Yuliang Zheng
#118,153
Most Influential Person Now
American educator
Yuliang Zheng's AcademicInfluence.com Rankings
Yuliang Zhengcomputer-science Degrees
Computer Science
#5175
World Rank
#5469
Historical Rank
#1552
USA Rank
Database
#6158
World Rank
#6386
Historical Rank
#806
USA Rank
Download Badge
Computer Science
Yuliang Zheng's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Yuliang Zheng Influential?
(Suggest an Edit or Addition)According to Wikipedia, Yuliang Zheng is the Chair of the Department of Computer and Information Sciences at the University of Alabama at Birmingham. He is best known for inventing the Signcryption cryptographic primitive that combines the digital signature and encryption operations into one single step. He also invented the HAVAL hash function, SPEED cipher, and STRANDOM pseudo-random number generator.
Yuliang Zheng's Published Works
Published Works
- Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) (1997) (1295)
- Advances in Cryptology — ASIACRYPT 2002 (2002) (461)
- Formal Proofs for the Security of Signcryption (2002) (356)
- How to Construct Efficient Signcryption Schemes on Elliptic Curves (1998) (229)
- Content Extraction Signatures (2001) (227)
- On plateaued functions (1999) (221)
- HAVAL - A One-Way Hashing Algorithm with Variable Length of Output (1992) (219)
- Identity-Based Threshold Decryption (2004) (196)
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses (1989) (188)
- GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions (1995) (175)
- Advances in Cryptology — AUSCRYPT '92 (1992) (163)
- Signcryption and Its Applications in Efficient Public Key Solutions (1997) (163)
- A Signcryption Scheme Based on Integer Factorization (2000) (118)
- Encrypted Message Authentication by Firewalls (1999) (105)
- Cryptographically resilient functions (1997) (102)
- Identity-based threshold signature scheme from the bilinear pairings (extended abstract) (2004) (100)
- Nonlinearity and Propagation Characteristics of Balanced Boolean Functions (1995) (99)
- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) (1993) (94)
- On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract) (1994) (89)
- Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks (1993) (77)
- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions (2000) (76)
- Unconditionally Secure Digital Signature Schemes Admitting Transferability (2000) (67)
- Systematic generation of cryptographically robust S-boxes (1993) (66)
- Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract) (1992) (58)
- Relationships between Bent Functions and Complementary Plateaued Functions (1999) (57)
- Relationships among nonlinearity criteria (1994) (47)
- A Practical Digital Multisignature Scheme Based on Discrete Logarithms (1992) (44)
- Structural Properties of One-way Hash Functions (1990) (44)
- Efficient Signcryption Schemes on Elliptic Curves (1998) (42)
- Dynamic and risk-aware network access management (2003) (41)
- Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract) (1989) (38)
- Security Notions for Unconditionally Secure Signature Schemes (2002) (37)
- Practical Signcryption (2010) (36)
- A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation (1998) (34)
- On Relationships among Avalanche, Nonlinearity, and Correlation Immunity (2000) (34)
- Reusing Shares in Secret Sharing Schemes (1994) (34)
- An Authentication and Security Protocol for Mobile Computing (1996) (34)
- A Method to Implement a Denial of Service Protection Base (1997) (33)
- Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite (2001) (32)
- Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions (1996) (32)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security) (1997) (31)
- Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group (2003) (31)
- Relating Differential Distribution Tables to Other Properties of of Substitution Boxes (2000) (31)
- New Solutions to the Problem of Access Control in a Hierarchy (1993) (30)
- Privacy preserving database application testing (2003) (28)
- Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection (2003) (27)
- Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes (1998) (24)
- Improving the Strict Avalanche Characteristics of Cryptographic Functions (1994) (24)
- Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors (1996) (24)
- Restriction, Terms and Nonlinearity of Boolean Functions (1999) (24)
- On the Security of RSA with Primes Sharing Least-Significant Bits (2004) (23)
- Sibling Intractable Function Families and Their Applications (Extended Abstract) (1991) (23)
- An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits (2001) (23)
- The SPEED Cipher (1997) (23)
- Compact and unforgeable key establishment over an ATM network (1998) (21)
- LITESET: A Light-Weight Secure Electronic Transaction Protocol (1998) (19)
- A framework for an active interface to characterise compositional security contracts of software components (2001) (19)
- Parasitic Authentication To Protect Your E-Wallet (2000) (19)
- On Algebraic Immunity and Annihilators (2006) (18)
- Communication protection in IP-based video surveillance systems (2005) (18)
- A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks (2002) (18)
- Security characterisation and integrity assurance for component-based software (2000) (18)
- An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks (1999) (18)
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata Over GF (q) (1999) (18)
- Shared cryptographic bits via quantized quadrature phase amplitudes of light (1996) (17)
- Comments on Soviet Encryption Algorithm (1994) (17)
- An ID-based signcryption scheme with compartmented secret sharing for unsigncryption (2015) (17)
- The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications (Special Section on Cryptography and Information Security) (1993) (17)
- A Framework for the Management of Information Security (1997) (16)
- Duality between Two Cryptographic Primitives (1990) (16)
- Characterising user data protection of software components (2000) (16)
- The Nonhomomorphicity of Boolean Functions (1998) (16)
- Organizational Modeling for Efficient Specification of Information Security Requirements (1999) (16)
- Introduction to the Special Issue on Information Theoretic Security (2008) (16)
- Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors (1996) (15)
- Privacy aware data generation for testing database applications (2005) (15)
- Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks (1994) (15)
- Pitfalls in Designing Substitution Boxes (Extended Abstract) (1994) (15)
- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code (2001) (15)
- New Results on Correlation Immunity (2000) (14)
- On Nonlinear Resilient Functions (Extended Abstract) (1995) (14)
- Security of the Blockchain against Long Delay Attack (2018) (14)
- Privacy Preserving Database Generation for Database Application Testing (2007) (14)
- Breaking real-world implementations of cryptosys-tems by manipulating their random number generation (1997) (13)
- Fast and Secure Magnetic WORM Storage Systems (2003) (13)
- Digital Watermarking Robust Against JPEG Compression (1999) (12)
- Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract) (1994) (12)
- Duality of Boolean functions and its cryptographic significance (1997) (12)
- Identity-Based Threshold Signature from the Bilinear Pairings (2004) (12)
- The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions (1995) (11)
- On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes (2002) (11)
- A Hierarchical Extraction Policy for content extraction signatures (2004) (11)
- Layered Protection of Availability (1997) (11)
- Unconditionally secure authenticated encryption (2004) (11)
- Human-Machine Identification using Visual Cryptography (1998) (10)
- Connections among nonlinearity, avalanche and correlation immunity (2003) (10)
- Zheng and Seberry’s public key encryption scheme revisited (2003) (10)
- Connections among several versions of one-way hash functions (1990) (9)
- Compact and Flexible Resolution of CBT Multicast Key-Distribution (1998) (9)
- Residuosity problem and its applications to cryptography (1988) (9)
- A testbed for quantitative assessment of intrusion detection systems using fuzzy logic (2004) (9)
- Security characterisation of software components and their composition (2000) (9)
- Security Characterisation and Integrity Assurance for Software Components and Component-Based System (1998) (9)
- Database authentication revisited (1994) (8)
- A Fast Cryptographic Hash Function Based on Linear Cellular Automata over GF(q) (1998) (8)
- Advances in cryptology-ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 2002 : proceedings (2002) (8)
- A Single Key Pair is Adequate for the Zheng Signcryption (2011) (8)
- Grouping Verifiable Content for Selective Disclosure (2003) (8)
- On Key Agreement Protocols Based on Tamper-Proof Hardware (1995) (8)
- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) (2001) (8)
- A formal model to aid documenting and harmonizing of information security requirements (1997) (8)
- Weighted One-Way Hash Chain and Its Applications (2000) (7)
- Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings (2000) (7)
- Signcryption or How to Achieve Costsignature & Encryption Costsignature + (7)
- A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services (2005) (6)
- Cryptographic Boolean functions via group Hadamard matrices (1994) (6)
- Principles for Designing Secure Block Ciphers and One-Way Hash Functions (1990) (6)
- Efficient Unconditionally Secure Digital Signatures (2004) (6)
- Harmonizer - A Tool for Processing Information Security Requirements in Organisations (1998) (6)
- A fast and secure stream cipher based on cellular automata over GF(q) (1998) (6)
- Security Properties of Software Components (1999) (6)
- Statistical Database Modeling for Privacy Preserving Database Generation (2005) (6)
- Efficient Public Key Encryption Admitting Decryption by Sender (2012) (5)
- On the Difficulty of Constructing Cryptographically Strong Substitution Boxes (1996) (5)
- An Optimization of Credit-Based Payment for Electronic Toll Collection Systems (2000) (5)
- Beacon Based Authentication (1994) (5)
- Public Key Encryption for the Forgetful (2011) (5)
- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors (1999) (5)
- The nonhomomorphicity of S-boxes (1998) (4)
- Public Key Cryptography for Mobile Cloud (2013) (4)
- Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms (2005) (4)
- Provably Secure One-Way Hash FunctionsYuliang (2007) (4)
- Signcryption with Non-interactive Non-repudiation without Random Oracles (2010) (4)
- Fast and Secure Append-Only Storage with Infinite Capacity (2003) (4)
- A Block-Based Approach to Secure ATM Networking (1998) (3)
- Pitfalls in Designing Substitution (1994) (3)
- Connections between nonlinearity and restrictions, terms and hypergraphs of Boolean functions (1998) (3)
- Optimal pairing revisited (2009) (3)
- Privacy Preserving Data Generation for Database Application Performance Testing (2004) (3)
- Relationships Among Nonlinear Criteria (Extended Abstract) (1994) (3)
- New Impossible Differential Attack on SAFER Block Cipher Family (2015) (3)
- A Mandatory Access Control Policy Model for Information Security Requirements (1998) (3)
- Improving the Secure Electronic Transaction Protocol by Using Signcryption (2001) (3)
- Kuperee: An Approach to Authentication using Public Keys (1994) (3)
- Structures of Highly Nonlinear Cryptographic Functions (1994) (3)
- Traitor traceable signature scheme (2000) (3)
- APE: An Agent Portal for Secure Ecommerce with Wireless Internet Access by PDA (2000) (3)
- A scenario based security characterisation of software components (2000) (3)
- On the Construction of Public Key Encryption with Sender Recovery (2015) (3)
- Non-Separable Cryptographic Functions (2006) (3)
- Security Characterisation and Integrity Assurance for (2000) (2)
- Multi-recipient Encryption in Heterogeneous Setting (2014) (2)
- Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings (1993) (2)
- Public Key Cryptography: (2000) (2)
- Dierential Distribution Tables and Other Properties of Substitution Boxes (1997) (2)
- How to Break and Repair Leighton and Micali's Key Agreement Protocol (1994) (2)
- Breaking Smart Card Implementations of ElGamal Signature and Its Variants (2006) (2)
- Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves (1999) (2)
- Public key encryption without random oracle made truly practical (2009) (2)
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves (2000) (2)
- Analysis of and techniques for privacy preserving data mining (2007) (2)
- Description of Provably Secure Signcryption Schemes (2005) (2)
- Skew-Frobenius map on twisted Edwards curve (2010) (2)
- Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology (1992) (2)
- Systematic Generation of Cryptographically Robust S-boxes ( Extended Abstract ) * (2017) (2)
- FAWAC: An Attack-Resistant, Multi-Enclave Distributed Ledger Architecture (2021) (2)
- Secure and automated software updates across organizational boundaries (2002) (2)
- Amending Leighton and Micali's Key Distribution Protocol 1 Leighton and Micali's Protocol (1993) (2)
- How to Construct A Family of Strong One Way Permutations (1991) (2)
- New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions (1997) (2)
- Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography (1998) (2)
- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks (1999) (2)
- New Impossible Differential Attack on SAFER + and SAFER + + (2012) (2)
- Public key cryptography : First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings (1998) (1)
- An Interactive Protocol for Image Fingerprinting (1998) (1)
- An Object-Oriented Modelling Approach into the Management of Information Security (1998) (1)
- Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings (1999) (1)
- Multi-user Quantum Cryptography (1994) (1)
- On Hierarchical KPS: An Optimized KPS Against Collusion Attacks (1998) (1)
- A formal model for refining information security requirements (1997) (1)
- Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks ∗ (2001) (1)
- A Proposal for Authenticated Key Recovery System (2005) (1)
- Parasitic Authentication (2001) (1)
- Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption (2003) (1)
- How to Recycle Shares in Secret Sharing Schemes 1 (2006) (1)
- The kth-Order Nonhomomorphicity of S-Boxes (2000) (1)
- Key-Insulated Signcryption (2013) (1)
- A New Construction of Identity-Based Signcryption without Random Oracles (2014) (1)
- On Constructions and Nonlinearity of Correlation Immune Functions (cid:0) (2009) (1)
- Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography (1999) (0)
- An alternative model of quantum key agreement via photon coupling (1996) (0)
- Enhanced Security for Information Flow in VANET using Signcryption and Trust level (2020) (0)
- A Proposal for Authenticated Key Recovery System 1 (1997) (0)
- Security Characterisation and Intergrity Assurance for Software Components and Component-Proceesings of Based Systems (1998) (0)
- Proving identity in three moves (1991) (0)
- Fast Batch Verification of Schnorr Signatures (1998) (0)
- On Pseudo Randomness from Block Ciphers | MISTY versus DES in cryptographic security| (1996) (0)
- Efficient and Secure Storage Systems Based on Peer-to-Peer Systems (2003) (0)
- The poster papers collection : third International Workshop on Practice and Theory in Public Key Cryptography, PKC2000, Melbourne Exhibition Centre, Australia, January 2000 (2000) (0)
- High Performance Agile Crypto Modules (2000) (0)
- Information Security: 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (2004) (0)
- IMPROVING SPEECH SECURITY AND AUTHENTICATION IN MOBILE COMMUNICATIONS (2006) (0)
- A Quantum Cryptosystem Secure Against Beamsplitting Attacks (2007) (0)
- Efficient and provably secure ciphers for storage device block level encryption (2005) (0)
- The kth order nonhomomorphicity of S-boxes (1999) (0)
- On Balanced Nonlinear Boolean Functions 1 (2007) (0)
- Non-existence of Certain Quadratic S-boxes and Two Bounds on Nonlinear Characteristics of General S-boxes (2007) (0)
- Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract) (1996) (0)
- Specifying security requirements and assurances of software components (2000) (0)
- Timestamps for Network Authentication Protocols Revisited (1999) (0)
- The Poster Paper Collection (2000) (0)
- Research Online Research Online Kerbie: Kerberos-type authentication using public-keys Kerbie: Kerberos-type authentication using public-keys (2020) (0)
- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks (1999) (0)
- An E � cient Scheme for Secure Message Transmission using Proxy (2006) (0)
- Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (2002) (0)
- Fraud Prevention and User Privacy in Mobile Computing ( extended summary ) (1996) (0)
- Paper Special Section on Cryptography and Information Security a Family of Fast Dedicated One-way Hash Functions Based on Linear Cellular Automata over Gf(q) (1999) (0)
- Several theorems on probabilistic cryptosystems (1989) (0)
- Building secure high-speed extranets (1997) (0)
- Coded Modulation and the Arrival of Signcryption (2009) (0)
- Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks (2005) (0)
- Mobile Agents in a Virtual Market (1999) (0)
- A Traitor Traceable Conference System with Dynamic Sender (2002) (0)
- A continuous refinement paradigm for information security requirements (1997) (0)
- The Generalized XOR Lemma (2004) (0)
- On the Diiculty of Constructing C R Y P T Ographically Strong S U Bstitution Boxes (2006) (0)
- Panel: Authentication in Constrained Environments (2005) (0)
- Building Secure High Speed ExtranetsChandana (2007) (0)
- Information Security: Second InternationalWorkshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings (1999) (0)
- Selectively handling verifiable digital content (2004) (0)
- Timestamps For Network Authentification Protocols Revisited (1999) (0)
- Anonymous and verifiable databases: towards a practical solution (1994) (0)
- How to improve the SAC (1994) (0)
- Afast and Secure Stream Cipher Based on Cellular Automata Over GR(a) (1998) (0)
- Connections among SeveralVersions of One-Way HashFunctions (1990) (0)
- Relating Nonlinearity to Propagation Characteristics (1995) (0)
- New bounds of non linearity and a class of highly non linear functions (1997) (0)
- A Framework Using Useful Work for Transient Committee Selections in Blockchain Consensus (2022) (0)
- A Blockchain Design Supporting Verifiable Reputation-based Selection of Committee Members and IPFS for Storage (2023) (0)
- Towards Proving the Security of the SPEED Cipher (1997) (0)
- Shared Cryptographic Bits Via Quantized Quadrature PhaseAmplitudes of (1996) (0)
- Verifiable Databases : Towards a Practical Solution ( Extended Abstract ) (2017) (0)
- Kerbie: Kerberos-type authentication using public-keys (1994) (0)
This paper list is powered by the following services:
Other Resources About Yuliang Zheng
What Schools Are Affiliated With Yuliang Zheng?
Yuliang Zheng is affiliated with the following schools: