×

Deng, Robert Huijie

Author ID: deng.robert-huijie Recent zbMATH articles by "Deng, Robert Huijie"
Published as: Deng, Robert H.; Deng, Robert; Deng, Robert Huijie; Deng, R. H.
all top 5

Co-Authors

1 single-authored
46 Bao, Feng
21 Weng, Jian
13 Lai, Junzuo
13 Zhou, Jianying
11 Li, Yingjiu
10 Liu, Shengli
10 Yang, Yanjiang
8 Qin, Baodong
8 Wu, Hongjun
6 Cui, Hui
6 Wang, Guilin
5 Ding, Xuhua
5 Pang, HweeHwa
4 Li, Tieyan
4 Zhao, Yunlei
3 Chen, Kefei
3 Chen, Minrong
3 Chow, Sherman S. M.
3 Huang, Xinyi
3 Ma, Di
3 Ning, Jianting
3 Ren, Kui
3 Wan, Zhiguo
3 Wu, Yongdong
2 Au, Man Ho
2 Chu, Cheng-Kang
2 Costello, Daniel J. jun.
2 Feng, Peirong
2 Guan, Chaowen
2 Han, Yongfei
2 He, Kai
2 Herro, Mark A.
2 Li, Yuanxing
2 Liu, Joseph K. K.
2 Liu, Ximeng
2 Ma, Changshe
2 Mu, Yi
2 Sakurai, Kouichi
2 Shen, Jiachen
2 Wang, Shuhong
2 Wang, Yujue
2 Xu, Shengmin
2 Yan, Zheng
2 Yao, Gang
2 Ye, Dingfeng
2 Ye, Qin-Zhong
2 Yuan, Jiaming
2 Yung, Moti
2 Zhu, Huafei
1 Ananda, Akkihebbal L.
1 Cai, Shaoying
1 Chen, Lanxiang
1 Chen, Liqun
1 Ching, Albert
1 Ding, Wenxiu
1 Ding, Yong
1 Du, Jiangling
1 Fan, Kefeng
1 Feng, Dengguo
1 Gao, Xiang
1 Gauthier-Umaña, Valérie
1 Geiselmann, Willi
1 Goi, Bok-Min
1 Gu, Dawu
1 Guo, Fuchun
1 Guo, Yan
1 Igarashi, Yoshihide
1 Intan, Rolly
1 Jeng, A.
1 Jeng, Albert B.
1 Joye, Marc
1 Kankanhalli, Mohan S.
1 Kim, Kwangjo
1 Ko, Chi Chung
1 Kou, Weidong
1 Kwak, DongJin
1 Kwak, Jin Ho
1 Lafanechére, Alain
1 Lai, Xuejia
1 Li, Xiangxue
1 Li, Yannan
1 Liu, Weiwei
1 Lo, Swee-Won
1 Loh, Jia-Ch’ng
1 Lopez, Javier
1 Lou, Wenjing
1 Lu, Rongxing
1 Ma, Jianfeng
1 Ma, Jinhua
1 Ma, Siqi
1 Mao, Yijun
1 Meng, Weizhi
1 Moon, SangJae
1 Narasimhalu, A. D.
1 Ngair, Teow-Hin
1 Ochoa, Martín
1 Phan, Raphael Chung-Wei
1 Pietrobon, Steven S.
1 Poh, Geong Sen
1 Preneel, Bart
...and 37 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

64 Publications have been cited 327 times in 272 Documents Cited by Year
On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016
Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei
24
1994
Efficient unidirectional proxy re-encryption. Zbl 1284.94064
Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H.
23
2010
A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521
Bao, Feng; Deng, Robert H.
23
1998
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei
16
2015
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei
16
2008
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli
15
2015
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060
Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert
14
2010
Server-aided revocable attribute-based encryption. Zbl 1519.68027
Cui, Hui; Deng, Robert H.; Li, Yingjiu; Qin, Baodong
12
2016
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036
Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T.
11
1998
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei
11
2014
Security analysis of some proxy signatures. Zbl 1092.94518
Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H.
10
2004
Conditional proxy broadcast re-encryption. Zbl 1284.94065
Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H.
10
2009
Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106
Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng
10
2009
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong
9
2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Zbl 1497.94127
Weng, Jian; Chen, Minrong; Yang, Yanjiang; Deng, Robert; Chen, Kefei; Bao, Feng
9
2010
Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097
Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue
7
2011
Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082
Lai, Junzuo; Deng, Robert H.; Li, Yingjiu
7
2011
Some remarks on a fair exchange protocol. Zbl 0966.68068
Zhou, Jianying; Deng, Robert; Bao, Feng
6
2000
Authorized keyword search on encrypted data. Zbl 1477.68099
Shi, Jie; Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian
6
2014
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei
6
2010
Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060
Ding, Wenxiu; Yan, Zheng; Deng, Robert H.
5
2017
CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067
Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian
5
2016
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104
He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H.
4
2016
Accountable authority identity-based encryption with public traceability. Zbl 1312.94067
Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian
4
2013
Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510
Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong
3
1998
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli
3
2011
Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067
Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian
3
2014
Escrow free attribute-based signature with self-revealability. Zbl 1428.94069
Cui, Hui; Wang, Guilin; Deng, Robert H.; Qin, Baodong
3
2016
Multiuser private queries over encrypted databases. Zbl 1171.68460
Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H.
3
2009
New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101
Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen
3
2005
New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102
Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen
3
2005
Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083
Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua
3
2017
Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225
Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang
2
2014
Verifiable computation on outsourced encrypted data. Zbl 1477.68059
Lai, Junzuo; Deng, Robert H.; Pang, Hweehwa; Weng, Jian
2
2014
Dynamic secure cloud storage with provenance. Zbl 1301.68116
Chow, Sherman S. M.; Chu, Cheng-Kang; Huang, Xinyi; Zhou, Jianying; Deng, Robert H.
2
2012
RSA-type signatures in the presence of transient faults. Zbl 1083.94515
Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H.
2
1997
A new framework for RFID privacy. Zbl 1404.94063
Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei
2
2010
Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456
Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo
2
2003
Trellis-coded multidimensional phase modulation. Zbl 0702.94003
Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun.
2
1990
Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068
Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu
2
2017
Evolution of fair non-repudiation with TTP. Zbl 0924.68078
Zhou, Jianying; Deng, Robert; Bao, Feng
1
1999
Improved truncated differential attacks on SAFER. Zbl 0983.94038
Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong
1
1998
Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510
Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun
1
2001
An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052
Bao, Feng; Deng, Robert H.; Feng, Peirong
1
2001
Privacy protection for transactions of digital goods. Zbl 1050.68537
Bao, Feng; Deng, Robert
1
2001
On the security of two identity-based conditional proxy re-encryption schemes. Zbl 1371.94641
He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K.
1
2016
Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Zbl 1049.94003
1
2004
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512
Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U.
1
2004
Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367
Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin
1
2005
DC-free coset codes. Zbl 0656.94017
Deng, Robert H.; Herro, Mark A.
1
1988
Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018
Deng, Robert H.; Costello, Daniel J. jun.
1
1987
Security analysis of two signcryption schemes. Zbl 1109.68489
Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae
1
2004
nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099
Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart
1
2008
Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442
Zhu, Huafei; Bao, Feng; Deng, Robert H.
1
2005
Authenticating query results in data publishing. Zbl 1122.94435
Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying
1
2005
Validating digital signatures without TTP’s time-stamping and certificate revocation. Zbl 1185.94086
Zhou, Jianying; Bao, Feng; Deng, Robert
1
2003
Routing optimization security in mobile IPv6. Zbl 1113.68022
Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H.
1
2006
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320
Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng
1
2016
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. Zbl 1381.94093
Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo
1
2016
An efficient PIR construction using trusted hardware. Zbl 1181.68140
Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng
1
2008
Private information retrieval using trusted hardware. Zbl 1487.68094
Wang, Shuhong; Ding, Xuhua; Deng, Robert H.; Bao, Feng
1
2006
CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Zbl 1435.68081
Wang, Yujue; Pang, HweeHwa; Tran, Ngoc Hieu; Deng, Robert H.
1
2017
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Zbl 1457.68083
Cui, Hui; Deng, Robert H.; Qin, Baodong; Weng, Jian
1
2020
Expressive query over outsourced encrypted data. Zbl 1440.68066
Yang, Yang; Liu, Ximeng; Deng, Robert
1
2018
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Zbl 1457.68083
Cui, Hui; Deng, Robert H.; Qin, Baodong; Weng, Jian
1
2020
Expressive query over outsourced encrypted data. Zbl 1440.68066
Yang, Yang; Liu, Ximeng; Deng, Robert
1
2018
Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060
Ding, Wenxiu; Yan, Zheng; Deng, Robert H.
5
2017
Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083
Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua
3
2017
Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068
Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu
2
2017
CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Zbl 1435.68081
Wang, Yujue; Pang, HweeHwa; Tran, Ngoc Hieu; Deng, Robert H.
1
2017
Server-aided revocable attribute-based encryption. Zbl 1519.68027
Cui, Hui; Deng, Robert H.; Li, Yingjiu; Qin, Baodong
12
2016
CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067
Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian
5
2016
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104
He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H.
4
2016
Escrow free attribute-based signature with self-revealability. Zbl 1428.94069
Cui, Hui; Wang, Guilin; Deng, Robert H.; Qin, Baodong
3
2016
On the security of two identity-based conditional proxy re-encryption schemes. Zbl 1371.94641
He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K.
1
2016
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320
Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng
1
2016
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. Zbl 1381.94093
Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo
1
2016
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei
16
2015
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli
15
2015
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei
11
2014
Authorized keyword search on encrypted data. Zbl 1477.68099
Shi, Jie; Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian
6
2014
Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067
Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian
3
2014
Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225
Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang
2
2014
Verifiable computation on outsourced encrypted data. Zbl 1477.68059
Lai, Junzuo; Deng, Robert H.; Pang, Hweehwa; Weng, Jian
2
2014
Accountable authority identity-based encryption with public traceability. Zbl 1312.94067
Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian
4
2013
Dynamic secure cloud storage with provenance. Zbl 1301.68116
Chow, Sherman S. M.; Chu, Cheng-Kang; Huang, Xinyi; Zhou, Jianying; Deng, Robert H.
2
2012
Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097
Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue
7
2011
Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082
Lai, Junzuo; Deng, Robert H.; Li, Yingjiu
7
2011
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli
3
2011
Efficient unidirectional proxy re-encryption. Zbl 1284.94064
Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H.
23
2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060
Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert
14
2010
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong
9
2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Zbl 1497.94127
Weng, Jian; Chen, Minrong; Yang, Yanjiang; Deng, Robert; Chen, Kefei; Bao, Feng
9
2010
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei
6
2010
A new framework for RFID privacy. Zbl 1404.94063
Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei
2
2010
Conditional proxy broadcast re-encryption. Zbl 1284.94065
Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H.
10
2009
Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106
Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng
10
2009
Multiuser private queries over encrypted databases. Zbl 1171.68460
Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H.
3
2009
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei
16
2008
nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099
Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart
1
2008
An efficient PIR construction using trusted hardware. Zbl 1181.68140
Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng
1
2008
Routing optimization security in mobile IPv6. Zbl 1113.68022
Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H.
1
2006
Private information retrieval using trusted hardware. Zbl 1487.68094
Wang, Shuhong; Ding, Xuhua; Deng, Robert H.; Bao, Feng
1
2006
New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101
Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen
3
2005
New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102
Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen
3
2005
Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367
Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin
1
2005
Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442
Zhu, Huafei; Bao, Feng; Deng, Robert H.
1
2005
Authenticating query results in data publishing. Zbl 1122.94435
Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying
1
2005
Security analysis of some proxy signatures. Zbl 1092.94518
Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H.
10
2004
Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Zbl 1049.94003
1
2004
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512
Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U.
1
2004
Security analysis of two signcryption schemes. Zbl 1109.68489
Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae
1
2004
Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456
Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo
2
2003
Validating digital signatures without TTP’s time-stamping and certificate revocation. Zbl 1185.94086
Zhou, Jianying; Bao, Feng; Deng, Robert
1
2003
Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510
Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun
1
2001
An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052
Bao, Feng; Deng, Robert H.; Feng, Peirong
1
2001
Privacy protection for transactions of digital goods. Zbl 1050.68537
Bao, Feng; Deng, Robert
1
2001
Some remarks on a fair exchange protocol. Zbl 0966.68068
Zhou, Jianying; Deng, Robert; Bao, Feng
6
2000
Evolution of fair non-repudiation with TTP. Zbl 0924.68078
Zhou, Jianying; Deng, Robert; Bao, Feng
1
1999
A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521
Bao, Feng; Deng, Robert H.
23
1998
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036
Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T.
11
1998
Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510
Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong
3
1998
Improved truncated differential attacks on SAFER. Zbl 0983.94038
Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong
1
1998
RSA-type signatures in the presence of transient faults. Zbl 1083.94515
Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H.
2
1997
On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016
Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei
24
1994
Trellis-coded multidimensional phase modulation. Zbl 0702.94003
Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun.
2
1990
DC-free coset codes. Zbl 0656.94017
Deng, Robert H.; Herro, Mark A.
1
1988
Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018
Deng, Robert H.; Costello, Daniel J. jun.
1
1987
all top 5

Cited by 646 Authors

15 Deng, Robert Huijie
13 Weng, Jian
12 Susilo, Willy
11 Lai, Junzuo
9 Qin, Baodong
7 Huang, Zhengan
6 Liu, Shengli
6 Liu, Ximeng
6 Matsuda, Takahiro
6 Mu, Yi
5 Au, Man Ho
5 Gu, Dawu
5 Guo, Fuchun
5 Hanaoka, Goichiro
5 Jia, Dingding
5 Kawai, Yutaka
5 Wang, Huaxiong
5 Zhang, Futai
4 Chen, Kefei
4 Chen, Yu
4 Chow, Sherman S. M.
4 Cui, Hui
4 Damgård, Ivan Bjerre
4 Emura, Keita
4 Han, Shuai
4 He, Kai
4 Hu, Yupu
4 Huang, Qiong
4 Li, Bao
4 Liang, Kaitai
4 Liu, Joseph K. K.
4 Sun, Shifeng
4 Tang, Qiang
4 Venturi, Daniele
4 Wong, Duncan S.
3 Bao, Feng
3 Cao, Zhenfu
3 Chen, Rongmao
3 Faust, Sebastian
3 Fu, Anmin
3 Kiayias, Aggelos
3 Lai, Jianchang
3 Li, Jiguo
3 Li, Jin
3 Libert, Benoît
3 Lu, Xianhui
3 Ma, Jianfeng
3 Nuida, Koji
3 Rangan, Chandrasekharan Pandu
3 Shao, Jun
3 Sun, Yinxia
3 Takayasu, Atsushi
3 Xu, Chunxiang
3 Yang, Yanjiang
3 Yu, Yu
3 Yuen, Tsz Hon
3 Zhang, Mingwu
3 Zhang, Zhenfeng
3 Zheng, Dong
3 Zhou, Jianying
2 Baldi, Marco
2 Bernstein, Daniel Julius
2 Berzati, Alexandre
2 Boztaş, Serdar
2 Canovas, Cécile
2 Chen, Minrong
2 Chen, Wenbin
2 Chen, Xiaofeng
2 Chen, Xinjian
2 Chiaraluce, Franco
2 Chu, Cheng-Kang
2 Dallot, Léonard
2 Ding, Xuhua
2 Duong, Dung Hoang
2 Dutta, Ratna
2 Fan, Kai
2 Faonio, Antonio
2 Ferrer-Gomila, Josep Lluís
2 Fujisaki, Eiichiro
2 Fukushima, Kazuhide
2 Goubin, Louis
2 Hirano, Takato
2 Huang, Xinyi
2 Jiang, Peng
2 Katsumata, Shuichi
2 Kim, Chong Hee
2 Kim, Kwangjo
2 Kiyomoto, Shinsaku
2 Koseki, Yoshihiro
2 Kou, Weidong
2 Kumar, Neeraj
2 Kunihiro, Noboru
2 Lange, Tanja
2 Lee, Hyungtae
2 Lin, X. Sheldon
2 Liu, Feng-Hao
2 Liu, Xueqiao
2 Lu, Rongxing
2 Ma, Xiaoxiao
2 Mao, Xianping
...and 546 more Authors

Citations by Year