Zongyang Zhang
Zongyang Zhang
Verified email at buaa.edu.cn - Homepage
Title
Cited by
Cited by
Year
Anonymous identity-based hash proof system and its applications
Y Chen, Z Zhang, D Lin, Z Cao
International Conference on Provable Security, 143-160, 2012
242012
Generalized (identity‐based) hash proof system and its applications
Y Chen, Z Zhang, D Lin, Z Cao
Security and Communication Networks 9 (12), 1698-1716, 2016
202016
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
Y Chen, Q Huang, Z Zhang
International Journal of Information Security 15 (1), 15-33, 2016
162016
Sakai-ohgishi-kasahara identity-based non-interactive key exchange scheme, revisited
Y Chen, Q Huang, Z Zhang
Australasian Conference on Information Security and Privacy, 274-289, 2014
16*2014
Constant-round concurrent non-malleable statistically binding commitments and decommitments
Z Cao, I Visconti, Z Zhang
International Workshop on Public Key Cryptography, 193-208, 2010
142010
Two-level path authentication in epcglobal network
H Wang, Y Li, Z Zhang, Z Cao
2012 IEEE International Conference on RFID (RFID), 24-31, 2012
122012
Post-challenge leakage in public-key encryption
Z Zhang, SSM Chow, Z Cao
Theoretical Computer Science 572, 25-49, 2015
112015
Black-box separations for one-more (Static) CDH and its generalization
J Zhang, Z Zhang, Y Chen, Y Guo, Z Zhang
International Conference on the Theory and Application of Cryptology and …, 2014
112014
Identity-based extractable hash proofs and their applications
Y Chen, Z Zhang, D Lin, Z Cao
International Conference on Applied Cryptography and Network Security, 153-170, 2012
102012
On constant-round concurrent non-malleable proof systems
Z Cao, I Visconti, Z Zhang
Information Processing Letters 111 (18), 883-890, 2011
102011
Non-malleable statistically hiding commitment from any one-way function
Z Zhang, Z Cao, N Ding, R Ma
International Conference on the Theory and Application of Cryptology and …, 2009
102009
The application of disturbance observer in two-wheeled mobile robot
J Zhou, W Wu, B Ding, Z Zhang
IEEE Conference on Robotics, Automation and Mechatronics, 2004. 1, 171-174, 2004
82004
Efficient Tag Path Authentication Protocol with Less Tag Memory
H Wang, Y Li, Z Zhang, Y Zhao
International Conference on Information Security Practice and Experience …, 2016
72016
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
Z Zhang, Y Chen, SSM Chow, G Hanaoka, Z Cao, Y Zhao
International Conference on Provable Security, 435-454, 2015
72015
CCA-secure IB-KEM from identity-based extractable hash proof system
Y Chen, Z Zhang, D Lin, Z Cao
The Computer Journal 57 (10), 1537-1556, 2014
62014
All-but-One Dual Projective Hashing and Its Applications
Z Zhang, Y Chen, SSM Chow, G Hanaoka, Z Cao, Y Zhao
International Conference on Applied Cryptography and Network Security, 181-198, 2014
62014
Goal-keeper defending policy design of FIRA soccer robot [J]
J ZHOU, B DING, Z ZHANG, Y ZHANG
Journal of Harbin Institute of Technology 7, 2004
62004
Revisiting the Incentive Mechanism of Bitcoin-NG
J Yin, C Wang, Z Zongyang, J Liu
23rd Australasian Conference on Information Security and Privacy (ACISP 2018), 2018
52018
Privacy Preservation for Outsourced Medical Data With Flexible Access Control
X Zhou, J Liu, Q Wu, Z Zhang
IEEE Access 6, 14827-14841, 2018
52018
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones
Y Wang, Z Zhang, T Matsuda, G Hanaoka, K Tanaka
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20