Yuliang ZHENG


New Impossible Differential Attack on SAFER Block Cipher Family
Jingyuan ZHAO Meiqin WANG Jiazhe CHEN Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3  pp. 843-852
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
SAFER SKSAFER+SAFER++impossible differential
 Summary | Full Text:PDF

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF

Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 120-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
digital signatureunconditional security
 Summary | Full Text:PDF

A Traitor Traceable Conference System with Dynamic Sender
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 167-174
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor traceable schemeauthentication schemedynamic senderunconditional security
 Summary | Full Text:PDF

Improving the Secure Electronic Transaction Protocol by Using Signcryption
Goichiro HANAOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/08/01
Vol. E84-A  No. 8  pp. 2042-2051
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signcryptionSETcomputational overheadmessage overhead
 Summary | Full Text:PDF

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 222-230
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF

An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1681-1690
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
credit-based paymentelectronic toll collection systemkey predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF

Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
Junji SHIKATA Yuliang ZHENG Joe SUZUKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/04/25
Vol. E83-A  No. 4  pp. 756-763
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve cryptographyelliptic curve discrete logarithm problemMenezes-Okamoto-Vanstone (MOV) algorithmsupersingular elliptic curvesordinary elliptic curves
 Summary | Full Text:PDF

A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q)
Miodrag MIHALJEVIC Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 40-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information integritycryptographic hash-functionscellular automata
 Summary | Full Text:PDF

On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
Kouichi SAKURAI Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 19-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptographyData Encryption Standarddifferential cryptanalysislinear cryptanalysispseudorandom permutationsecuritysecret-key block cipher
 Summary | Full Text:PDF

The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications
Yuliang ZHENG Thomas HARDJONO Josef PIEPRZYK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 4-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
informationsecuritycryptography
 Summary | Full Text:PDF

Proving Identity in Three Moves
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A  No. 11  pp. 3602-3606
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
 Summary | Full Text:PDF

Connections among Several Versions of One-Way Hash Functions
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1092-1099
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Authentication Techniques
Keyword: 
 Summary | Full Text:PDF

Several Theorems on Probabilistic Cryptosystems
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E  No. 7  pp. 819-827
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF

Residuosity Problem and Its Applications to Cryptography
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E  No. 8  pp. 759-767
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF