default search action
Zhengjun Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Zhengjun Cao:
A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network". IEEE Syst. J. 18(1): 391-393 (2024) - [j25]Zhengjun Cao:
Corrections to "Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision". IEEE Trans. Dependable Secur. Comput. 21(4): 4304-4305 (2024) - [j24]Zhengjun Cao:
Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device". Telecommun. Syst. 86(3): 393-397 (2024) - [i110]Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". IACR Cryptol. ePrint Arch. 2024: 13 (2024) - [i109]Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2024: 454 (2024) - [i108]Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. IACR Cryptol. ePrint Arch. 2024: 608 (2024) - [i107]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". IACR Cryptol. ePrint Arch. 2024: 638 (2024) - [i106]Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". IACR Cryptol. ePrint Arch. 2024: 683 (2024) - [i105]Zhengjun Cao, Lihua Liu:
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain". IACR Cryptol. ePrint Arch. 2024: 1144 (2024) - [i104]Zhengjun Cao, Lihua Liu:
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters". IACR Cryptol. ePrint Arch. 2024: 1158 (2024) - [i103]Zhengjun Cao, Lihua Liu:
A note on "a novel authentication protocol for IoT-enabled devices". IACR Cryptol. ePrint Arch. 2024: 1191 (2024) - [i102]Zhengjun Cao, Lihua Liu:
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. IACR Cryptol. ePrint Arch. 2024: 1205 (2024) - [i101]Zhengjun Cao, Lihua Liu:
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2024: 1244 (2024) - [i100]Zhengjun Cao, Lihua Liu:
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IACR Cryptol. ePrint Arch. 2024: 1326 (2024) - [i99]Zhengjun Cao, Lihua Liu:
Design issues of "an anonymous authentication and key agreement protocol in smart living". IACR Cryptol. ePrint Arch. 2024: 1411 (2024) - [i98]Zhengjun Cao, Lihua Liu:
The Zeros of Zeta Function Revisited. IACR Cryptol. ePrint Arch. 2024: 1412 (2024) - [i97]Zhengjun Cao, Lihua Liu:
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud. IACR Cryptol. ePrint Arch. 2024: 1491 (2024) - 2023
- [j23]Zhengjun Cao:
A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services". Wirel. Pers. Commun. 133(4): 2439-2444 (2023) - [i96]Zhengjun Cao, Lihua Liu:
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT". IACR Cryptol. ePrint Arch. 2023: 646 (2023) - [i95]Zhengjun Cao, Lihua Liu:
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things". IACR Cryptol. ePrint Arch. 2023: 658 (2023) - [i94]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment". IACR Cryptol. ePrint Arch. 2023: 684 (2023) - [i93]Zhengjun Cao, Lihua Liu:
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT". IACR Cryptol. ePrint Arch. 2023: 726 (2023) - [i92]Zhengjun Cao, Lihua Liu:
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System". IACR Cryptol. ePrint Arch. 2023: 757 (2023) - [i91]Zhengjun Cao, Lihua Liu:
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems". IACR Cryptol. ePrint Arch. 2023: 814 (2023) - [i90]Zhengjun Cao, Lihua Liu:
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network". IACR Cryptol. ePrint Arch. 2023: 889 (2023) - [i89]Zhengjun Cao, Lihua Liu:
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function". IACR Cryptol. ePrint Arch. 2023: 993 (2023) - [i88]Zhengjun Cao, Lihua Liu:
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment". IACR Cryptol. ePrint Arch. 2023: 1065 (2023) - [i87]Zhengjun Cao, Lihua Liu:
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation". IACR Cryptol. ePrint Arch. 2023: 1248 (2023) - [i86]Zhengjun Cao, Lihua Liu:
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid". IACR Cryptol. ePrint Arch. 2023: 1296 (2023) - [i85]Zhengjun Cao, Lihua Liu:
