Edit Profile (opens in new tab) Liu, Shengli Co-Author Distance Author ID: liu.shengli Published as: Liu, Shengli; Liu, Sheng-Li; Liu, Sheng-li more...less Homepage: https://english.seiee.sjtu.edu.cn/english/detail/841_671.htm Documents Indexed: 90 Publications since 1999 Co-Authors: 68 Co-Authors with 89 Joint Publications 2,208 Co-Co-Authors all top 5 Co-Authors 0 single-authored 27 Han, Shuai 26 Gu, Dawu 16 Weng, Jian 10 Chen, Kefei 10 Deng, Robert Huijie 10 Qin, Baodong 6 Long, Yu 6 Lyu, Lin 5 Huang, Zhengan 5 Liu, Xiangyu 5 Wen, Yunhua 4 Lai, Junzuo 4 Zhang, Fangguo 4 Zhao, Yunlei 4 Zheng, Dong 3 Cui, Nan 3 Li, Xiangxue 3 Li, Yiming 3 Zhang, Xiao 2 Jiang, Mingming 2 Lai, Xuejia 2 Liu, Joseph K. K. 2 Lyu, You 2 Ma, Changshe 2 Mao, Xianping 2 Pan, Jiaxin 2 Sakurai, Kouichi 2 Sun, Shifeng 2 Wan, Zhongmei 2 Zhou, Yu 2 Zhou, Yunxiao 1 Chen, Yu 1 Cheng, Kefei 1 Dong, Jinxiang 1 Dong, Zheng 1 Grant, Simon 1 Guo, Baoan 1 Hong, Xuan 1 Hu, Ziyuan 1 Jager, Tibor 1 Jiang, Xu 1 Kiltz, Eike 1 Kim, Kwangjo 1 Kou, Weidong 1 Li, Jin 1 Li, Shiqun 1 Li, Yingjiu 1 Ma, Xu 1 Ouyang, Yingxiu 1 Paterson, Kenneth G. 1 Qiu, Weidong 1 Riepel, Doreen 1 Schäge, Sven 1 Sha, Jinrui 1 Tang, Min 1 van Dijk, Marten 1 van Tilborg, Henk C. A. 1 Wang, Xinfeng 1 Wang, Yumin 1 Wang, Zhedong 1 Wei, Yan 1 Wei, Zhuo 1 Xu, Ming 1 Xu, Shiju 1 Yang, Jingni 1 Yang, Yanjiang 1 Yuen, Tsz Hon 1 Zhang, Haibin 1 Zhang, Qingsheng 1 Zhang, Ye all top 5 Serials 10 Theoretical Computer Science 7 Designs, Codes and Cryptography 5 Information Sciences 5 Journal of Shanghai Jiaotong University (Science) 1 Computers and Electrical Engineering 1 Control and Cybernetics 1 Econometrica 1 Informatica (Vilnius) 1 International Journal of Applied Mathematics and Computer Science 1 Journal of Zhejiang University. Engineering Science 1 Journal of Applied Mathematics 1 Journal of Jilin University. Science Edition 1 Journal of Software 1 Science in China. Series F 1 Journal of Zhejiang University. Science A 1 Journal of Computer Applications all top 5 Fields 81 Information and communication theory, circuits (94-XX) 29 Computer science (68-XX) 3 Number theory (11-XX) 3 Systems theory; control (93-XX) 2 Algebraic geometry (14-XX) 2 Quantum theory (81-XX) 1 Partial differential equations (35-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Numerical analysis (65-XX) 1 Mechanics of particles and systems (70-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 58 Publications have been cited 382 times in 242 Documents Cited by ▼ Year ▼ Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117 Qin, Baodong; Liu, Shengli 26 2013 Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071 Liu, Shengli; Weng, Jian; Zhao, Yunlei 18 2013 Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078 Liu, Shengli; Paterson, Kenneth G. 17 2015 Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075 Huang, Zhengan; Liu, Shengli; Qin, Baodong 17 2013 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026 Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 16 2008 Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074 Qin, Baodong; Liu, Shengli 16 2014 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085 Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 16 2015 Server-aided revocable identity-based encryption. Zbl 1499.68057 Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli 15 2015 Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184 Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian 15 2020 Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123 Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven 14 2021 Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061 Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu 13 2019 Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058 Wen, Yunhua; Liu, Shengli 13 2018 Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629 Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue 12 2006 Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058 Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu 12 2018 Insight of the protection for data security under selective opening attacks. Zbl 1435.68079 Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin 11 2017 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 11 2014 Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077 Wen, Yunhua; Liu, Shengli; Han, Shuai 10 2018 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 9 2010 Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118 Han, Shuai; Liu, Shengli; Lyu, Lin 9 2016 Reusable fuzzy extractor from LWE. Zbl 1444.94107 Wen, Yunhua; Liu, Shengli 8 2018 Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437 Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong 8 2008 Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138 Wen, Yunhua; Liu, Shengli; Gu, Dawu 7 2019 Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120 Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe 7 2006 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078 Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 6 2010 Analysis of information leakage in quantum key agreement. Zbl 1105.94319 Liu, Shengli; Zheng, Dong; Cheng, Kefei 6 2006 Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071 Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K. 5 2018 A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221 Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K. 5 2019 Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101 Sun, Shi-Feng; Gu, Dawu; Liu, Shengli 4 2014 Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079 Zhang, Fangguo; Ma, Xu; Liu, Shengli 4 2014 Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034 Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian 3 2021 Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150 Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue 3 2008 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116 Lai, Junzuo; Deng, Robert H.; Liu, Shengli 3 2011 Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115 Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei 3 2015 Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094 Han, Shuai; Liu, Shengli; Gu, Dawu 3 2021 EKE meets tight security in the universally composable framework. Zbl 07770272 Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu 3 2023 Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 1543.68070 Han, Shuai; Liu, Shengli; Gu, Dawu 3 2023 Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114 Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu 2 2022 A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534 Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten 2 2003 Certificateless key-insulated signature without random oracles. Zbl 1209.94051 Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu 2 2009 ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051 Long, Yu; Chen, Kefei; Liu, Shengli 2 2007 Key updating technique in identity-based encryption. Zbl 1217.94101 Liu, Shengli; Long, Yu; Chen, Kefei 2 2011 Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375 Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang 2 2005 Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028 Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu 2 2018 Efficient and proactive threshold signcryption. Zbl 1127.68389 Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli 2 2005 Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063 Zhang, Xiao; Liu, Shengli; Gu, Dawu 2 2017 Solving ECDLP via list decoding. Zbl 1426.94140 Zhang, Fangguo; Liu, Shengli 1 2019 Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040 Liu, Xiangyu; Liu, Shengli; Gu, Dawu 1 2020 The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056 Xu, Ming; Wei, Yan; Liu, Shengli 1 2013 Strong key-insulated signature in the standard model. Zbl 1218.94046 Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan 1 2010 Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069 Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei 1 2015 Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071 Han, Shuai; Liu, Shengli; Lyu, Lin 1 2018 Verifiable encrypted signatures without random oracles. Zbl 1105.94316 Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun 1 2006 Cryptanalysis of LKK proxy signature. Zbl 1084.94522 Zheng, Dong; Liu, Shengli; Chen, Kefei 1 2004 Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170 Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu 1 2023 Fuzzy authenticated key exchange with tight security. Zbl 1524.94067 Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu 1 2022 Almost tight multi-user security under adaptive corruptions from LWE in the standard model. Zbl 1532.94048 Han, Shuai; Liu, Shengli; Wang, Zhedong; Gu, Dawu 1 2023 Fine-grained proxy re-encryption: definitions and constructions from LWE. Zbl 1547.94441 Zhou, Yunxiao; Liu, Shengli; Han, Shuai; Zhang, Haibin 1 2023 Universal composable password authenticated key exchange for the post-quantum world. Zbl 07943699 Lyu, You; Liu, Shengli; Han, Shuai 1 2024 Universal composable password authenticated key exchange for the post-quantum world. Zbl 07943699 Lyu, You; Liu, Shengli; Han, Shuai 1 2024 EKE meets tight security in the universally composable framework. Zbl 07770272 Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu 3 2023 Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 1543.68070 Han, Shuai; Liu, Shengli; Gu, Dawu 3 2023 Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170 Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu 1 2023 Almost tight multi-user security under adaptive corruptions from LWE in the standard model. Zbl 1532.94048 Han, Shuai; Liu, Shengli; Wang, Zhedong; Gu, Dawu 1 2023 Fine-grained proxy re-encryption: definitions and constructions from LWE. Zbl 1547.94441 Zhou, Yunxiao; Liu, Shengli; Han, Shuai; Zhang, Haibin 1 2023 Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114 Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu 2 2022 Fuzzy authenticated key exchange with tight security. Zbl 1524.94067 Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu 1 2022 Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123 Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven 14 2021 Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034 Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian 3 2021 Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094 Han, Shuai; Liu, Shengli; Gu, Dawu 3 2021 Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184 Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian 15 2020 Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040 Liu, Xiangyu; Liu, Shengli; Gu, Dawu 1 2020 Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061 Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu 13 2019 Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138 Wen, Yunhua; Liu, Shengli; Gu, Dawu 7 2019 A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221 Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K. 5 2019 Solving ECDLP via list decoding. Zbl 1426.94140 Zhang, Fangguo; Liu, Shengli 1 2019 Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058 Wen, Yunhua; Liu, Shengli 13 2018 Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058 Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu 12 2018 Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077 Wen, Yunhua; Liu, Shengli; Han, Shuai 10 2018 Reusable fuzzy extractor from LWE. Zbl 1444.94107 Wen, Yunhua; Liu, Shengli 8 2018 Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071 Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K. 5 2018 Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028 Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu 2 2018 Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071 Han, Shuai; Liu, Shengli; Lyu, Lin 1 2018 Insight of the protection for data security under selective opening attacks. Zbl 1435.68079 Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin 11 2017 Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063 Zhang, Xiao; Liu, Shengli; Gu, Dawu 2 2017 Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118 Han, Shuai; Liu, Shengli; Lyu, Lin 9 2016 Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078 Liu, Shengli; Paterson, Kenneth G. 17 2015 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085 Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 16 2015 Server-aided revocable identity-based encryption. Zbl 1499.68057 Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli 15 2015 Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115 Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei 3 2015 Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069 Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei 1 2015 Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074 Qin, Baodong; Liu, Shengli 16 2014 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 11 2014 Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101 Sun, Shi-Feng; Gu, Dawu; Liu, Shengli 4 2014 Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079 Zhang, Fangguo; Ma, Xu; Liu, Shengli 4 2014 Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117 Qin, Baodong; Liu, Shengli 26 2013 Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071 Liu, Shengli; Weng, Jian; Zhao, Yunlei 18 2013 Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075 Huang, Zhengan; Liu, Shengli; Qin, Baodong 17 2013 The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056 Xu, Ming; Wei, Yan; Liu, Shengli 1 2013 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116 Lai, Junzuo; Deng, Robert H.; Liu, Shengli 3 2011 Key updating technique in identity-based encryption. Zbl 1217.94101 Liu, Shengli; Long, Yu; Chen, Kefei 2 2011 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047 Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 9 2010 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078 Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 6 2010 Strong key-insulated signature in the standard model. Zbl 1218.94046 Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan 1 2010 Certificateless key-insulated signature without random oracles. Zbl 1209.94051 Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu 2 2009 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026 Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 16 2008 Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437 Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong 8 2008 Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150 Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue 3 2008 ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051 Long, Yu; Chen, Kefei; Liu, Shengli 2 2007 Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629 Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue 12 2006 Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120 Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe 7 2006 Analysis of information leakage in quantum key agreement. Zbl 1105.94319 Liu, Shengli; Zheng, Dong; Cheng, Kefei 6 2006 Verifiable encrypted signatures without random oracles. Zbl 1105.94316 Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun 1 2006 Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375 Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang 2 2005 Efficient and proactive threshold signcryption. Zbl 1127.68389 Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli 2 2005 Cryptanalysis of LKK proxy signature. Zbl 1084.94522 Zheng, Dong; Liu, Shengli; Chen, Kefei 1 2004 A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534 Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten 2 2003 all cited Publications top 5 cited Publications all top 5 Cited by 477 Authors 31 Liu, Shengli 19 Gu, Dawu 17 Han, Shuai 14 Pan, Jiaxin 14 Weng, Jian 10 Huang, Zhengan 10 Yang, Bo 10 Zhou, Yanwei 9 Deng, Robert Huijie 9 Qin, Baodong 8 Matsuda, Takahiro 8 Mu, Yi 8 Susilo, Willy 7 Jager, Tibor 7 Lai, Junzuo 6 Long, Yu 6 Takayasu, Atsushi 6 Wagner, Benedikt 6 Watanabe, Yohei 6 Zeng, Runzhi 5 Chen, Kefei 5 Chen, Yu 5 Emura, Keita 5 Jia, Dingding 5 Li, Bao 5 Li, Jiguo 5 Liu, Joseph K. K. 5 Lyu, Lin 5 Tanaka, Keisuke 5 Xia, Zhe 5 Zhang, Futai 4 Faust, Sebastian 4 Fuller, Benjamin 4 Hanaoka, Goichiro 4 Hofheinz, Dennis 4 Kitagawa, Fuyuki 4 Li, Jin 4 Lu, Xianhui 4 Lu, Yang 4 Seo, Jae Hong 4 Sun, Shifeng 4 Venturi, Daniele 4 Xagawa, Keita 4 Zhang, Mingwu 4 Zheng, Dong 3 Au, Man Ho 3 Cao, Zhenfu 3 Chen, Jianhong 3 Chen, Jie 3 Cheng, Xiangguo 3 Chow, Sherman S. M. 3 Diemert, Denis 3 Dutta, Ratna 3 Faonio, Antonio 3 Fu, Anmin 3 Gellert, Kai 3 Guo, Fuchun 3 Hao, Rong 3 Libert, Benoît 3 Mukherjee, Pratyay 3 Nishimaki, Ryo 3 Rao, Y. Sreenivasa 3 Riepel, Doreen 3 Shikata, Junji 3 Sun, Yinxia 3 Wan, Zhongmei 3 Wang, Huaxiong 3 Wen, Yunhua 3 Xu, Qiuliang 3 Yang, Guomin 3 Yang, Rupeng 3 Yu, Jia 3 Yu, Yu 3 Zhang, Xiao 3 Zhang, Yichen 2 Bao, Feng 2 Bootle, Jonathan 2 Boyen, Xavier 2 Chang, Jinyong 2 Chen, Kefei 2 Chen, Wenbin 2 Chu, Cheng-Kang 2 Cui, Hui 2 Cui, Nan 2 Damgård, Ivan Bjerre 2 Deng, Yi 2 Duong, Dung Hoang 2 Fujisaki, Eiichiro 2 Fukushima, Kazuhide 2 Guo, Yuyan 2 Hara, Keisuke 2 He, Kai 2 Hong, Xuan 2 Hostáková, Kristina 2 Hu, Chengyu 2 Hu, Ziyuan 2 Katsumata, Shuichi 2 Kiltz, Eike 2 Kiyomoto, Shinsaku 2 Kong, Fanyu ...and 377 more Authors all top 5 Cited in 30 Serials 29 Information Sciences 24 Theoretical Computer Science 18 Designs, Codes and Cryptography 6 Journal of Cryptology 5 International Journal of Theoretical Physics 4 Journal of Shanghai Jiaotong University (Science) 3 Soft Computing 2 Information Processing Letters 2 International Journal of Computer Mathematics 2 Advances in Mathematics of Communications 2 Frontiers of Computer Science 1 Computers & Mathematics with Applications 1 Discrete Applied Mathematics 1 Applied Mathematics and Computation 1 Computing 1 Journal of Computer and System Sciences 1 Information and Computation 1 International Journal of Foundations of Computer Science 1 Computational and Applied Mathematics 1 Nonlinear Dynamics 1 Informatica (Vilnius) 1 Journal of Discrete Mathematical Sciences & Cryptography 1 International Journal of Applied Mathematics and Computer Science 1 Quantum Information Processing 1 ACM Transactions on Information and System Security (TISSEC) 1 Journal of Zhejiang University. Science A 1 Journal of Mathematical Cryptology 1 Science China. Information Sciences 1 RAIRO. Theoretical Informatics and Applications 1 Symmetry all top 5 Cited in 14 Fields 224 Information and communication theory, circuits (94-XX) 74 Computer science (68-XX) 17 Quantum theory (81-XX) 4 Number theory (11-XX) 3 Algebraic geometry (14-XX) 2 Statistics (62-XX) 2 Operations research, mathematical programming (90-XX) 1 Combinatorics (05-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Geometry (51-XX) 1 Probability theory and stochastic processes (60-XX) 1 Numerical analysis (65-XX) 1 Mechanics of particles and systems (70-XX) 1 Systems theory; control (93-XX) Citations by Year