ⅠStreamCipherandEllipticCurveAlgorithm
CryptanalysisofGeneralizedSelf-shrinkingGenerator
FastScalarMultiplicationonaFamilyofSupersingularCurvesoverIF2m
ⅡDigitalSignatureandAuthenticationScheme
AnEfficientProxySignatureSchemewithoutRandomOracleModel
ProvableSecureSignatureSchemewithPartialSanitizationandDisclosure"
AnEvaluationofImprovementSchemeforBoundaryProblemin
CancelableBiometricsBasedonBlockScramble
ⅢKeyManagementProtocols
StronglySecureAuthenticatedKeyExchangeProtocolBasedonComputationalDiffie-HellmanProblem
NewTwo-PartyIdentity-basedAuthenticatedKeyAgreementProtocolwithoutRandomOracles
AMultilevelSecureKeyPredistributionScheme.inWirelessSensorNetworks
ⅣHardwareImplementationandSideChannelAttack
FPGA&ASIChnplementationofDifferentialPower:AnalysisAttackonAES
RobustnessandInteroperabilityProblemsinSecurityDevices
ⅤApplicationsandSteganography
AnalysisandImprovementsofaSecureE-TenderSubmissionProtocol.
BlockBasedMinimumDistortionSteganography
AuthorIndex