Follow
Shaoquan Jiang
Title
Cited by
Cited by
Year
Password based key exchange with mutual authentication
S Jiang, G Gong
International Workshop on Selected Areas in Cryptography, 267-279, 2004
1252004
Attribute-based encryption without key cloning
MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti
International Journal of Applied Cryptography 2 (3), 250-270, 2012
842012
An efficient deniable key exchange protocol
S Jiang, R Safavi-Naini
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
292008
An efficient conditionally anonymous ring signature in the random oracle model
S Zeng, S Jiang, Z Qin
Theoretical Computer Science 461, 106-114, 2012
262012
Keyless authentication in a noisy model
S Jiang
IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014
252014
Optimal Secure Message Transmission by Public Discussion
H Shi, S Jiang, R Safavi-Naini, MA Tuhin
IEEE Transactions on Information Theory 57 (1), 572-585, 2011
212011
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period
S Jiang, Z Dai, K Imamura
IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000
202000
The editing generator and its cryptanalysis
G Gong, S Jiang
International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005
192005
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences
Z Dai, S Jiang, K Imamura, G Gong
IEEE transactions on information theory 50 (11), 2911-2915, 2004
162004
On the optimality of keyless authentication in a noisy model
S Jiang
IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015
152015
Improved algorithm of Louvain communities dipartition
ZF Wu, PF Wang, ZG Qin, SQ Jiang
Journal of University of Electronic Science and Technology of China 42 (1 …, 2013
152013
Analysis of an ABE scheme with verifiable outsourced decryption
Y Liao, Y He, F Li, S Jiang, S Zhou
Sensors 18 (1), 176, 2018
142018
A new conditionally anonymous ring signature
S Zeng, S Jiang, Z Qin
International Computing and Combinatorics Conference (COCOON), 479-491, 2011
142011
On edit distance attack to alternating step generator
S Jiang, G Gong
Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003
142003
Deniable authentication on the internet
S Jiang
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008
132008
Message authentication code over a wiretap channel
D Chen, S Jiang, Z Qin
2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015
122015
Corruption-localizing hashing
GD Crescenzo, S Jiang, R Safavi-Naini
European Symposium on Research in Computer Security (ESORICS), 489-504, 2009
12*2009
On interleaved sequences over finite fields
S Jiang, Z Dai, G Gong
Discrete mathematics 252 (1-3), 161-178, 2002
122002
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
S Jiang, G Gong, J He, K Nguyen, H Wang
IACR international conference on public-key cryptography, 396-427, 2020
112020
Insecurity of a key-policy attribute based encryption scheme with equality test
Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed
IEEE Access 6, 10189-10196, 2018
112018
The system can't perform the operation now. Try again later.
Articles 1–20