Shaoquan Jiang
Shaoquan Jiang
Verified email at - Homepage
Cited by
Cited by
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
International Conference on Financial Cryptography and Data Security, 47-52, 2008
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
On optimal secure message transmission by public discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE transactions on information theory 57 (1), 572-585, 2010
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
Deniable authentication on the internet
S Jiang
International Conference on Information Security and Cryptology, 298-312, 2007
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference, 479-491, 2011
CA King
Nature 246 (5427), 49-49, 1973
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
Message Authentication Code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
Timed encryption with application to deniable key exchange
S Jiang
Theoretical Computer Science 560, 172-189, 2014
More efficient DDH pseudorandom generators
H Shi, S Jiang, Z Qin
Designs, Codes and Cryptography 55 (1), 45-64, 2010
Non-interactive conference key distribution and its applications
R Safavi-Naini, S Jiang
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20