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor". IACR Cryptol. ePrint Arch. 2023: 1430 (2023) - [i84]Zhengjun Cao, Lihua Liu:
A note on "authenticated key agreement protocols for dew-assisted IoT systems". IACR Cryptol. ePrint Arch. 2023: 1497 (2023) - [i83]Zhengjun Cao, Lihua Liu:
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments". IACR Cryptol. ePrint Arch. 2023: 1540 (2023) - [i82]Zhengjun Cao, Lihua Liu:
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement. IACR Cryptol. ePrint Arch. 2023: 1592 (2023) - [i81]Zhengjun Cao, Lihua Liu:
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0". IACR Cryptol. ePrint Arch. 2023: 1629 (2023) - [i80]Zhengjun Cao, Lihua Liu:
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement". IACR Cryptol. ePrint Arch. 2023: 1671 (2023) - [i79]Zhengjun Cao:
A note on "a novel authentication and key agreement scheme for Internet of Vehicles". IACR Cryptol. ePrint Arch. 2023: 1696 (2023) - [i78]Zhengjun Cao:
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". IACR Cryptol. ePrint Arch. 2023: 1771 (2023) - [i77]Zhengjun Cao:
A note on quantum approximate optimization algorithm. IACR Cryptol. ePrint Arch. 2023: 1854 (2023) - [i76]Zhengjun Cao, Zhenfu Cao:
The Planck Constant and Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2023: 1971 (2023) - 2022
- [j22]Zhengjun Cao, Lihua Liu:
A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials. Int. J. Bifurc. Chaos 32(3): 2250044:1-2250044:8 (2022) - 2021
- [j21]Zhengjun Cao, Xiqi Wang, Lihua Liu:
One privacy-preserving multi-keyword ranked search scheme revisited. Int. J. Inf. Comput. Secur. 16(3/4): 375-384 (2021) - [j20]Zhengjun Cao, Olivier Markowitch:
A note on "new quantum key agreement protocols based on Bell states". Quantum Inf. Process. 20(2): 74 (2021) - [j19]Zhengjun Cao, Olivier Markowitch:
Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations". IEEE Trans. Big Data 7(6): 973-974 (2021) - [j18]Zhengjun Cao, Olivier Markowitch:
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing". IEEE Trans. Parallel Distributed Syst. 32(2): 392-393 (2021) - 2020
- [j17]Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. Int. J. Netw. Secur. 22(1): 36-40 (2020) - [j16]Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. Int. J. Netw. Secur. 22(2): 331-336 (2020) - [j15]Zhengjun Cao, Xiqi Wang, Lihua Liu:
A Note on One Popular Non-Interactive Zero-Knowledge Proof System. Int. J. Netw. Secur. 22(4): 681-685 (2020) - [i75]Zhengjun Cao, Lihua Liu:
Factoring Algorithm Based on Parameterized Newton Method. IACR Cryptol. ePrint Arch. 2020: 1142 (2020) - [i74]Zhengjun Cao, Lihua Liu, Leming Hong:
Evaluation Methods for Chebyshev Polynomials. IACR Cryptol. ePrint Arch. 2020: 1365 (2020)
2010 – 2019
- 2019
- [j14]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud". IEEE Trans. Cloud Comput. 7(3): 893 (2019) - 2018
- [j13]Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Int. J. Netw. Secur. 20(4): 683-688 (2018) - [i73]Zhengjun Cao, Lihua Liu:
A Note on "New techniques for noninteractive zero-knowledge". CoRR abs/1805.06351 (2018) - [i72]Zhengjun Cao, Zhen Chen, Lihua Liu:
Analysis of Nederlof's algorithm for subset sum. CoRR abs/1807.02075 (2018) - [i71]Zhengjun Cao, Lihua Liu:
New Algorithms for Subset Sum Problem. CoRR abs/1807.02611 (2018) - [i70]Zhengjun Cao, Lihua Liu:
Remarks on Bell's Inequality. IACR Cryptol. ePrint Arch. 2018: 231 (2018) - [i69]Zhengjun Cao, Jeffrey Uhlmann, Lihua Liu:
Analysis of Deutsch-Jozsa Quantum Algorithm. IACR Cryptol. ePrint Arch. 2018: 249 (2018) - [i68]Zhengjun Cao, Lihua Liu:
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System. IACR Cryptol. ePrint Arch. 2018: 327 (2018) - [i67]Zhengjun Cao, Lihua Liu:
A Note On Clauser-Horne-Shimony-Holt Inequality. IACR Cryptol. ePrint Arch. 2018: 410 (2018) - 2017
- [j12]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. Int. J. Netw. Secur. 19(1): 91-98 (2017) - [j11]Zhengjun Cao, Lihua Liu:
A Note on Two Schemes for Secure Outsourcing of Linear Programming. Int. J. Netw. Secur. 19(2): 323-326 (2017) - [j10]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. Int. J. Netw. Secur. 19(6): 950-954 (2017) - 2016
- [j9]Zhengjun Cao, Lihua Liu, Zhenzhen Yan:
An Improved Lindell-Waisbard Private Web Search Scheme. Int. J. Netw. Secur. 18(3): 538-543 (2016) - [j8]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
On Two Kinds of Flaws in Some Server-Aided Verification Schemes. Int. J. Netw. Secur. 18(6): 1054-1059 (2016) - [j7]Zhengjun Cao, Lihua Liu:
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations". IEEE Trans. Parallel Distributed Syst. 27(5): 1551-1552 (2016) - [i66]Zhengjun Cao, Lihua Liu:
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization". CoRR abs/1601.01079 (2016) - [i65]Zhengjun Cao, Lihua Liu:
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud". CoRR abs/1603.07399 (2016) - [i64]Zhengjun Cao, Lihua Liu:
A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem. CoRR abs/1606.07823 (2016) - [i63]Zhengjun Cao, Lihua Liu:
A Note On One Realization of a Scalable Shor Algorithm. CoRR abs/1611.00028 (2016) - [i62]Zhengjun Cao, Lihua Liu:
A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". IACR Cryptol. ePrint Arch. 2016: 448 (2016) - [i61]Zhengjun Cao, Lihua Liu:
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. IACR Cryptol. ePrint Arch. 2016: 698 (2016) - [i60]Zhengjun Cao, Lihua Liu:
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2016: 699 (2016) - [i59]Zhengjun Cao, Lihua Liu:
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented. IACR Cryptol. ePrint Arch. 2016: 979 (2016) - 2015
- [j6]Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. Int. J. Netw. Secur. 17(2): 103-109 (2015) - [j5]Zhengjun Cao, Lihua Liu:
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. Int. J. Netw. Secur. 17(4): 454-462 (2015) - [c19]Zhengjun Cao, Zhenzhen Yan, Lihua Liu:
A fast string matching algorithm based on lowlight characters in the pattern. ICACI 2015: 179-182 - [i58]Zhengjun Cao, Lihua Liu:
A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like. CoRR abs/1502.04544 (2015) - [i57]Zhengjun Cao, Lihua Liu:
On the Weakness of Fully Homomorphic Encryption. CoRR abs/1511.05341 (2015) - [i56]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. CoRR abs/1511.05787 (2015) - [i55]Zhengjun Cao, Lihua Liu:
Comment on Two schemes for Secure Outsourcing of Linear Programming. CoRR abs/1511.06470 (2015) - [i54]Lihua Liu, Zhengjun Cao:
A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings". CoRR abs/1512.05413 (2015) - [i53]Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. IACR Cryptol. ePrint Arch. 2015: 84 (2015) - [i52]Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. IACR Cryptol. ePrint Arch. 2015: 299 (2015) - [i51]Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". IACR Cryptol. ePrint Arch. 2015: 1133 (2015) - [i50]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. IACR Cryptol. ePrint Arch. 2015: 1207 (2015) - [i49]Zhengjun Cao, Zhenfu Cao:
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability. IACR Cryptol. ePrint Arch. 2015: 1251 (2015) - 2014
- [j4]Zhengjun Cao, Xiangjia Wu:
An improvement of the Barrett modular reduction algorithm. Int. J. Comput. Math. 91(9): 1874-1879 (2014) - [i48]Zhengjun Cao, Lihua Liu:
A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern. CoRR abs/1401.7110 (2014) - [i47]Zhengjun Cao, Lihua Liu:
Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P. CoRR abs/1402.0146 (2014) - [i46]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. CoRR abs/1408.3452 (2014) - [i45]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. CoRR abs/1408.4846 (2014) - [i44]Zhengjun Cao, Lihua Liu:
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm. CoRR abs/1408.6252 (2014) - [i43]Zhengjun Cao, Lihua Liu:
The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited. CoRR abs/1408.6610 (2014) - [i42]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. CoRR abs/1409.7352 (2014) - [i41]Zhengjun Cao, Ruizhong Wei, Xiaodong Lin:
A Fast Modular Reduction Method. IACR Cryptol. ePrint Arch. 2014: 40 (2014) - [i40]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. IACR Cryptol. ePrint Arch. 2014: 679 (2014) - [i39]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2014: 680 (2014) - [i38]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. IACR Cryptol. ePrint Arch. 2014: 721 (2014) - [i37]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm. IACR Cryptol. ePrint Arch. 2014: 828 (2014) - [i36]Zhengjun Cao, Lihua Liu:
Analysis of Lewko-Sahai-Waters Revocation System. IACR Cryptol. ePrint Arch. 2014: 937 (2014) - 2013
- [c18]Zhengjun Cao, Xiangjia Wu, Hanyue Cao:
Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order. CSC 2013: 128-133 - [c17]Zhengjun Cao, Frédéric Lafitte, Olivier Markowitch:
A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme. Inscrypt 2013: 282-288 - [c16]Lihua Liu, Zhengjun Cao, Qian Sha:
Improved Randomized Algorithm for Square Root Extraction. ICICA (2) 2013: 527-535 - [i35]Zhengjun Cao:
On Two Conversion Methods of Decimal-to-Binary. CoRR abs/1308.0555 (2013) - [i34]Zhengjun Cao, Lihua Liu:
Ordered Probability Mass Function. CoRR abs/1309.1432 (2013) - [i33]Zhengjun Cao:
A Note On the Storage Requirement for AKS Primality Testing Algorithm. IACR Cryptol. ePrint Arch. 2013: 449 (2013) - [i32]Zhengjun Cao:
Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications. IACR Cryptol. ePrint Arch. 2013: 474 (2013) - [i31]Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 497 (2013) - [i30]Zhengjun Cao, Lihua Liu:
Improvement of One Anonymous Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2013: 505 (2013) - [i29]Zhengjun Cao, Lihua Liu:
Improvement of One Adaptive Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 517 (2013) - [i28]Zhengjun Cao, Lihua Liu:
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis. IACR Cryptol. ePrint Arch. 2013: 788 (2013) - [i27]Zhengjun Cao, Lihua Liu:
A Note on Bilinear Groups of a Large Composite Order. IACR Cryptol. ePrint Arch. 2013: 812 (2013) - 2012
- [c15]Zhengjun Cao, Hanyue Cao:
On Fast Division Algorithm for Polynomials Using Newton Iteration. ICICA (LNCS) 2012: 175-180 - 2011
- [c14]Zhengjun Cao, Qian Sha, Xiao Fan:
Adleman-Manders-Miller Root Extraction Method Revisited. Inscrypt 2011: 77-85 - [c13]Zhengjun Cao, Xiao Fan:
Extension of Barreto-Voloch Root Extraction Method. ICICS 2011: 184-189 - [i26]Zhengjun Cao, Xiao Fan:
Improvement Of Barreto-Voloch Algorithm For Computing $r$th Roots Over Finite Fields. CoRR abs/1110.4801 (2011) - [i25]Zhengjun Cao, Xiao Fan:
A Heuristic Description of Fast Fourier Transform. CoRR abs/1110.5989 (2011) - [i24]Zhengjun Cao, Qian Sha, Xiao Fan:
Adleman-Manders-Miller Root Extraction Method Revisited. CoRR abs/1111.4877 (2011) - [i23]Zhengjun Cao, Hanyue Cao:
Note on fast division algorithm for polynomials using Newton iteration. CoRR abs/1112.4014 (2011) - 2010
- [c12]Lihua Liu, Zhengjun Cao:
Improvement of one escrow-free identity-based signature. WCNIS 2010: 602-606 - [i22]Zhengjun Cao:
A Principle for Cryptographic Protocols Beyond Security, Less Parameters. IACR Cryptol. ePrint Arch. 2010: 51 (2010) - [i21]Zhengjun Cao:
An Anonymous ID-based Encryption Revisited. IACR Cryptol. ePrint Arch. 2010: 65 (2010) - [i20]Zhengjun Cao:
A Note On Gottesman-Chuang Quantum Signature Scheme. IACR Cryptol. ePrint Arch. 2010: 317 (2010)
