Edit Profile (opens in new tab) Deng, Robert Huijie Co-Author Distance Author ID: deng.robert-huijie Published as: Deng, Robert H.; Deng, Robert; Deng, Robert Huijie; Deng, R. H. more...less Documents Indexed: 96 Publications since 1987 13 Contributions as Editor Co-Authors: 137 Co-Authors with 107 Joint Publications 3,840 Co-Co-Authors all top 5 Co-Authors 1 single-authored 46 Bao, Feng 21 Weng, Jian 13 Lai, Junzuo 13 Zhou, Jianying 11 Li, Yingjiu 10 Liu, Shengli 10 Yang, Yanjiang 8 Qin, Baodong 8 Wu, Hongjun 6 Cui, Hui 6 Wang, Guilin 5 Ding, Xuhua 5 Pang, HweeHwa 4 Li, Tieyan 4 Zhao, Yunlei 3 Chen, Kefei 3 Chen, Minrong 3 Chow, Sherman S. M. 3 Huang, Xinyi 3 Ma, Di 3 Ning, Jianting 3 Ren, Kui 3 Wan, Zhiguo 3 Wu, Yongdong 2 Au, Man Ho 2 Chu, Cheng-Kang 2 Costello, Daniel J. jun. 2 Feng, Peirong 2 Guan, Chaowen 2 Han, Yongfei 2 He, Kai 2 Herro, Mark A. 2 Li, Yuanxing 2 Liu, Joseph K. K. 2 Liu, Ximeng 2 Ma, Changshe 2 Mu, Yi 2 Sakurai, Kouichi 2 Shen, Jiachen 2 Wang, Shuhong 2 Wang, Yujue 2 Xu, Shengmin 2 Yan, Zheng 2 Yao, Gang 2 Ye, Dingfeng 2 Ye, Qin-Zhong 2 Yuan, Jiaming 2 Yung, Moti 2 Zhu, Huafei 1 Ananda, Akkihebbal L. 1 Cai, Shaoying 1 Chen, Lanxiang 1 Chen, Liqun 1 Ching, Albert 1 Ding, Wenxiu 1 Ding, Yong 1 Du, Jiangling 1 Fan, Kefeng 1 Feng, Dengguo 1 Gao, Xiang 1 Gauthier-Umaña, Valérie 1 Geiselmann, Willi 1 Goi, Bok-Min 1 Gu, Dawu 1 Guo, Fuchun 1 Guo, Yan 1 Igarashi, Yoshihide 1 Intan, Rolly 1 Jeng, A. 1 Jeng, Albert B. 1 Joye, Marc 1 Kankanhalli, Mohan S. 1 Kim, Kwangjo 1 Ko, Chi Chung 1 Kou, Weidong 1 Kwak, DongJin 1 Kwak, Jin Ho 1 Lafanechére, Alain 1 Lai, Xuejia 1 Li, Xiangxue 1 Li, Yannan 1 Liu, Weiwei 1 Lo, Swee-Won 1 Loh, Jia-Ch’ng 1 Lopez, Javier 1 Lou, Wenjing 1 Lu, Rongxing 1 Ma, Jianfeng 1 Ma, Jinhua 1 Ma, Siqi 1 Mao, Yijun 1 Meng, Weizhi 1 Moon, SangJae 1 Narasimhalu, A. D. 1 Ngair, Teow-Hin 1 Ochoa, Martín 1 Phan, Raphael Chung-Wei 1 Pietrobon, Steven S. 1 Poh, Geong Sen 1 Preneel, Bart ...and 37 more Co-Authors all top 5 Serials 12 Information Sciences 12 Lecture Notes in Computer Science 4 IEEE Transactions on Computers 4 Computer Networks 3 IEEE Transactions on Information Theory 2 Theoretical Computer Science 2 International Journal of Applied Cryptography 2 Science China. Information Sciences 1 IEEE Transactions on Communications 1 Journal of Computer and System Sciences 1 Designs, Codes and Cryptography 1 Computer Networks and ISDN Systems 1 Informatica (Ljubljana) 1 Soft Computing Fields 92 Information and communication theory, circuits (94-XX) 59 Computer science (68-XX) 13 General and overarching topics; collections (00-XX) 2 Number theory (11-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 64 Publications have been cited 327 times in 272 Documents Cited by ▼ Year ▼ On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016 Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei 24 1994 Efficient unidirectional proxy re-encryption. Zbl 1284.94064 Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H. 23 2010 A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521 Bao, Feng; Deng, Robert H. 23 1998 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085 Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 16 2015 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026 Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 16 2008 Server-aided revocable identity-based encryption. Zbl 1499.68057 Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli 15 2015 Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060 Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert 14 2010 Server-aided revocable attribute-based encryption. Zbl 1519.68027 Cui, Hui; Deng, Robert H.; Li, Yingjiu; Qin, Baodong 12 2016 Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036 Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T. 11 1998 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 11 2014 Security analysis of some proxy signatures. Zbl 1092.94518 Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H. 10 2004 Conditional proxy broadcast re-encryption. Zbl 1284.94065 Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H. 10 2009 Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106 Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng 10 2009 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 9 2010 CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Zbl 1497.94127 Weng, Jian; Chen, Minrong; Yang, Yanjiang; Deng, Robert; Chen, Kefei; Bao, Feng 9 2010 Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097 Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue 7 2011 Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082 Lai, Junzuo; Deng, Robert H.; Li, Yingjiu 7 2011 Some remarks on a fair exchange protocol. Zbl 0966.68068 Zhou, Jianying; Deng, Robert; Bao, Feng 6 2000 Authorized keyword search on encrypted data. Zbl 1477.68099 Shi, Jie; Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian 6 2014 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078 Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 6 2010 Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060 Ding, Wenxiu; Yan, Zheng; Deng, Robert H. 5 2017 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067 Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 5 2016 Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104 He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. 4 2016 Accountable authority identity-based encryption with public traceability. Zbl 1312.94067 Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian 4 2013 Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510 Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 3 1998 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116 Lai, Junzuo; Deng, Robert H.; Liu, Shengli 3 2011 Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067 Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian 3 2014 Escrow free attribute-based signature with self-revealability. Zbl 1428.94069 Cui, Hui; Wang, Guilin; Deng, Robert H.; Qin, Baodong 3 2016 Multiuser private queries over encrypted databases. Zbl 1171.68460 Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 3 2009 New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101 Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102 Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083 Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua 3 2017 Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225 Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang 2 2014 Verifiable computation on outsourced encrypted data. Zbl 1477.68059 Lai, Junzuo; Deng, Robert H.; Pang, Hweehwa; Weng, Jian 2 2014 Dynamic secure cloud storage with provenance. Zbl 1301.68116 Chow, Sherman S. M.; Chu, Cheng-Kang; Huang, Xinyi; Zhou, Jianying; Deng, Robert H. 2 2012 RSA-type signatures in the presence of transient faults. Zbl 1083.94515 Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H. 2 1997 A new framework for RFID privacy. Zbl 1404.94063 Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei 2 2010 Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456 Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo 2 2003 Trellis-coded multidimensional phase modulation. Zbl 0702.94003 Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun. 2 1990 Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068 Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu 2 2017 Evolution of fair non-repudiation with TTP. Zbl 0924.68078 Zhou, Jianying; Deng, Robert; Bao, Feng 1 1999 Improved truncated differential attacks on SAFER. Zbl 0983.94038 Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 1 1998 Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510 Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun 1 2001 An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052 Bao, Feng; Deng, Robert H.; Feng, Peirong 1 2001 Privacy protection for transactions of digital goods. Zbl 1050.68537 Bao, Feng; Deng, Robert 1 2001 On the security of two identity-based conditional proxy re-encryption schemes. Zbl 1371.94641 He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K. 1 2016 Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Zbl 1049.94003 1 2004 Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512 Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U. 1 2004 Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367 Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin 1 2005 DC-free coset codes. Zbl 0656.94017 Deng, Robert H.; Herro, Mark A. 1 1988 Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018 Deng, Robert H.; Costello, Daniel J. jun. 1 1987 Security analysis of two signcryption schemes. Zbl 1109.68489 Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae 1 2004 nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099 Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart 1 2008 Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442 Zhu, Huafei; Bao, Feng; Deng, Robert H. 1 2005 Authenticating query results in data publishing. Zbl 1122.94435 Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying 1 2005 Validating digital signatures without TTP’s time-stamping and certificate revocation. Zbl 1185.94086 Zhou, Jianying; Bao, Feng; Deng, Robert 1 2003 Routing optimization security in mobile IPv6. Zbl 1113.68022 Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H. 1 2006 A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320 Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng 1 2016 An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. Zbl 1381.94093 Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo 1 2016 An efficient PIR construction using trusted hardware. Zbl 1181.68140 Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2008 Private information retrieval using trusted hardware. Zbl 1487.68094 Wang, Shuhong; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2006 CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Zbl 1435.68081 Wang, Yujue; Pang, HweeHwa; Tran, Ngoc Hieu; Deng, Robert H. 1 2017 Key regeneration-free ciphertext-policy attribute-based encryption and its application. Zbl 1457.68083 Cui, Hui; Deng, Robert H.; Qin, Baodong; Weng, Jian 1 2020 Expressive query over outsourced encrypted data. Zbl 1440.68066 Yang, Yang; Liu, Ximeng; Deng, Robert 1 2018 Key regeneration-free ciphertext-policy attribute-based encryption and its application. Zbl 1457.68083 Cui, Hui; Deng, Robert H.; Qin, Baodong; Weng, Jian 1 2020 Expressive query over outsourced encrypted data. Zbl 1440.68066 Yang, Yang; Liu, Ximeng; Deng, Robert 1 2018 Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060 Ding, Wenxiu; Yan, Zheng; Deng, Robert H. 5 2017 Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083 Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua 3 2017 Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068 Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu 2 2017 CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Zbl 1435.68081 Wang, Yujue; Pang, HweeHwa; Tran, Ngoc Hieu; Deng, Robert H. 1 2017 Server-aided revocable attribute-based encryption. Zbl 1519.68027 Cui, Hui; Deng, Robert H.; Li, Yingjiu; Qin, Baodong 12 2016 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067 Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 5 2016 Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104 He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. 4 2016 Escrow free attribute-based signature with self-revealability. Zbl 1428.94069 Cui, Hui; Wang, Guilin; Deng, Robert H.; Qin, Baodong 3 2016 On the security of two identity-based conditional proxy re-encryption schemes. Zbl 1371.94641 He, Kai; Weng, Jian; Deng, Robert H.; Liu, Joseph K. 1 2016 A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains. Zbl 1360.94320 Liu, Ximeng; Qin, Baodong; Deng, Robert H.; Lu, Rongxing; Ma, Jianfeng 1 2016 An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. Zbl 1381.94093 Cui, Hui; Deng, Robert H.; Wu, Guowei; Lai, Junzuo 1 2016 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085 Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 16 2015 Server-aided revocable identity-based encryption. Zbl 1499.68057 Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli 15 2015 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 11 2014 Authorized keyword search on encrypted data. Zbl 1477.68099 Shi, Jie; Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian 6 2014 Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067 Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian 3 2014 Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225 Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang 2 2014 Verifiable computation on outsourced encrypted data. Zbl 1477.68059 Lai, Junzuo; Deng, Robert H.; Pang, Hweehwa; Weng, Jian 2 2014 Accountable authority identity-based encryption with public traceability. Zbl 1312.94067 Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian 4 2013 Dynamic secure cloud storage with provenance. Zbl 1301.68116 Chow, Sherman S. M.; Chu, Cheng-Kang; Huang, Xinyi; Zhou, Jianying; Deng, Robert H. 2 2012 Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097 Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue 7 2011 Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082 Lai, Junzuo; Deng, Robert H.; Li, Yingjiu 7 2011 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116 Lai, Junzuo; Deng, Robert H.; Liu, Shengli 3 2011 Efficient unidirectional proxy re-encryption. Zbl 1284.94064 Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H. 23 2010 Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060 Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert 14 2010 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 9 2010 CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Zbl 1497.94127 Weng, Jian; Chen, Minrong; Yang, Yanjiang; Deng, Robert; Chen, Kefei; Bao, Feng 9 2010 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078 Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 6 2010 A new framework for RFID privacy. Zbl 1404.94063 Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei 2 2010 Conditional proxy broadcast re-encryption. Zbl 1284.94065 Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H. 10 2009 Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106 Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng 10 2009 Multiuser private queries over encrypted databases. Zbl 1171.68460 Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 3 2009 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026 Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 16 2008 nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099 Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart 1 2008 An efficient PIR construction using trusted hardware. Zbl 1181.68140 Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2008 Routing optimization security in mobile IPv6. Zbl 1113.68022 Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H. 1 2006 Private information retrieval using trusted hardware. Zbl 1487.68094 Wang, Shuhong; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2006 New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101 Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102 Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367 Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin 1 2005 Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442 Zhu, Huafei; Bao, Feng; Deng, Robert H. 1 2005 Authenticating query results in data publishing. Zbl 1122.94435 Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying 1 2005 Security analysis of some proxy signatures. Zbl 1092.94518 Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H. 10 2004 Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Zbl 1049.94003 1 2004 Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512 Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U. 1 2004 Security analysis of two signcryption schemes. Zbl 1109.68489 Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae 1 2004 Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456 Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo 2 2003 Validating digital signatures without TTP’s time-stamping and certificate revocation. Zbl 1185.94086 Zhou, Jianying; Bao, Feng; Deng, Robert 1 2003 Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510 Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun 1 2001 An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052 Bao, Feng; Deng, Robert H.; Feng, Peirong 1 2001 Privacy protection for transactions of digital goods. Zbl 1050.68537 Bao, Feng; Deng, Robert 1 2001 Some remarks on a fair exchange protocol. Zbl 0966.68068 Zhou, Jianying; Deng, Robert; Bao, Feng 6 2000 Evolution of fair non-repudiation with TTP. Zbl 0924.68078 Zhou, Jianying; Deng, Robert; Bao, Feng 1 1999 A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521 Bao, Feng; Deng, Robert H. 23 1998 Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036 Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T. 11 1998 Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510 Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 3 1998 Improved truncated differential attacks on SAFER. Zbl 0983.94038 Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 1 1998 RSA-type signatures in the presence of transient faults. Zbl 1083.94515 Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H. 2 1997 On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016 Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei 24 1994 Trellis-coded multidimensional phase modulation. Zbl 0702.94003 Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun. 2 1990 DC-free coset codes. Zbl 0656.94017 Deng, Robert H.; Herro, Mark A. 1 1988 Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018 Deng, Robert H.; Costello, Daniel J. jun. 1 1987 all cited Publications top 5 cited Publications all top 5 Cited by 646 Authors 15 Deng, Robert Huijie 13 Weng, Jian 12 Susilo, Willy 11 Lai, Junzuo 9 Qin, Baodong 7 Huang, Zhengan 6 Liu, Shengli 6 Liu, Ximeng 6 Matsuda, Takahiro 6 Mu, Yi 5 Au, Man Ho 5 Gu, Dawu 5 Guo, Fuchun 5 Hanaoka, Goichiro 5 Jia, Dingding 5 Kawai, Yutaka 5 Wang, Huaxiong 5 Zhang, Futai 4 Chen, Kefei 4 Chen, Yu 4 Chow, Sherman S. M. 4 Cui, Hui 4 Damgård, Ivan Bjerre 4 Emura, Keita 4 Han, Shuai 4 He, Kai 4 Hu, Yupu 4 Huang, Qiong 4 Li, Bao 4 Liang, Kaitai 4 Liu, Joseph K. K. 4 Sun, Shifeng 4 Tang, Qiang 4 Venturi, Daniele 4 Wong, Duncan S. 3 Bao, Feng 3 Cao, Zhenfu 3 Chen, Rongmao 3 Faust, Sebastian 3 Fu, Anmin 3 Kiayias, Aggelos 3 Lai, Jianchang 3 Li, Jiguo 3 Li, Jin 3 Libert, Benoît 3 Lu, Xianhui 3 Ma, Jianfeng 3 Nuida, Koji 3 Rangan, Chandrasekharan Pandu 3 Shao, Jun 3 Sun, Yinxia 3 Takayasu, Atsushi 3 Xu, Chunxiang 3 Yang, Yanjiang 3 Yu, Yu 3 Yuen, Tsz Hon 3 Zhang, Mingwu 3 Zhang, Zhenfeng 3 Zheng, Dong 3 Zhou, Jianying 2 Baldi, Marco 2 Bernstein, Daniel Julius 2 Berzati, Alexandre 2 Boztaş, Serdar 2 Canovas, Cécile 2 Chen, Minrong 2 Chen, Wenbin 2 Chen, Xiaofeng 2 Chen, Xinjian 2 Chiaraluce, Franco 2 Chu, Cheng-Kang 2 Dallot, Léonard 2 Ding, Xuhua 2 Duong, Dung Hoang 2 Dutta, Ratna 2 Fan, Kai 2 Faonio, Antonio 2 Ferrer-Gomila, Josep Lluís 2 Fujisaki, Eiichiro 2 Fukushima, Kazuhide 2 Goubin, Louis 2 Hirano, Takato 2 Huang, Xinyi 2 Jiang, Peng 2 Katsumata, Shuichi 2 Kim, Chong Hee 2 Kim, Kwangjo 2 Kiyomoto, Shinsaku 2 Koseki, Yoshihiro 2 Kou, Weidong 2 Kumar, Neeraj 2 Kunihiro, Noboru 2 Lange, Tanja 2 Lee, Hyungtae 2 Lin, X. Sheldon 2 Liu, Feng-Hao 2 Liu, Xueqiao 2 Lu, Rongxing 2 Ma, Xiaoxiao 2 Mao, Xianping ...and 546 more Authors all top 5 Cited in 34 Serials 38 Information Sciences 20 Theoretical Computer Science 15 Designs, Codes and Cryptography 6 Journal of Computer and System Sciences 6 Journal of Cryptology 5 Science China. Information Sciences 4 Computers & Mathematics with Applications 4 Soft Computing 3 Applied Mathematics and Computation 3 Wuhan University Journal of Natural Sciences (WUJNS) 2 Discrete Applied Mathematics 2 Information Processing Letters 2 International Journal of Foundations of Computer Science 2 Applicable Algebra in Engineering, Communication and Computing 2 Journal of Applied Mathematics 2 Journal of Mathematical Cryptology 2 Advances in Mathematics of Communications 2 Frontiers of Computer Science 2 Prikladnaya Diskretnaya Matematika 1 Journal of Algebra 1 Journal of Symbolic Computation 1 Algorithmica 1 Information and Computation 1 Mathematical and Computer Modelling 1 Formal Aspects of Computing 1 Cybernetics and Systems Analysis 1 Finite Fields and their Applications 1 Computer Science Journal of Moldova 1 Sādhanā 1 ACM Transactions on Information and System Security (TISSEC) 1 Mathematical Biosciences and Engineering 1 Journal of Shanghai Jiaotong University (Science) 1 Mathematics in Computer Science 1 Cryptography and Communications all top 5 Cited in 13 Fields 248 Information and communication theory, circuits (94-XX) 103 Computer science (68-XX) 14 Number theory (11-XX) 8 Algebraic geometry (14-XX) 7 Quantum theory (81-XX) 2 Commutative algebra (13-XX) 2 Numerical analysis (65-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 2 Systems theory; control (93-XX) 1 Field theory and polynomials (12-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Partial differential equations (35-XX) 1 Operator theory (47-XX) Citations by Year