![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "Maozhi Xu"
@inproceedings{DBLP:conf/pqcrypto/MoriyaOXZ23, author = {Tomoki Moriya and Hiroshi Onuki and Maozhi Xu and Guoqing Zhou}, editor = {Markku{-}Juhani O. Saarinen and Daniel Smith{-}Tone}, title = {Adaptive Attacks Against {FESTA} Without Input Validation or Constant-Time Implementation}, booktitle = {Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12-14, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14772}, pages = {3--19}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-62746-0\_1}, doi = {10.1007/978-3-031-62746-0\_1}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/MoriyaOXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouX24, author = {Guoqing Zhou and Maozhi Xu}, title = {An Efficient Adaptive Attack Against {FESTA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2024}, url = {https://eprint.iacr.org/2024/345}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhangWWWX23, author = {Mingyue Zhang and Maozhi Wang and Daming Wang and Shangkun Wang and Wenxi Xu}, title = {Organic Matter Retrieval in Black Soil Based on Oblique Extremum Signatures}, journal = {Remote. Sens.}, volume = {15}, number = {10}, pages = {2508}, year = {2023}, url = {https://doi.org/10.3390/rs15102508}, doi = {10.3390/RS15102508}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhangWWWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhouX23, author = {Guoqing Zhou and Maozhi Xu}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {A Polynomial-Time Attack on {G2SIDH}}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {91--109}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_6}, doi = {10.1007/978-981-99-7356-9\_6}, timestamp = {Tue, 24 Oct 2023 16:55:55 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhouX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChangRJXX22, author = {Jinyong Chang and Qiaochuan Ren and Yanyan Ji and Maozhi Xu and Rui Xue}, title = {Secure medical data management with privacy-preservation and authentication properties in smart healthcare system}, journal = {Comput. Networks}, volume = {212}, pages = {109013}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109013}, doi = {10.1016/J.COMNET.2022.109013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChangRJXX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/JiSCXX22, author = {Yanyan Ji and Bilin Shao and Jinyong Chang and Maozhi Xu and Rui Xue}, title = {Identity-based remote data checking with a designated verifier}, journal = {J. Cloud Comput.}, volume = {11}, pages = {7}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00279-5}, doi = {10.1186/S13677-022-00279-5}, timestamp = {Fri, 25 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/JiSCXX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ChangX022, author = {Jinyong Chang and Maozhi Xu and Rui Xue}, title = {Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications}, journal = {Peer-to-Peer Netw. Appl.}, volume = {15}, number = {4}, pages = {2021--2036}, year = {2022}, url = {https://doi.org/10.1007/s12083-022-01332-5}, doi = {10.1007/S12083-022-01332-5}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ChangX022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LiX22, author = {Li Li and Maozhi Xu}, title = {RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial Methods}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {11--15}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00010}, doi = {10.1109/CSP55486.2022.00010}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/LiX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSXY21, author = {Zhaozhong Guo and Liucheng Shi and Maozhi Xu and Hong Yin}, title = {{MRCC:} {A} Practical Covert Channel Over Monero With Provable Security}, journal = {{IEEE} Access}, volume = {9}, pages = {31816--31825}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3060285}, doi = {10.1109/ACCESS.2021.3060285}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GuoSXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShiGX21, author = {Liucheng Shi and Zhaozhong Guo and Maozhi Xu}, title = {Bitmessage Plus: {A} Blockchain-Based Communication Protocol With High Practicality}, journal = {{IEEE} Access}, volume = {9}, pages = {21618--21626}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3056135}, doi = {10.1109/ACCESS.2021.3056135}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ShiGX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/TangXQZ21, author = {Chunming Tang and Maozhi Xu and Yanfeng Qi and Mingshuo Zhou}, title = {A new class of p-ary regular bent functions}, journal = {Adv. Math. Commun.}, volume = {15}, number = {1}, pages = {55--64}, year = {2021}, url = {https://doi.org/10.3934/amc.2020042}, doi = {10.3934/AMC.2020042}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/TangXQZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChangSJXX21, author = {Jinyong Chang and Bilin Shao and Yanyan Ji and Maozhi Xu and Rui Xue}, title = {Secure network coding from secure proof of retrievability}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {12}, year = {2021}, url = {https://doi.org/10.1007/s11432-020-2997-0}, doi = {10.1007/S11432-020-2997-0}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ChangSJXX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/XuCWYW21, author = {Wenxi Xu and Shu{-}Hua Chen and Maozhi Wang and Wunian Yang and Lu Wang}, title = {Eliminating the end effect of empirical mode decomposition using a cubic spline based method}, journal = {Digit. Signal Process.}, volume = {110}, pages = {102936}, year = {2021}, url = {https://doi.org/10.1016/j.dsp.2020.102936}, doi = {10.1016/J.DSP.2020.102936}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/XuCWYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangX21, author = {Yangpan Zhang and Maozhi Xu}, editor = {Yu Yu and Moti Yung}, title = {On the Linear Complexity of Feedforward Clock-Controlled Sequence}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {331--348}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_18}, doi = {10.1007/978-3-030-88323-2\_18}, timestamp = {Tue, 19 Oct 2021 18:32:12 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LiuXZ21, author = {Liwei Liu and Maozhi Xu and Guoqing Zhou}, title = {Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm Problems}, booktitle = {5th {IEEE} International Conference on Cryptography, Security and Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021}, pages = {45--49}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSP51677.2021.9357589}, doi = {10.1109/CSP51677.2021.9357589}, timestamp = {Tue, 02 Mar 2021 15:00:44 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/LiuXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-10770, author = {Yangpan Zhang and Maozhi Xu}, title = {On the linear complexity of feedforward clock-controlled sequence}, journal = {CoRR}, volume = {abs/2108.10770}, year = {2021}, url = {https://arxiv.org/abs/2108.10770}, eprinttype = {arXiv}, eprint = {2108.10770}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-10770.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-13086, author = {Shenghui Su and Ping Luo and Shuwang Lv and Maozhi Xu}, title = {A New Lever Function with Adequate Indeterminacy}, journal = {CoRR}, volume = {abs/2108.13086}, year = {2021}, url = {https://arxiv.org/abs/2108.13086}, eprinttype = {arXiv}, eprint = {2108.13086}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-13086.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoSX20, author = {Zhaozhong Guo and Liucheng Shi and Maozhi Xu}, title = {SecRand: {A} Secure Distributed Randomness Generation Protocol With High Practicality and Scalability}, journal = {{IEEE} Access}, volume = {8}, pages = {203917--203929}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3036698}, doi = {10.1109/ACCESS.2020.3036698}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GuoSX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChangJSXX20, author = {Jinyong Chang and Yanyan Ji and Bilin Shao and Maozhi Xu and Rui Xue}, title = {Certificateless Homomorphic Signature Scheme for Network Coding}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {6}, pages = {2615--2628}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.3013902}, doi = {10.1109/TNET.2020.3013902}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ChangJSXX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blocksys/LiuX20, author = {Liwei Liu and Maozhi Xu}, editor = {Zibin Zheng and Hong{-}Ning Dai and Xiaodong Fu and Benhui Chen}, title = {Analysis of the Randomness Generation for PoS-Based Blockchains with Verifiable Delay Functions}, booktitle = {Blockchain and Trustworthy Systems - Second International Conference, BlockSys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1267}, pages = {661--674}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9213-3\_51}, doi = {10.1007/978-981-15-9213-3\_51}, timestamp = {Fri, 13 Nov 2020 16:02:12 +0100}, biburl = {https://dblp.org/rec/conf/blocksys/LiuX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cits/LiuX20, author = {Liwei Liu and Maozhi Xu}, editor = {Mohammad S. Obaidat and Kuei{-}Fang Hsiao and Petros Nicopolitidis and Daniel Cascado Caballero}, title = {Improvements to the Descent Step in the Number Field Sieve for Discrete Logarithms}, booktitle = {International Conference on Computer, Information and Telecommunication Systems, {CITS} 2020, Hangzhou, China, October 5-7, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CITS49457.2020.9232505}, doi = {10.1109/CITS49457.2020.9232505}, timestamp = {Tue, 27 Oct 2020 13:48:15 +0100}, biburl = {https://dblp.org/rec/conf/cits/LiuX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HuangTQX19, author = {Dongmei Huang and Chunming Tang and Yanfeng Qi and Maozhi Xu}, title = {New quadratic bent functions in polynomial forms with coefficients in extension fields}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {30}, number = {4}, pages = {333--347}, year = {2019}, url = {https://doi.org/10.1007/s00200-018-0376-9}, doi = {10.1007/S00200-018-0376-9}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/HuangTQX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChangMZXX19, author = {Jinyong Chang and Hui Ma and Anling Zhang and Maozhi Xu and Rui Xue}, title = {{RKA} Security of Identity-Based Homomorphic Signature Scheme}, journal = {{IEEE} Access}, volume = {7}, pages = {50858--50868}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2908244}, doi = {10.1109/ACCESS.2019.2908244}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChangMZXX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChangSZBJX19, author = {Jinyong Chang and Bilin Shao and Anling Zhang and Genqing Bian and Yanyan Ji and Maozhi Xu}, title = {Security Analysis of an Efficient Null Space-Based Homomorphic {MAC} Scheme Against Tag Pollution Attacks in {RLNC}}, journal = {{IEEE} Access}, volume = {7}, pages = {88393--88398}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2926401}, doi = {10.1109/ACCESS.2019.2926401}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChangSZBJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ChangBJX19, author = {Jinyong Chang and Genqing Bian and Yanyan Ji and Maozhi Xu}, title = {On the {KDM-CCA} Security from Partial Trapdoor One-Way Family in the Random Oracle Model}, journal = {Comput. J.}, volume = {62}, number = {8}, pages = {1232--1245}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz044}, doi = {10.1093/COMJNL/BXZ044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ChangBJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChangJXX19, author = {Jinyong Chang and Yanyan Ji and Maozhi Xu and Rui Xue}, title = {General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding}, journal = {Future Gener. Comput. Syst.}, volume = {91}, pages = {416--425}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.08.039}, doi = {10.1016/J.FUTURE.2018.08.039}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChangJXX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blocksys/ZhangCXW19, author = {Meng Zhang and Xuehong Chen and Maozhi Xu and Jie Wang}, editor = {Zibin Zheng and Hong{-}Ning Dai and Mingdong Tang and Xiangping Chen}, title = {On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography}, booktitle = {Blockchain and Trustworthy Systems - First International Conference, BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1156}, pages = {60--70}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2777-7\_5}, doi = {10.1007/978-981-15-2777-7\_5}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blocksys/ZhangCXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DaiCHX18, author = {Honglong Dai and Jinying Chang and Zhenduo Hou and Maozhi Xu}, title = {Relaxing Enhanced Chosen-Ciphertext Security}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2454--2463}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.2454}, doi = {10.1587/TRANSFUN.E101.A.2454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DaiCHX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JiCDX18, author = {Yanyan Ji and Jinyong Chang and Honglong Dai and Maozhi Xu}, title = {On the {RKA} Security of the Standard-Model-Based {BFKW} Network Coding Signature Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2477--2480}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.2477}, doi = {10.1587/TRANSFUN.E101.A.2477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/JiCDX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangX18, author = {Meng Zhang and Maozhi Xu}, title = {Generating Pairing-Friendly Elliptic Curves Using Parameterized Families}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {279--282}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.279}, doi = {10.1587/TRANSFUN.E101.A.279}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/DaiWCX18, author = {Honglong Dai and Ding Wang and Jinyong Chang and Maozhi Xu}, title = {On the {RCCA} Security of Hybrid Signcryption for Internet of Things}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {8646973:1--8646973:11}, year = {2018}, url = {https://doi.org/10.1155/2018/8646973}, doi = {10.1155/2018/8646973}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/DaiWCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/LmamLL17, author = {Yuhong Zhang and Meng Zhang and Maozhi Xu}, editor = {Guobin Zhu and Shaowen Yao and Xiaohui Cui and Simon Xu}, title = {Finding vulnerable curves over finite fields of characteristic 2 by pairing reduction}, booktitle = {16th {IEEE/ACIS} International Conference on Computer and Information Science, {ICIS} 2017, Wuhan, China, May 24-26, 2017}, pages = {683--687}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICIS.2017.7960080}, doi = {10.1109/ICIS.2017.7960080}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/LmamLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cits/ZhuX17, author = {Jie Zhu and Maozhi Xu}, title = {A simple method to obtain relations among factor basis elements for special hyperelliptic curves}, booktitle = {International Conference on Computer, Information and Telecommunication Systems, {CITS} 2017, Dalian, China, July 21-23, 2017}, pages = {40--44}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CITS.2017.8035334}, doi = {10.1109/CITS.2017.8035334}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cits/ZhuX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icait/DaiZJCX17, author = {Honglong Dai and Luxuan Zhang and Janyan Ji and Jinyong Chang and Maozhi Xu}, title = {On the key dependent message security of {DHIES}}, booktitle = {9th International Conference on Advanced Infocomm Technology, {ICAIT} 2017, Chengdu, China, November 22-24, 2017}, pages = {322--328}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICAIT.2017.8388939}, doi = {10.1109/ICAIT.2017.8388939}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icait/DaiZJCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChangDX17, author = {Jinyong Chang and Honglong Dai and Maozhi Xu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {The {KDM-CCA} Security of {REACT}}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {85--101}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_5}, doi = {10.1007/978-3-319-72359-4\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChangDX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DaiCHX17, author = {Honglong Dai and Jinyong Chang and Zhenduo Hou and Maozhi Xu}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {The {ECCA} Security of Hybrid Encryptions}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {847--859}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_53}, doi = {10.1007/978-3-319-72359-4\_53}, timestamp = {Fri, 08 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/DaiCHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/HanTLX16, author = {Huiting Han and Chunming Tang and Yu Lou and Maozhi Xu}, title = {Construction of Efficient {MDS} Matrices Based on Block Circulant Matrices for Lightweight Application}, journal = {Fundam. Informaticae}, volume = {145}, number = {2}, pages = {111--124}, year = {2016}, url = {https://doi.org/10.3233/FI-2016-1349}, doi = {10.3233/FI-2016-1349}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/HanTLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HuZX16, author = {Zhi Hu and Guoliang Zhang and Maozhi Xu}, title = {Some techniques for faster scalar multiplication on {GLS} curves}, journal = {Inf. Process. Lett.}, volume = {116}, number = {1}, pages = {41--46}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2015.09.001}, doi = {10.1016/J.IPL.2015.09.001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HuZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangDXX16, author = {Jinyong Chang and Honglong Dai and Maozhi Xu and Rui Xue}, title = {Security analysis of a TESLA-based homomorphic {MAC} scheme for authentication in {P2P} live streaming system}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3309--3313}, year = {2016}, url = {https://doi.org/10.1002/sec.1535}, doi = {10.1002/SEC.1535}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChangDXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangDXX16a, author = {Jinyong Chang and Honglong Dai and Maozhi Xu and Rui Xue}, title = {Separations in circular security for arbitrary length key cycles, revisited}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5392--5400}, year = {2016}, url = {https://doi.org/10.1002/sec.1705}, doi = {10.1002/SEC.1705}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChangDXX16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SuLXX16, author = {Shenghui Su and Shuwang L{\"{u}} and Maozhi Xu and Tao Xie}, title = {A semantically secure public key cryptoscheme using bit-pair shadows}, journal = {Theor. Comput. Sci.}, volume = {654}, pages = {113--127}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.04.017}, doi = {10.1016/J.TCS.2016.04.017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SuLXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangHX16, author = {Meng Zhang and Zhi Hu and Maozhi Xu}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with {\textbackslash}rho =1}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {403--415}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_25}, doi = {10.1007/978-3-319-54705-3\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangHX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChangDXX16, author = {Jinyong Chang and Honglong Dai and Maozhi Xu and Rui Xue}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {239--253}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_13}, doi = {10.1007/978-3-319-53177-9\_13}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChangDXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TangXQ15, author = {Chunming Tang and Maozhi Xu and Yanfeng Qi}, title = {Cryptography on twisted Edwards curves over local fields}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {1}, pages = {1--15}, year = {2015}, url = {https://doi.org/10.1007/s11432-014-5155-z}, doi = {10.1007/S11432-014-5155-Z}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TangXQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/LouHTWX15, author = {Yu Lou and Huiting Han and Chunming Tang and Zhangqing Wu and Maozhi Xu}, title = {Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition}, journal = {Int. J. Comput. Math.}, volume = {92}, number = {3}, pages = {451--462}, year = {2015}, url = {https://doi.org/10.1080/00207160.2014.910304}, doi = {10.1080/00207160.2014.910304}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/LouHTWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/SuLX15, author = {Shenghui Su and Shuwang L{\"{u}} and Maozhi Xu}, editor = {Dachuan Xu and Donglei Du and Ding{-}Zhu Du}, title = {A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security}, booktitle = {Computing and Combinatorics - 21st International Conference, {COCOON} 2015, Beijing, China, August 4-6, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9198}, pages = {674--686}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21398-9\_53}, doi = {10.1007/978-3-319-21398-9\_53}, timestamp = {Sun, 25 Oct 2020 22:58:52 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/SuLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/TangQX14, author = {Chunming Tang and Yanfeng Qi and Maozhi Xu}, title = {A note on cyclic codes from {APN} functions}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {1-2}, pages = {21--37}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0217-4}, doi = {10.1007/S00200-014-0217-4}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/TangQX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TangNXGQ14, author = {Chunming Tang and Dongmei Ni and Maozhi Xu and Baoan Guo and Yanfeng Qi}, title = {Implementing optimized pairings with elliptic nets}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {5}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1007/s11432-013-4840-7}, doi = {10.1007/S11432-013-4840-7}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TangNXGQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunSX14, author = {Guodong Sun and Shenghui Su and Maozhi Xu}, title = {Quantum Algorithm for Polynomial Root Finding Problem}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {469--473}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.40}, doi = {10.1109/CIS.2014.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SuLFX14, author = {Shenghui Su and Shuwang L{\"{u}} and Xiubin Fan and Maozhi Xu}, title = {A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes}, journal = {CoRR}, volume = {abs/1408.6226}, year = {2014}, url = {http://arxiv.org/abs/1408.6226}, eprinttype = {arXiv}, eprint = {1408.6226}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SuLFX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuX13, author = {Zhi Hu and Maozhi Xu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {The Gallant-Lambert-Vanstone Decomposition Revisited}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {201--216}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_13}, doi = {10.1007/978-3-319-12087-4\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangLQXG13, author = {Chunming Tang and Yu Lou and Yanfeng Qi and Maozhi Xu and Baoan Guo}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {A Note on Semi-bent and Hyper-bent Boolean Functions}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {3--21}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_1}, doi = {10.1007/978-3-319-12087-4\_1}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangLQXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/QiTLXG13, author = {Yanfeng Qi and Chunming Tang and Yu Lou and Maozhi Xu and Baoan Guo}, title = {An Attribute-Based Encryption Scheme with Constant-Size Ciphertexts}, booktitle = {2013 {IEEE} International Conference on Green Computing and Communications (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013}, pages = {1086--1088}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.186}, doi = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.186}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/greencom/QiTLXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HuWXZ13, author = {Zhi Hu and Lin Wang and Maozhi Xu and Guoliang Zhang}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {393--403}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_28}, doi = {10.1007/978-3-319-02726-5\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/HuWXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TangQX13, author = {Chunming Tang and Yanfeng Qi and Maozhi Xu}, title = {A Note on Cyclic Codes from {APN} Functions}, journal = {CoRR}, volume = {abs/1305.7294}, year = {2013}, url = {http://arxiv.org/abs/1305.7294}, eprinttype = {arXiv}, eprint = {1305.7294}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/TangQX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuXL13, author = {Shenghui Su and Maozhi Xu and Shuwang L{\"{u}}}, title = {A Lever Function to a New Codomain with Adequate Indeterminacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2013}, url = {http://eprint.iacr.org/2013/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuXL13b, author = {Shenghui Su and Maozhi Xu and Shuwang L{\"{u}}}, title = {A Public Key Cryptoscheme Using the Bit-pair Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2013}, url = {http://eprint.iacr.org/2013/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuXL13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangQX13, author = {Chunming Tang and Yanfeng Qi and Maozhi Xu}, title = {New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2013}, url = {http://eprint.iacr.org/2013/405}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangQX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuLX12, author = {Zhi Hu and Patrick Longa and Maozhi Xu}, title = {Implementing the 4-dimensional {GLV} method on {GLS} elliptic curves with j-invariant 0}, journal = {Des. Codes Cryptogr.}, volume = {63}, number = {3}, pages = {331--343}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9558-1}, doi = {10.1007/S10623-011-9558-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuLX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangTQYX12, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {The Weight Distributions of Cyclic Codes and Elliptic Curves}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {12}, pages = {7253--7259}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2210386}, doi = {10.1109/TIT.2012.2210386}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangTQYX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/WangWXCG12, author = {Maozhi Wang and Da{-}Ming Wang and Wenxi Xu and Bin{-}yang Chen and Ke Guo}, title = {Parallel computing of covariance matrix and its application on hyperspectral data process}, booktitle = {2012 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2012, Munich, Germany, July 22-27, 2012}, pages = {4058--4061}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IGARSS.2012.6350518}, doi = {10.1109/IGARSS.2012.6350518}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/igarss/WangWXCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-3514, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A Note on Weight Distributions of Irreducible Cyclic Codes}, journal = {CoRR}, volume = {abs/1202.3514}, year = {2012}, url = {http://arxiv.org/abs/1202.3514}, eprinttype = {arXiv}, eprint = {1202.3514}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-3514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LouHTX12, author = {Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu}, title = {Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2012}, url = {http://eprint.iacr.org/2012/335}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LouHTX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/TangXQ11, author = {Chunming Tang and Maozhi Xu and Yanfeng Qi}, title = {Faster pairing computation on genus 2 hyperelliptic curves}, journal = {Inf. Process. Lett.}, volume = {111}, number = {10}, pages = {494--499}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.02.011}, doi = {10.1016/J.IPL.2011.02.011}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/TangXQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShenXZ11, author = {Xunxun Shen and Maozhi Xu and Yanhui Zhao}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {Multi-Undeniable Signature Schemes}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {954--958}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.214}, doi = {10.1109/CIS.2011.214}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShenXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SongXT11, author = {Chenggen Song and Maozhi Xu and Chunming Tang}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Pseudorandom Generators Based on Subcovers for Finite Groups}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {379--392}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_26}, doi = {10.1007/978-3-642-34704-7\_26}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/SongXT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-0628, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {The Weight Distributions of Cyclic Codes and Elliptic Curves}, journal = {CoRR}, volume = {abs/1109.0628}, year = {2011}, url = {http://arxiv.org/abs/1109.0628}, eprinttype = {arXiv}, eprint = {1109.0628}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-0628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-0062, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A new class of hyper-bent Boolean functions in binomial forms}, journal = {CoRR}, volume = {abs/1112.0062}, year = {2011}, url = {http://arxiv.org/abs/1112.0062}, eprinttype = {arXiv}, eprint = {1112.0062}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-0062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuLX11, author = {Zhi Hu and Patrick Longa and Maozhi Xu}, title = {Implementing 4-Dimensional {GLV} Method on {GLS} Elliptic Curves with j-Invariant 0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2011}, url = {http://eprint.iacr.org/2011/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangTQYX11, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2011}, url = {http://eprint.iacr.org/2011/600}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ZhouHXS10, author = {Zhenghua Zhou and Zhi Hu and Maozhi Xu and Wangan Song}, title = {Efficient 3-dimensional {GLV} method for faster point multiplication on some {GLS} elliptic curves}, journal = {Inf. Process. Lett.}, volume = {110}, number = {22}, pages = {1003--1006}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.08.014}, doi = {10.1016/J.IPL.2010.08.014}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ZhouHXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuXZ10, author = {Zhi Hu and Maozhi Xu and Zhenghua Zhou}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {A Generalization of Verheul's Theorem for Some Ordinary Curves}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {105--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_8}, doi = {10.1007/978-3-642-21518-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/XuZFRY08, author = {MaoZhi Xu and ChunLai Zhao and Min Feng and ZhaoRong Ren and JiQing Ye}, title = {Cryptography on elliptic curves over \emph{p} -adic number fields}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {3}, pages = {258--272}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0014-4}, doi = {10.1007/S11432-008-0014-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/XuZFRY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoZX07, author = {Jing Zhao and Zhigang Zhang and Maozhi Xu}, title = {A Model of Hierarchical Key Assignment Scheme with {CRT}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {815--818}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.42}, doi = {10.1109/CIS.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhaoZX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengZXL05, author = {Min Feng and Bin B. Zhu and MaoZhi Xu and Shipeng Li}, title = {Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2005}, url = {http://eprint.iacr.org/2005/222}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FengZXL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangWX04, author = {Shuhong Wang and Jie Wang and Maozhi Xu}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {414--425}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_30}, doi = {10.1007/978-3-540-24852-1\_30}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangWX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.