2000 – 2009
- 2009
- [c11]Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. ACIS-ICIS 2009: 635-640 - [c10]Zhengjun Cao, Olivier Markowitch:
Different Authentication Properties and a Signcryption Scheme Revisited. CIS (1) 2009: 395-399 - [c9]Lihua Liu, Zhengjun Cao:
Analysis of Two Signature Schemes from CIS'2006. CIS (1) 2009: 405-408 - [c8]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Generalized Greedy Algorithm for Shortest Superstring. Complex (2) 2009: 1526-1531 - [c7]Zhengjun Cao, Olivier Markowitch:
Security Analysis of One Quantum Digital Signature Scheme. ITNG 2009: 1574-1576 - [i19]Zhengjun Cao:
Analysis of one quantum bit string commitment. IACR Cryptol. ePrint Arch. 2009: 196 (2009) - [i18]Zhengjun Cao:
Remarks on One Arbitrated Quantum-signature Scheme. IACR Cryptol. ePrint Arch. 2009: 237 (2009) - [i17]Zhengjun Cao:
Improvement of One Quantum Encryption Scheme. IACR Cryptol. ePrint Arch. 2009: 254 (2009) - [i16]Zhengjun Cao:
Remarks on Some Quantum Cryptographic Schemes. IACR Cryptol. ePrint Arch. 2009: 493 (2009) - 2008
- [j3]Zhengjun Cao, Mulan Liu:
Classification of signature-only signature models. Sci. China Ser. F Inf. Sci. 51(8): 1083-1095 (2008) - [c6]Zhengjun Cao, Lihua Liu:
A Group Key Agreement Scheme Revisited. IAS 2008: 95-98 - [p1]Lihua Liu, Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 181-187 - [i15]Zhengjun Cao:
How to Launch A Birthday Attack Against DES. IACR Cryptol. ePrint Arch. 2008: 288 (2008) - 2007
- [c5]Zhengjun Cao, Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited. ICICS 2007: 230-238 - [c4]Zhengjun Cao, Lihua Liu:
A Strong RSA Signature Scheme and Its Application. SNPD (1) 2007: 111-115 - [i14]Zhengjun Cao:
On the Big Gap Between |p| and |q| in DSA. IACR Cryptol. ePrint Arch. 2007: 320 (2007) - [i13]Zhengjun Cao:
On the Authentication of One Popular Signcryption Scheme. IACR Cryptol. ePrint Arch. 2007: 372 (2007) - [i12]Zhengjun Cao:
An Efficient Range-Bounded Commitment Scheme. IACR Cryptol. ePrint Arch. 2007: 376 (2007) - 2006
- [j2]Lihua Liu, Zhengjun Cao:
On computing ordN(2) and its application. Inf. Comput. 204(7): 1173-1178 (2006) - [c3]Zhengjun Cao:
Analysis of One Popular Group Signature Scheme. ASIACRYPT 2006: 460-466 - [c2]Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Inscrypt 2006: 1-12 - [i11]Zhengjun Cao:
Classification of Signature-only Signature Models. IACR Cryptol. ePrint Arch. 2006: 164 (2006) - 2005
- [c1]Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. CISC 2005: 290-301 - [i10]Lihua Liu, Zhengjun Cao:
On the Security of a Group Signature Scheme with Strong Separability. IACR Cryptol. ePrint Arch. 2005: 41 (2005) - [i9]Zhengjun Cao:
A Note on Shor's Quantum Algorithm for Prime Factorization. IACR Cryptol. ePrint Arch. 2005: 51 (2005) - [i8]Zhengjun Cao:
Untraceability of Two Group Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 55 (2005) - 2004
- [j1]Wen Song, Zhengjun Cao:
The generalized decomposition theorem in Banach spaces and its applications. J. Approx. Theory 129(2): 167-181 (2004) - [i7]Lihua Liu, Zhengjun Cao:
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. IACR Cryptol. ePrint Arch. 2004: 262 (2004) - [i6]Zhengjun Cao, Lihua Liu:
Untraceability of Wang-Fu Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 268 (2004) - [i5]Zhengjun Cao:
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 280 (2004) - [i4]Zhengjun Cao, Sherman S. M. Chow:
Security Flaws in a Pairing-based Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 299 (2004) - [i3]Zhengjun Cao:
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 307 (2004) - [i2]Zhengjun Cao:
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 316 (2004) - [i1]Zhengjun Cao:
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 326 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint