Search dblp for Publications

export results for "Maozhi Xu"

 download as .bib file

@inproceedings{DBLP:conf/pqcrypto/MoriyaOXZ23,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Maozhi Xu and
                  Guoqing Zhou},
  editor       = {Markku{-}Juhani O. Saarinen and
                  Daniel Smith{-}Tone},
  title        = {Adaptive Attacks Against {FESTA} Without Input Validation or Constant-Time
                  Implementation},
  booktitle    = {Post-Quantum Cryptography - 15th International Workshop, PQCrypto
                  2024, Oxford, UK, June 12-14, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14772},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-62746-0\_1},
  doi          = {10.1007/978-3-031-62746-0\_1},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/MoriyaOXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouX24,
  author       = {Guoqing Zhou and
                  Maozhi Xu},
  title        = {An Efficient Adaptive Attack Against {FESTA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/345},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/ZhangWWWX23,
  author       = {Mingyue Zhang and
                  Maozhi Wang and
                  Daming Wang and
                  Shangkun Wang and
                  Wenxi Xu},
  title        = {Organic Matter Retrieval in Black Soil Based on Oblique Extremum Signatures},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {10},
  pages        = {2508},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15102508},
  doi          = {10.3390/RS15102508},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/ZhangWWWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhouX23,
  author       = {Guoqing Zhou and
                  Maozhi Xu},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {A Polynomial-Time Attack on {G2SIDH}},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {91--109},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_6},
  doi          = {10.1007/978-981-99-7356-9\_6},
  timestamp    = {Tue, 24 Oct 2023 16:55:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhouX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChangRJXX22,
  author       = {Jinyong Chang and
                  Qiaochuan Ren and
                  Yanyan Ji and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Secure medical data management with privacy-preservation and authentication
                  properties in smart healthcare system},
  journal      = {Comput. Networks},
  volume       = {212},
  pages        = {109013},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109013},
  doi          = {10.1016/J.COMNET.2022.109013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ChangRJXX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/JiSCXX22,
  author       = {Yanyan Ji and
                  Bilin Shao and
                  Jinyong Chang and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Identity-based remote data checking with a designated verifier},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {7},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00279-5},
  doi          = {10.1186/S13677-022-00279-5},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/JiSCXX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ChangX022,
  author       = {Jinyong Chang and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Public auditing protocol with dynamic update and privacy-preserving
                  properties in fog-to-cloud-based IoT applications},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {15},
  number       = {4},
  pages        = {2021--2036},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12083-022-01332-5},
  doi          = {10.1007/S12083-022-01332-5},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ChangX022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiX22,
  author       = {Li Li and
                  Maozhi Xu},
  title        = {RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial
                  Methods},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {11--15},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00010},
  doi          = {10.1109/CSP55486.2022.00010},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSXY21,
  author       = {Zhaozhong Guo and
                  Liucheng Shi and
                  Maozhi Xu and
                  Hong Yin},
  title        = {{MRCC:} {A} Practical Covert Channel Over Monero With Provable Security},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {31816--31825},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3060285},
  doi          = {10.1109/ACCESS.2021.3060285},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GuoSXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShiGX21,
  author       = {Liucheng Shi and
                  Zhaozhong Guo and
                  Maozhi Xu},
  title        = {Bitmessage Plus: {A} Blockchain-Based Communication Protocol With
                  High Practicality},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {21618--21626},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3056135},
  doi          = {10.1109/ACCESS.2021.3056135},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ShiGX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/TangXQZ21,
  author       = {Chunming Tang and
                  Maozhi Xu and
                  Yanfeng Qi and
                  Mingshuo Zhou},
  title        = {A new class of p-ary regular bent functions},
  journal      = {Adv. Math. Commun.},
  volume       = {15},
  number       = {1},
  pages        = {55--64},
  year         = {2021},
  url          = {https://doi.org/10.3934/amc.2020042},
  doi          = {10.3934/AMC.2020042},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/TangXQZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChangSJXX21,
  author       = {Jinyong Chang and
                  Bilin Shao and
                  Yanyan Ji and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Secure network coding from secure proof of retrievability},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {12},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-020-2997-0},
  doi          = {10.1007/S11432-020-2997-0},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChangSJXX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/XuCWYW21,
  author       = {Wenxi Xu and
                  Shu{-}Hua Chen and
                  Maozhi Wang and
                  Wunian Yang and
                  Lu Wang},
  title        = {Eliminating the end effect of empirical mode decomposition using a
                  cubic spline based method},
  journal      = {Digit. Signal Process.},
  volume       = {110},
  pages        = {102936},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.dsp.2020.102936},
  doi          = {10.1016/J.DSP.2020.102936},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/XuCWYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangX21,
  author       = {Yangpan Zhang and
                  Maozhi Xu},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {On the Linear Complexity of Feedforward Clock-Controlled Sequence},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_18},
  doi          = {10.1007/978-3-030-88323-2\_18},
  timestamp    = {Tue, 19 Oct 2021 18:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LiuXZ21,
  author       = {Liwei Liu and
                  Maozhi Xu and
                  Guoqing Zhou},
  title        = {Analysis and Improvements to the Special Number Field Sieve for Discrete
                  Logarithm Problems},
  booktitle    = {5th {IEEE} International Conference on Cryptography, Security and
                  Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021},
  pages        = {45--49},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSP51677.2021.9357589},
  doi          = {10.1109/CSP51677.2021.9357589},
  timestamp    = {Tue, 02 Mar 2021 15:00:44 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/LiuXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-10770,
  author       = {Yangpan Zhang and
                  Maozhi Xu},
  title        = {On the linear complexity of feedforward clock-controlled sequence},
  journal      = {CoRR},
  volume       = {abs/2108.10770},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.10770},
  eprinttype    = {arXiv},
  eprint       = {2108.10770},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-10770.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-13086,
  author       = {Shenghui Su and
                  Ping Luo and
                  Shuwang Lv and
                  Maozhi Xu},
  title        = {A New Lever Function with Adequate Indeterminacy},
  journal      = {CoRR},
  volume       = {abs/2108.13086},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.13086},
  eprinttype    = {arXiv},
  eprint       = {2108.13086},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-13086.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoSX20,
  author       = {Zhaozhong Guo and
                  Liucheng Shi and
                  Maozhi Xu},
  title        = {SecRand: {A} Secure Distributed Randomness Generation Protocol With
                  High Practicality and Scalability},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {203917--203929},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3036698},
  doi          = {10.1109/ACCESS.2020.3036698},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GuoSX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ChangJSXX20,
  author       = {Jinyong Chang and
                  Yanyan Ji and
                  Bilin Shao and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Certificateless Homomorphic Signature Scheme for Network Coding},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {6},
  pages        = {2615--2628},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.3013902},
  doi          = {10.1109/TNET.2020.3013902},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ChangJSXX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blocksys/LiuX20,
  author       = {Liwei Liu and
                  Maozhi Xu},
  editor       = {Zibin Zheng and
                  Hong{-}Ning Dai and
                  Xiaodong Fu and
                  Benhui Chen},
  title        = {Analysis of the Randomness Generation for PoS-Based Blockchains with
                  Verifiable Delay Functions},
  booktitle    = {Blockchain and Trustworthy Systems - Second International Conference,
                  BlockSys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1267},
  pages        = {661--674},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9213-3\_51},
  doi          = {10.1007/978-981-15-9213-3\_51},
  timestamp    = {Fri, 13 Nov 2020 16:02:12 +0100},
  biburl       = {https://dblp.org/rec/conf/blocksys/LiuX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cits/LiuX20,
  author       = {Liwei Liu and
                  Maozhi Xu},
  editor       = {Mohammad S. Obaidat and
                  Kuei{-}Fang Hsiao and
                  Petros Nicopolitidis and
                  Daniel Cascado Caballero},
  title        = {Improvements to the Descent Step in the Number Field Sieve for Discrete
                  Logarithms},
  booktitle    = {International Conference on Computer, Information and Telecommunication
                  Systems, {CITS} 2020, Hangzhou, China, October 5-7, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CITS49457.2020.9232505},
  doi          = {10.1109/CITS49457.2020.9232505},
  timestamp    = {Tue, 27 Oct 2020 13:48:15 +0100},
  biburl       = {https://dblp.org/rec/conf/cits/LiuX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HuangTQX19,
  author       = {Dongmei Huang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Maozhi Xu},
  title        = {New quadratic bent functions in polynomial forms with coefficients
                  in extension fields},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {30},
  number       = {4},
  pages        = {333--347},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00200-018-0376-9},
  doi          = {10.1007/S00200-018-0376-9},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/HuangTQX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChangMZXX19,
  author       = {Jinyong Chang and
                  Hui Ma and
                  Anling Zhang and
                  Maozhi Xu and
                  Rui Xue},
  title        = {{RKA} Security of Identity-Based Homomorphic Signature Scheme},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {50858--50868},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2908244},
  doi          = {10.1109/ACCESS.2019.2908244},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChangMZXX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChangSZBJX19,
  author       = {Jinyong Chang and
                  Bilin Shao and
                  Anling Zhang and
                  Genqing Bian and
                  Yanyan Ji and
                  Maozhi Xu},
  title        = {Security Analysis of an Efficient Null Space-Based Homomorphic {MAC}
                  Scheme Against Tag Pollution Attacks in {RLNC}},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88393--88398},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2926401},
  doi          = {10.1109/ACCESS.2019.2926401},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChangSZBJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ChangBJX19,
  author       = {Jinyong Chang and
                  Genqing Bian and
                  Yanyan Ji and
                  Maozhi Xu},
  title        = {On the {KDM-CCA} Security from Partial Trapdoor One-Way Family in
                  the Random Oracle Model},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {8},
  pages        = {1232--1245},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz044},
  doi          = {10.1093/COMJNL/BXZ044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ChangBJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChangJXX19,
  author       = {Jinyong Chang and
                  Yanyan Ji and
                  Maozhi Xu and
                  Rui Xue},
  title        = {General transformations from single-generation to multi-generation
                  for homomorphic message authentication schemes in network coding},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {91},
  pages        = {416--425},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.08.039},
  doi          = {10.1016/J.FUTURE.2018.08.039},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChangJXX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blocksys/ZhangCXW19,
  author       = {Meng Zhang and
                  Xuehong Chen and
                  Maozhi Xu and
                  Jie Wang},
  editor       = {Zibin Zheng and
                  Hong{-}Ning Dai and
                  Mingdong Tang and
                  Xiangping Chen},
  title        = {On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based
                  Cryptography},
  booktitle    = {Blockchain and Trustworthy Systems - First International Conference,
                  BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1156},
  pages        = {60--70},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-2777-7\_5},
  doi          = {10.1007/978-981-15-2777-7\_5},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blocksys/ZhangCXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DaiCHX18,
  author       = {Honglong Dai and
                  Jinying Chang and
                  Zhenduo Hou and
                  Maozhi Xu},
  title        = {Relaxing Enhanced Chosen-Ciphertext Security},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {12},
  pages        = {2454--2463},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.2454},
  doi          = {10.1587/TRANSFUN.E101.A.2454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DaiCHX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JiCDX18,
  author       = {Yanyan Ji and
                  Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu},
  title        = {On the {RKA} Security of the Standard-Model-Based {BFKW} Network Coding
                  Signature Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {12},
  pages        = {2477--2480},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.2477},
  doi          = {10.1587/TRANSFUN.E101.A.2477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/JiCDX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangX18,
  author       = {Meng Zhang and
                  Maozhi Xu},
  title        = {Generating Pairing-Friendly Elliptic Curves Using Parameterized Families},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {279--282},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.279},
  doi          = {10.1587/TRANSFUN.E101.A.279},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/DaiWCX18,
  author       = {Honglong Dai and
                  Ding Wang and
                  Jinyong Chang and
                  Maozhi Xu},
  title        = {On the {RCCA} Security of Hybrid Signcryption for Internet of Things},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {8646973:1--8646973:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8646973},
  doi          = {10.1155/2018/8646973},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/DaiWCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/LmamLL17,
  author       = {Yuhong Zhang and
                  Meng Zhang and
                  Maozhi Xu},
  editor       = {Guobin Zhu and
                  Shaowen Yao and
                  Xiaohui Cui and
                  Simon Xu},
  title        = {Finding vulnerable curves over finite fields of characteristic 2 by
                  pairing reduction},
  booktitle    = {16th {IEEE/ACIS} International Conference on Computer and Information
                  Science, {ICIS} 2017, Wuhan, China, May 24-26, 2017},
  pages        = {683--687},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIS.2017.7960080},
  doi          = {10.1109/ICIS.2017.7960080},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/LmamLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cits/ZhuX17,
  author       = {Jie Zhu and
                  Maozhi Xu},
  title        = {A simple method to obtain relations among factor basis elements for
                  special hyperelliptic curves},
  booktitle    = {International Conference on Computer, Information and Telecommunication
                  Systems, {CITS} 2017, Dalian, China, July 21-23, 2017},
  pages        = {40--44},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CITS.2017.8035334},
  doi          = {10.1109/CITS.2017.8035334},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cits/ZhuX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icait/DaiZJCX17,
  author       = {Honglong Dai and
                  Luxuan Zhang and
                  Janyan Ji and
                  Jinyong Chang and
                  Maozhi Xu},
  title        = {On the key dependent message security of {DHIES}},
  booktitle    = {9th International Conference on Advanced Infocomm Technology, {ICAIT}
                  2017, Chengdu, China, November 22-24, 2017},
  pages        = {322--328},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICAIT.2017.8388939},
  doi          = {10.1109/ICAIT.2017.8388939},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icait/DaiZJCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ChangDX17,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {The {KDM-CCA} Security of {REACT}},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_5},
  doi          = {10.1007/978-3-319-72359-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ChangDX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/DaiCHX17,
  author       = {Honglong Dai and
                  Jinyong Chang and
                  Zhenduo Hou and
                  Maozhi Xu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {The {ECCA} Security of Hybrid Encryptions},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {847--859},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_53},
  doi          = {10.1007/978-3-319-72359-4\_53},
  timestamp    = {Fri, 08 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/DaiCHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HanTLX16,
  author       = {Huiting Han and
                  Chunming Tang and
                  Yu Lou and
                  Maozhi Xu},
  title        = {Construction of Efficient {MDS} Matrices Based on Block Circulant
                  Matrices for Lightweight Application},
  journal      = {Fundam. Informaticae},
  volume       = {145},
  number       = {2},
  pages        = {111--124},
  year         = {2016},
  url          = {https://doi.org/10.3233/FI-2016-1349},
  doi          = {10.3233/FI-2016-1349},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/HanTLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HuZX16,
  author       = {Zhi Hu and
                  Guoliang Zhang and
                  Maozhi Xu},
  title        = {Some techniques for faster scalar multiplication on {GLS} curves},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {1},
  pages        = {41--46},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2015.09.001},
  doi          = {10.1016/J.IPL.2015.09.001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HuZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangDXX16,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Security analysis of a TESLA-based homomorphic {MAC} scheme for authentication
                  in {P2P} live streaming system},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3309--3313},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1535},
  doi          = {10.1002/SEC.1535},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChangDXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangDXX16a,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu and
                  Rui Xue},
  title        = {Separations in circular security for arbitrary length key cycles,
                  revisited},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5392--5400},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1705},
  doi          = {10.1002/SEC.1705},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChangDXX16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SuLXX16,
  author       = {Shenghui Su and
                  Shuwang L{\"{u}} and
                  Maozhi Xu and
                  Tao Xie},
  title        = {A semantically secure public key cryptoscheme using bit-pair shadows},
  journal      = {Theor. Comput. Sci.},
  volume       = {654},
  pages        = {113--127},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.04.017},
  doi          = {10.1016/J.TCS.2016.04.017},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SuLXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangHX16,
  author       = {Meng Zhang and
                  Zhi Hu and
                  Maozhi Xu},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {On Constructing Parameterized Families of Pairing-Friendly Elliptic
                  Curves with {\textbackslash}rho =1},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {403--415},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_25},
  doi          = {10.1007/978-3-319-54705-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangHX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangDXX16,
  author       = {Jinyong Chang and
                  Honglong Dai and
                  Maozhi Xu and
                  Rui Xue},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Network Coding Signature Schemes Against Related-Key Attacks in the
                  Random Oracle Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {239--253},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_13},
  doi          = {10.1007/978-3-319-53177-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangDXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TangXQ15,
  author       = {Chunming Tang and
                  Maozhi Xu and
                  Yanfeng Qi},
  title        = {Cryptography on twisted Edwards curves over local fields},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {1},
  pages        = {1--15},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-014-5155-z},
  doi          = {10.1007/S11432-014-5155-Z},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TangXQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/LouHTWX15,
  author       = {Yu Lou and
                  Huiting Han and
                  Chunming Tang and
                  Zhangqing Wu and
                  Maozhi Xu},
  title        = {Constructing vectorial Boolean functions with high algebraic immunity
                  based on group decomposition},
  journal      = {Int. J. Comput. Math.},
  volume       = {92},
  number       = {3},
  pages        = {451--462},
  year         = {2015},
  url          = {https://doi.org/10.1080/00207160.2014.910304},
  doi          = {10.1080/00207160.2014.910304},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/LouHTWX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/SuLX15,
  author       = {Shenghui Su and
                  Shuwang L{\"{u}} and
                  Maozhi Xu},
  editor       = {Dachuan Xu and
                  Donglei Du and
                  Ding{-}Zhu Du},
  title        = {A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical
                  Security},
  booktitle    = {Computing and Combinatorics - 21st International Conference, {COCOON}
                  2015, Beijing, China, August 4-6, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9198},
  pages        = {674--686},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21398-9\_53},
  doi          = {10.1007/978-3-319-21398-9\_53},
  timestamp    = {Sun, 25 Oct 2020 22:58:52 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/SuLX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/TangQX14,
  author       = {Chunming Tang and
                  Yanfeng Qi and
                  Maozhi Xu},
  title        = {A note on cyclic codes from {APN} functions},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {1-2},
  pages        = {21--37},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0217-4},
  doi          = {10.1007/S00200-014-0217-4},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/TangQX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TangNXGQ14,
  author       = {Chunming Tang and
                  Dongmei Ni and
                  Maozhi Xu and
                  Baoan Guo and
                  Yanfeng Qi},
  title        = {Implementing optimized pairings with elliptic nets},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {5},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-013-4840-7},
  doi          = {10.1007/S11432-013-4840-7},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TangNXGQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunSX14,
  author       = {Guodong Sun and
                  Shenghui Su and
                  Maozhi Xu},
  title        = {Quantum Algorithm for Polynomial Root Finding Problem},
  booktitle    = {Tenth International Conference on Computational Intelligence and Security,
                  {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014},
  pages        = {469--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CIS.2014.40},
  doi          = {10.1109/CIS.2014.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SuLFX14,
  author       = {Shenghui Su and
                  Shuwang L{\"{u}} and
                  Xiubin Fan and
                  Maozhi Xu},
  title        = {A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes},
  journal      = {CoRR},
  volume       = {abs/1408.6226},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.6226},
  eprinttype    = {arXiv},
  eprint       = {1408.6226},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SuLFX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuX13,
  author       = {Zhi Hu and
                  Maozhi Xu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {The Gallant-Lambert-Vanstone Decomposition Revisited},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_13},
  doi          = {10.1007/978-3-319-12087-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TangLQXG13,
  author       = {Chunming Tang and
                  Yu Lou and
                  Yanfeng Qi and
                  Maozhi Xu and
                  Baoan Guo},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Note on Semi-bent and Hyper-bent Boolean Functions},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_1},
  doi          = {10.1007/978-3-319-12087-4\_1},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TangLQXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/QiTLXG13,
  author       = {Yanfeng Qi and
                  Chunming Tang and
                  Yu Lou and
                  Maozhi Xu and
                  Baoan Guo},
  title        = {An Attribute-Based Encryption Scheme with Constant-Size Ciphertexts},
  booktitle    = {2013 {IEEE} International Conference on Green Computing and Communications
                  (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom), Beijing, China, August 20-23,
                  2013},
  pages        = {1086--1088},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.186},
  doi          = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.186},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/greencom/QiTLXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HuWXZ13,
  author       = {Zhi Hu and
                  Lin Wang and
                  Maozhi Xu and
                  Guoliang Zhang},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Generation and Tate Pairing Computation of Ordinary Elliptic Curves
                  with Embedding Degree One},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {393--403},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_28},
  doi          = {10.1007/978-3-319-02726-5\_28},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HuWXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TangQX13,
  author       = {Chunming Tang and
                  Yanfeng Qi and
                  Maozhi Xu},
  title        = {A Note on Cyclic Codes from {APN} Functions},
  journal      = {CoRR},
  volume       = {abs/1305.7294},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.7294},
  eprinttype    = {arXiv},
  eprint       = {1305.7294},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/TangQX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuXL13,
  author       = {Shenghui Su and
                  Maozhi Xu and
                  Shuwang L{\"{u}}},
  title        = {A Lever Function to a New Codomain with Adequate Indeterminacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuXL13b,
  author       = {Shenghui Su and
                  Maozhi Xu and
                  Shuwang L{\"{u}}},
  title        = {A Public Key Cryptoscheme Using the Bit-pair Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuXL13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangQX13,
  author       = {Chunming Tang and
                  Yanfeng Qi and
                  Maozhi Xu},
  title        = {New Quadratic Bent Functions in Polynomial Forms with Coefficients
                  in Extension Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/405},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangQX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuLX12,
  author       = {Zhi Hu and
                  Patrick Longa and
                  Maozhi Xu},
  title        = {Implementing the 4-dimensional {GLV} method on {GLS} elliptic curves
                  with j-invariant 0},
  journal      = {Des. Codes Cryptogr.},
  volume       = {63},
  number       = {3},
  pages        = {331--343},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9558-1},
  doi          = {10.1007/S10623-011-9558-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangTQYX12,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {The Weight Distributions of Cyclic Codes and Elliptic Curves},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {12},
  pages        = {7253--7259},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2210386},
  doi          = {10.1109/TIT.2012.2210386},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangTQYX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/WangWXCG12,
  author       = {Maozhi Wang and
                  Da{-}Ming Wang and
                  Wenxi Xu and
                  Bin{-}yang Chen and
                  Ke Guo},
  title        = {Parallel computing of covariance matrix and its application on hyperspectral
                  data process},
  booktitle    = {2012 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2012, Munich, Germany, July 22-27, 2012},
  pages        = {4058--4061},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IGARSS.2012.6350518},
  doi          = {10.1109/IGARSS.2012.6350518},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/igarss/WangWXCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-3514,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A Note on Weight Distributions of Irreducible Cyclic Codes},
  journal      = {CoRR},
  volume       = {abs/1202.3514},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.3514},
  eprinttype    = {arXiv},
  eprint       = {1202.3514},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-3514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LouHTX12,
  author       = {Yu Lou and
                  Huiting Han and
                  Chunming Tang and
                  Maozhi Xu},
  title        = {Constructing Vectorial Boolean Functions with High Algebraic Immunity
                  Based on Group Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/335},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LouHTX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TangXQ11,
  author       = {Chunming Tang and
                  Maozhi Xu and
                  Yanfeng Qi},
  title        = {Faster pairing computation on genus 2 hyperelliptic curves},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {10},
  pages        = {494--499},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.02.011},
  doi          = {10.1016/J.IPL.2011.02.011},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/TangXQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShenXZ11,
  author       = {Xunxun Shen and
                  Maozhi Xu and
                  Yanhui Zhao},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {Multi-Undeniable Signature Schemes},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {954--958},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.214},
  doi          = {10.1109/CIS.2011.214},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShenXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SongXT11,
  author       = {Chenggen Song and
                  Maozhi Xu and
                  Chunming Tang},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Pseudorandom Generators Based on Subcovers for Finite Groups},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {379--392},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_26},
  doi          = {10.1007/978-3-642-34704-7\_26},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/SongXT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-0628,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {The Weight Distributions of Cyclic Codes and Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/1109.0628},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.0628},
  eprinttype    = {arXiv},
  eprint       = {1109.0628},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-0628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-0062,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A new class of hyper-bent Boolean functions in binomial forms},
  journal      = {CoRR},
  volume       = {abs/1112.0062},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.0062},
  eprinttype    = {arXiv},
  eprint       = {1112.0062},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-0062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuLX11,
  author       = {Zhi Hu and
                  Patrick Longa and
                  Maozhi Xu},
  title        = {Implementing 4-Dimensional {GLV} Method on {GLS} Elliptic Curves with
                  j-Invariant 0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangTQYX11,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/600},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ZhouHXS10,
  author       = {Zhenghua Zhou and
                  Zhi Hu and
                  Maozhi Xu and
                  Wangan Song},
  title        = {Efficient 3-dimensional {GLV} method for faster point multiplication
                  on some {GLS} elliptic curves},
  journal      = {Inf. Process. Lett.},
  volume       = {110},
  number       = {22},
  pages        = {1003--1006},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2010.08.014},
  doi          = {10.1016/J.IPL.2010.08.014},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ZhouHXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuXZ10,
  author       = {Zhi Hu and
                  Maozhi Xu and
                  Zhenghua Zhou},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {A Generalization of Verheul's Theorem for Some Ordinary Curves},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {105--114},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_8},
  doi          = {10.1007/978-3-642-21518-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/XuZFRY08,
  author       = {MaoZhi Xu and
                  ChunLai Zhao and
                  Min Feng and
                  ZhaoRong Ren and
                  JiQing Ye},
  title        = {Cryptography on elliptic curves over \emph{p} -adic number fields},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {3},
  pages        = {258--272},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0014-4},
  doi          = {10.1007/S11432-008-0014-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/XuZFRY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhaoZX07,
  author       = {Jing Zhao and
                  Zhigang Zhang and
                  Maozhi Xu},
  title        = {A Model of Hierarchical Key Assignment Scheme with {CRT}},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {815--818},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.42},
  doi          = {10.1109/CIS.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhaoZX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengZXL05,
  author       = {Min Feng and
                  Bin B. Zhu and
                  MaoZhi Xu and
                  Shipeng Li},
  title        = {Efficient Comb Elliptic Curve Multiplication Methods Resistant to
                  Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/222},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FengZXL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangWX04,
  author       = {Shuhong Wang and
                  Jie Wang and
                  Maozhi Xu},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Weaknesses of a Password-Authenticated Key Exchange Protocol between
                  Clients with Different Passwords},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {414--425},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_30},
  doi          = {10.1007/978-3-540-24852-1\_30},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangWX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}