cao, Lihua Liu:
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment". IACR Cryptol. ePrint Arch. 2023: 1065 (2023) - [i87]Zhengjun Cao, Lihua Liu:
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation". IACR Cryptol. ePrint Arch. 2023: 1248 (2023) - [i86]Zhengjun Cao, Lihua Liu:
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid". IACR Cryptol. ePrint Arch. 2023: 1296 (2023) - [i85]Zhengjun Cao, Lihua Liu:
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor". IACR Cryptol. ePrint Arch. 2023: 1430 (2023) - [i84]Zhengjun Cao, Lihua Liu:
A note on "authenticated key agreement protocols for dew-assisted IoT systems". IACR Cryptol. ePrint Arch. 2023: 1497 (2023) - [i83]Zhengjun Cao, Lihua Liu:
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments". IACR Cryptol. ePrint Arch. 2023: 1540 (2023) - [i82]Zhengjun Cao, Lihua Liu:
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement. IACR Cryptol. ePrint Arch. 2023: 1592 (2023) - [i81]Zhengjun Cao, Lihua Liu:
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0". IACR Cryptol. ePrint Arch. 2023: 1629 (2023) - [i80]Zhengjun Cao, Lihua Liu:
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement". IACR Cryptol. ePrint Arch. 2023: 1671 (2023) - [i79]Zhengjun Cao:
A note on "a novel authentication and key agreement scheme for Internet of Vehicles". IACR Cryptol. ePrint Arch. 2023: 1696 (2023) - [i78]Zhengjun Cao:
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". IACR Cryptol. ePrint Arch. 2023: 1771 (2023) - [i77]Zhengjun Cao:
A note on quantum approximate optimization algorithm. IACR Cryptol. ePrint Arch. 2023: 1854 (2023) - [i76]Zhengjun Cao, Zhenfu Cao:
The Planck Constant and Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2023: 1971 (2023) - 2022
- [j22]Zhengjun Cao, Lihua Liu:
A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials. Int. J. Bifurc. Chaos 32(3): 2250044:1-2250044:8 (2022) - 2021
- [j21]Zhengjun Cao, Xiqi Wang, Lihua Liu:
One privacy-preserving multi-keyword ranked search scheme revisited. Int. J. Inf. Comput. Secur. 16(3/4): 375-384 (2021) - [j20]Zhengjun Cao, Olivier Markowitch:
A note on "new quantum key agreement protocols based on Bell states". Quantum Inf. Process. 20(2): 74 (2021) - [j19]Zhengjun Cao, Olivier Markowitch:
Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations". IEEE Trans. Big Data 7(6): 973-974 (2021) - [j18]Zhengjun Cao, Olivier Markowitch:
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing". IEEE Trans. Parallel Distributed Syst. 32(2): 392-393 (2021) - 2020
- [j17]Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. Int. J. Netw. Secur. 22(1): 36-40 (2020) - [j16]Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. Int. J. Netw. Secur. 22(2): 331-336 (2020) - [j15]Zhengjun Cao, Xiqi Wang, Lihua Liu:
A Note on One Popular Non-Interactive Zero-Knowledge Proof System. Int. J. Netw. Secur. 22(4): 681-685 (2020) - [i75]Zhengjun Cao, Lihua Liu:
Factoring Algorithm Based on Parameterized Newton Method. IACR Cryptol. ePrint Arch. 2020: 1142 (2020) - [i74]Zhengjun Cao, Lihua Liu, Leming Hong:
Evaluation Methods for Chebyshev Polynomials. IACR Cryptol. ePrint Arch. 2020: 1365 (2020)
2010 – 2019
- 2019
- [j14]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud". IEEE Trans. Cloud Comput. 7(3): 893 (2019) - 2018
- [j13]Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Int. J. Netw. Secur. 20(4): 683-688 (2018) - [i73]Zhengjun Cao, Lihua Liu:
A Note on "New techniques for noninteractive zero-knowledge". CoRR abs/1805.06351 (2018) - [i72]Zhengjun Cao, Zhen Chen, Lihua Liu:
Analysis of Nederlof's algorithm for subset sum. CoRR abs/1807.02075 (2018) - [i71]Zhengjun Cao, Lihua Liu:
New Algorithms for Subset Sum Problem. CoRR abs/1807.02611 (2018) - [i70]Zhengjun Cao, Lihua Liu:
Remarks on Bell's Inequality. IACR Cryptol. ePrint Arch. 2018: 231 (2018) - [i69]Zhengjun Cao, Jeffrey Uhlmann, Lihua Liu:
Analysis of Deutsch-Jozsa Quantum Algorithm. IACR Cryptol. ePrint Arch. 2018: 249 (2018) - [i68]Zhengjun Cao, Lihua Liu:
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System. IACR Cryptol. ePrint Arch. 2018: 327 (2018) - [i67]Zhengjun Cao, Lihua Liu:
A Note On Clauser-Horne-Shimony-Holt Inequality. IACR Cryptol. ePrint Arch. 2018: 410 (2018) - 2017
- [j12]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. Int. J. Netw. Secur. 19(1): 91-98 (2017) - [j11]Zhengjun Cao, Lihua Liu:
A Note on Two Schemes for Secure Outsourcing of Linear Programming. Int. J. Netw. Secur. 19(2): 323-326 (2017) - [j10]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. Int. J. Netw. Secur. 19(6): 950-954 (2017) - 2016
- [j9]Zhengjun Cao, Lihua Liu, Zhenzhen Yan:
An Improved Lindell-Waisbard Private Web Search Scheme. Int. J. Netw. Secur. 18(3): 538-543 (2016) - [j8]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
On Two Kinds of Flaws in Some Server-Aided Verification Schemes. Int. J. Netw. Secur. 18(6): 1054-1059 (2016) - [j7]Zhengjun Cao, Lihua Liu:
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations". IEEE Trans. Parallel Distributed Syst. 27(5): 1551-1552 (2016) - [i66]Zhengjun Cao, Lihua Liu:
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization". CoRR abs/1601.01079 (2016) - [i65]Zhengjun Cao, Lihua Liu:
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud". CoRR abs/1603.07399 (2016) - [i64]Zhengjun Cao, Lihua Liu:
A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem. CoRR abs/1606.07823 (2016) - [i63]Zhengjun Cao, Lihua Liu:
A Note On One Realization of a Scalable Shor Algorithm. CoRR abs/1611.00028 (2016) - [i62]Zhengjun Cao, Lihua Liu:
A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". IACR Cryptol. ePrint Arch. 2016: 448 (2016) - [i61]Zhengjun Cao, Lihua Liu:
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. IACR Cryptol. ePrint Arch. 2016: 698 (2016) - [i60]Zhengjun Cao, Lihua Liu:
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2016: 699 (2016) - [i59]Zhengjun Cao, Lihua Liu:
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented. IACR Cryptol. ePrint Arch. 2016: 979 (2016) - 2015
- [j6]Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. Int. J. Netw. Secur. 17(2): 103-109 (2015) - [j5]Zhengjun Cao, Lihua Liu:
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. Int. J. Netw. Secur. 17(4): 454-462 (2015) - [c19]Zhengjun Cao, Zhenzhen Yan, Lihua Liu:
A fast string matching algorithm based on lowlight characters in the pattern. ICACI 2015: 179-182 - [i58]Zhengjun Cao, Lihua Liu:
A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like. CoRR abs/1502.04544 (2015) - [i57]Zhengjun Cao, Lihua Liu:
On the Weakness of Fully Homomorphic Encryption. CoRR abs/1511.05341 (2015) - [i56]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. CoRR abs/1511.05787 (2015) - [i55]Zhengjun Cao, Lihua Liu:
Comment on Two schemes for Secure Outsourcing of Linear Programming. CoRR abs/1511.06470 (2015) - [i54]Lihua Liu, Zhengjun Cao:
A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings". CoRR abs/1512.05413 (2015) - [i53]Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. IACR Cryptol. ePrint Arch. 2015: 84 (2015) - [i52]Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. IACR Cryptol. ePrint Arch. 2015: 299 (2015) - [i51]Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". IACR Cryptol. ePrint Arch. 2015: 1133 (2015) - [i50]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. IACR Cryptol. ePrint Arch. 2015: 1207 (2015) - [i49]Zhengjun Cao, Zhenfu Cao:
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability. IACR Cryptol. ePrint Arch. 2015: 1251 (2015) - 2014
- [j4]Zhengjun Cao, Xiangjia Wu:
An improvement of the Barrett modular reduction algorithm. Int. J. Comput. Math. 91(9): 1874-1879 (2014) - [i48]Zhengjun Cao, Lihua Liu:
A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern. CoRR abs/1401.7110 (2014) - [i47]Zhengjun Cao, Lihua Liu:
Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P. CoRR abs/1402.0146 (2014) - [i46]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. CoRR abs/1408.3452 (2014) - [i45]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. CoRR abs/1408.4846 (2014) - [i44]Zhengjun Cao, Lihua Liu:
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm. CoRR abs/1408.6252 (2014) - [i43]Zhengjun Cao, Lihua Liu:
The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited. CoRR abs/1408.6610 (2014) - [i42]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. CoRR abs/1409.7352 (2014) - [i41]Zhengjun Cao, Ruizhong Wei, Xiaodong Lin:
A Fast Modular Reduction Method. IACR Cryptol. ePrint Arch. 2014: 40 (2014) - [i40]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. IACR Cryptol. ePrint Arch. 2014: 679 (2014) - [i39]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2014: 680 (2014) - [i38]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. IACR Cryptol. ePrint Arch. 2014: 721 (2014) - [i37]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm. IACR Cryptol. ePrint Arch. 2014: 828 (2014) - [i36]Zhengjun Cao, Lihua Liu:
Analysis of Lewko-Sahai-Waters Revocation System. IACR Cryptol. ePrint Arch. 2014: 937 (2014) - 2013
- [c18]Zhengjun Cao, Xiangjia Wu, Hanyue Cao:
Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order. CSC 2013: 128-133 - [c17]Zhengjun Cao, Frédéric Lafitte, Olivier Markowitch:
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme. Inscrypt 2013: 282-288 - [c16]Lihua Liu, Zhengjun Cao, Qian Sha:
Improved Randomized Algorithm for Square Root Extraction. ICICA (2) 2013: 527-535 - [i35]Zhengjun Cao:
On Two Conversion Methods of Decimal-to-Binary. CoRR abs/1308.0555 (2013) - [i34]Zhengjun Cao, Lihua Liu:
Ordered Probability Mass Function. CoRR abs/1309.1432 (2013) - [i33]Zhengjun Cao:
A Note On the Storage Requirement for AKS Primality Testing Algorithm. IACR Cryptol. ePrint Arch. 2013: 449 (2013) - [i32]Zhengjun Cao:
Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications. IACR Cryptol. ePrint Arch. 2013: 474 (2013) - [i31]Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 497 (2013) - [i30]Zhengjun Cao, Lihua Liu:
Improvement of One Anonymous Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2013: 505 (2013) - [i29]Zhengjun Cao, Lihua Liu:
Improvement of One Adaptive Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 517 (2013) - [i28]Zhengjun Cao, Lihua Liu:
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis. IACR Cryptol. ePrint Arch. 2013: 788 (2013) - [i27]Zhengjun Cao, Lihua Liu:
A Note on Bilinear Groups of a Large Composite Order. IACR Cryptol. ePrint Arch. 2013: 812 (2013) - 2012
- [c15]Zhengjun Cao, Hanyue Cao:
On Fast Division Algorithm for Polynomials Using Newton Iteration. ICICA (LNCS) 2012: 175-180 - 2011
- [c14]Zhengjun Cao, Qian Sha, Xiao Fan:
Adleman-Manders-Miller Root Extraction Method Revisited. Inscrypt 2011: 77-85 - [c13]Zhengjun Cao, Xiao Fan:
Extension of Barreto-Voloch Root Extraction Method. ICICS 2011: 184-189 - [i26]Zhengjun Cao, Xiao Fan:
Improvement Of Barreto-Voloch Algorithm For Computing $r$th Roots Over Finite Fields. CoRR abs/1110.4801 (2011) - [i25]Zhengjun Cao, Xiao Fan:
A Heuristic Description of Fast Fourier Transform. CoRR abs/1110.5989 (2011) - [i24]Zhengjun Cao, Qian Sha, Xiao Fan:
Adleman-Manders-Miller Root Extraction Method Revisited. CoRR abs/1111.4877 (2011) - [i23]Zhengjun Cao, Hanyue Cao:
Note on fast division algorithm for polynomials using Newton iteration. CoRR abs/1112.4014 (2011) - 2010
- [c12]Lihua Liu, Zhengjun Cao:
Improvement of one escrow-free identity-based signature. WCNIS 2010: 602-606 - [i22]Zhengjun Cao:
A Principle for Cryptographic Protocols Beyond Security, Less Parameters. IACR Cryptol. ePrint Arch. 2010: 51 (2010) - [i21]Zhengjun Cao:
An Anonymous ID-based Encryption Revisited. IACR Cryptol. ePrint Arch. 2010: 65 (2010) - [i20]Zhengjun Cao:
A Note On Gottesman-Chuang Quantum Signature Scheme. IACR Cryptol. ePrint Arch. 2010: 317 (2010)
2000 – 2009
- 2009
- [c11]Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. ACIS-ICIS 2009: 635-640 - [c10]Zhengjun Cao, Olivier Markowitch:
Different Authentication Properties and a Signcryption Scheme Revisited. CIS (1) 2009: 395-399 - [c9]Lihua Liu, Zhengjun Cao:
Analysis of Two Signature Schemes from CIS'2006. CIS (1) 2009: 405-408 - [c8]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Generalized Greedy Algorithm for Shortest Superstring. Complex (2) 2009: 1526-1531 - [c7]Zhengjun Cao, Olivier Markowitch:
Security Analysis of One Quantum Digital Signature Scheme. ITNG 2009: 1574-1576 - [i19]Zhengjun Cao:
Analysis of one quantum bit string commitment. IACR Cryptol. ePrint Arch. 2009: 196 (2009) - [i18]