![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2024
- Tomoki Moriya, Hiroshi Onuki
, Maozhi Xu, Guoqing Zhou:
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation. PQCrypto (2) 2024: 3-19 - Guoqing Zhou, Maozhi Xu:
An Efficient Adaptive Attack Against FESTA. IACR Cryptol. ePrint Arch. 2024: 345 (2024) - 2023
- Mingyue Zhang
, Maozhi Wang, Daming Wang, Shangkun Wang, Wenxi Xu:
Organic Matter Retrieval in Black Soil Based on Oblique Extremum Signatures. Remote. Sens. 15(10): 2508 (2023) - Guoqing Zhou, Maozhi Xu:
A Polynomial-Time Attack on G2SIDH. ICICS 2023: 91-109 - 2022
- Jinyong Chang
, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. Comput. Networks 212: 109013 (2022) - Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue:
Identity-based remote data checking with a designated verifier. J. Cloud Comput. 11: 7 (2022) - Jinyong Chang
, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022) - Li Li, Maozhi Xu:
RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial Methods. CSP 2022: 11-15 - 2021
- Zhaozhong Guo
, Liucheng Shi
, Maozhi Xu, Hong Yin:
MRCC: A Practical Covert Channel Over Monero With Provable Security. IEEE Access 9: 31816-31825 (2021) - Liucheng Shi
, Zhaozhong Guo
, Maozhi Xu:
Bitmessage Plus: A Blockchain-Based Communication Protocol With High Practicality. IEEE Access 9: 21618-21626 (2021) - Chunming Tang, Maozhi Xu, Yanfeng Qi, Mingshuo Zhou:
A new class of p-ary regular bent functions. Adv. Math. Commun. 15(1): 55-64 (2021) - Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64(12) (2021) - Wenxi Xu
, Shu-Hua Chen
, Maozhi Wang, Wunian Yang
, Lu Wang:
Eliminating the end effect of empirical mode decomposition using a cubic spline based method. Digit. Signal Process. 110: 102936 (2021) - Yangpan Zhang, Maozhi Xu:
On the Linear Complexity of Feedforward Clock-Controlled Sequence. Inscrypt 2021: 331-348 - Liwei Liu, Maozhi Xu, Guoqing Zhou:
Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm Problems. CSP 2021: 45-49 - Yangpan Zhang, Maozhi Xu:
On the linear complexity of feedforward clock-controlled sequence. CoRR abs/2108.10770 (2021) - Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu:
A New Lever Function with Adequate Indeterminacy. CoRR abs/2108.13086 (2021) - 2020
- Zhaozhong Guo
, Liucheng Shi, Maozhi Xu:
SecRand: A Secure Distributed Randomness Generation Protocol With High Practicality and Scalability. IEEE Access 8: 203917-203929 (2020) - Jinyong Chang
, Yanyan Ji
, Bilin Shao
, Maozhi Xu, Rui Xue
:
Certificateless Homomorphic Signature Scheme for Network Coding. IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020) - Liwei Liu, Maozhi Xu:
Analysis of the Randomness Generation for PoS-Based Blockchains with Verifiable Delay Functions. BlockSys 2020: 661-674 - Liwei Liu, Maozhi Xu:
Improvements to the Descent Step in the Number Field Sieve for Discrete Logarithms. CITS 2020: 1-6 - 2019
- Dongmei Huang, Chunming Tang, Yanfeng Qi, Maozhi Xu:
New quadratic bent functions in polynomial forms with coefficients in extension fields. Appl. Algebra Eng. Commun. Comput. 30(4): 333-347 (2019) - Jinyong Chang
, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue:
RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE Access 7: 50858-50868 (2019) - Jinyong Chang
, Bilin Shao, Anling Zhang, Genqing Bian, Yanyan Ji, Maozhi Xu:
Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC. IEEE Access 7: 88393-88398 (2019) - Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu:
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. Comput. J. 62(8): 1232-1245 (2019) - Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue:
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91: 416-425 (2019) - Meng Zhang, Xuehong Chen, Maozhi Xu, Jie Wang:
On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography. BlockSys 2019: 60-70 - 2018
- Honglong Dai, Jinying Chang, Zhenduo Hou, Maozhi Xu:
Relaxing Enhanced Chosen-Ciphertext Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2454-2463 (2018) - Yanyan Ji, Jinyong Chang, Honglong Dai, Maozhi Xu:
On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2477-2480 (2018) - Meng Zhang, Maozhi Xu:
Generating Pairing-Friendly Elliptic Curves Using Parameterized Families. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 279-282 (2018)
skipping 46 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-11 23:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint