default search action
Maozhi Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Tomoki Moriya, Hiroshi Onuki, Maozhi Xu, Guoqing Zhou:
Adaptive Attacks Against FESTA Without Input Validation or Constant-Time Implementation. PQCrypto (2) 2024: 3-19 - [i14]Guoqing Zhou, Maozhi Xu:
An Efficient Adaptive Attack Against FESTA. IACR Cryptol. ePrint Arch. 2024: 345 (2024) - 2023
- [c25]Guoqing Zhou, Maozhi Xu:
A Polynomial-Time Attack on G2SIDH. ICICS 2023: 91-109 - 2022
- [j31]Jinyong Chang, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. Comput. Networks 212: 109013 (2022) - [j30]Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue:
Identity-based remote data checking with a designated verifier. J. Cloud Comput. 11: 7 (2022) - [j29]Jinyong Chang, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022) - [c24]Li Li, Maozhi Xu:
RippleSign: Isogeny-Based Threshold Ring Signatures with Combinatorial Methods. CSP 2022: 11-15 - 2021
- [j28]Liucheng Shi, Zhaozhong Guo, Maozhi Xu:
Bitmessage Plus: A Blockchain-Based Communication Protocol With High Practicality. IEEE Access 9: 21618-21626 (2021) - [j27]Zhaozhong Guo, Liucheng Shi, Maozhi Xu, Hong Yin:
MRCC: A Practical Covert Channel Over Monero With Provable Security. IEEE Access 9: 31816-31825 (2021) - [j26]Chunming Tang, Maozhi Xu, Yanfeng Qi, Mingshuo Zhou:
A new class of p-ary regular bent functions. Adv. Math. Commun. 15(1): 55-64 (2021) - [j25]Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64(12) (2021) - [c23]Yangpan Zhang, Maozhi Xu:
On the Linear Complexity of Feedforward Clock-Controlled Sequence. Inscrypt 2021: 331-348 - [c22]Liwei Liu, Maozhi Xu, Guoqing Zhou:
Analysis and Improvements to the Special Number Field Sieve for Discrete Logarithm Problems. CSP 2021: 45-49 - [i13]Yangpan Zhang, Maozhi Xu:
On the linear complexity of feedforward clock-controlled sequence. CoRR abs/2108.10770 (2021) - [i12]Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu:
A New Lever Function with Adequate Indeterminacy. CoRR abs/2108.13086 (2021) - 2020
- [j24]Zhaozhong Guo, Liucheng Shi, Maozhi Xu:
SecRand: A Secure Distributed Randomness Generation Protocol With High Practicality and Scalability. IEEE Access 8: 203917-203929 (2020) - [j23]Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue:
Certificateless Homomorphic Signature Scheme for Network Coding. IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020) - [c21]Liwei Liu, Maozhi Xu:
Analysis of the Randomness Generation for PoS-Based Blockchains with Verifiable Delay Functions. BlockSys 2020: 661-674 - [c20]Liwei Liu, Maozhi Xu:
Improvements to the Descent Step in the Number Field Sieve for Discrete Logarithms. CITS 2020: 1-6
2010 – 2019
- 2019
- [j22]Dongmei Huang, Chunming Tang, Yanfeng Qi, Maozhi Xu:
New quadratic bent functions in polynomial forms with coefficients in extension fields. Appl. Algebra Eng. Commun. Comput. 30(4): 333-347 (2019) - [j21]Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue:
RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE Access 7: 50858-50868 (2019) - [j20]Jinyong Chang, Bilin Shao, Anling Zhang, Genqing Bian, Yanyan Ji, Maozhi Xu:
Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC. IEEE Access 7: 88393-88398 (2019) - [j19]Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu:
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. Comput. J. 62(8): 1232-1245 (2019) - [j18]Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue:
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91: 416-425 (2019) - [c19]Meng Zhang, Xuehong Chen, Maozhi Xu, Jie Wang:
On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography. BlockSys 2019: 60-70 - 2018
- [j17]Meng Zhang, Maozhi Xu:
Generating Pairing-Friendly Elliptic Curves Using Parameterized Families. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 279-282 (2018) - [j16]Honglong Dai, Jinying Chang, Zhenduo Hou, Maozhi Xu:
Relaxing Enhanced Chosen-Ciphertext Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2454-2463 (2018) - [j15]Yanyan Ji, Jinyong Chang, Honglong Dai, Maozhi Xu:
On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2477-2480 (2018) - [j14]Honglong Dai, Ding Wang, Jinyong Chang, Maozhi Xu:
On the RCCA Security of Hybrid Signcryption for Internet of Things. Wirel. Commun. Mob. Comput. 2018: 8646973:1-8646973:11 (2018) - 2017
- [c18]Yuhong Zhang, Meng Zhang, Maozhi Xu:
Finding vulnerable curves over finite fields of characteristic 2 by pairing reduction. ICIS 2017: 683-687 - [c17]Jie Zhu, Maozhi Xu:
A simple method to obtain relations among factor basis elements for special hyperelliptic curves. CITS 2017: 40-44 - [c16]Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu:
On the key dependent message security of DHIES. ICAIT 2017: 322-328 - [c15]Jinyong Chang, Honglong Dai, Maozhi Xu:
The KDM-CCA Security of REACT. ISPEC 2017: 85-101 - [c14]Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu:
The ECCA Security of Hybrid Encryptions. ISPEC 2017: 847-859 - 2016
- [j13]Huiting Han, Chunming Tang, Yu Lou, Maozhi Xu:
Construction of Efficient MDS Matrices Based on Block Circulant Matrices for Lightweight Application. Fundam. Informaticae 145(2): 111-124 (2016) - [j12]Zhi Hu, Guoliang Zhang, Maozhi Xu:
Some techniques for faster scalar multiplication on GLS curves. Inf. Process. Lett. 116(1): 41-46 (2016) - [j11]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. Secur. Commun. Networks 9(16): 3309-3313 (2016) - [j10]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Separations in circular security for arbitrary length key cycles, revisited. Secur. Commun. Networks 9(18): 5392-5400 (2016) - [j9]Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie:
A semantically secure public key cryptoscheme using bit-pair shadows. Theor. Comput. Sci. 654: 113-127 (2016) - [c13]Meng Zhang, Zhi Hu, Maozhi Xu:
On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1. Inscrypt 2016: 403-415 - [c12]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. ICISC 2016: 239-253 - 2015
- [j8]Chunming Tang, Maozhi Xu, Yanfeng Qi:
Cryptography on twisted Edwards curves over local fields. Sci. China Inf. Sci. 58(1): 1-15 (2015) - [j7]Yu Lou, Huiting Han, Chunming Tang, Zhangqing Wu, Maozhi Xu:
Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition. Int. J. Comput. Math. 92(3): 451-462 (2015) - [c11]Shenghui Su, Shuwang Lü, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security. COCOON 2015: 674-686 - 2014
- [j6]Chunming Tang, Yanfeng Qi, Maozhi Xu:
A note on cyclic codes from APN functions. Appl. Algebra Eng. Commun. Comput. 25(1-2): 21-37 (2014) - [j5]Chunming Tang, Dongmei Ni, Maozhi Xu, Baoan Guo, Yanfeng Qi:
Implementing optimized pairings with elliptic nets. Sci. China Inf. Sci. 57(5): 1-10 (2014) - [c10]Guodong Sun, Shenghui Su, Maozhi Xu:
Quantum Algorithm for Polynomial Root Finding Problem. CIS 2014: 469-473 - [i11]Shenghui Su, Shuwang Lü, Xiubin Fan, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes. CoRR abs/1408.6226 (2014) - 2013
- [c9]Chunming Tang, Yu Lou, Yanfeng Qi, Maozhi Xu, Baoan Guo:
A Note on Semi-bent and Hyper-bent Boolean Functions. Inscrypt 2013: 3-21 - [c8]Zhi Hu, Maozhi Xu:
The Gallant-Lambert-Vanstone Decomposition Revisited. Inscrypt 2013: 201-216 - [c7]Yanfeng Qi, Chunming Tang, Yu Lou, Maozhi Xu, Baoan Guo:
An Attribute-Based Encryption Scheme with Constant-Size Ciphertexts. GreenCom/iThings/CPScom 2013: 1086-1088 - [c6]Zhi Hu, Lin Wang, Maozhi Xu, Guoliang Zhang:
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One. ICICS 2013: 393-403 - [i10]Chunming Tang, Yanfeng Qi, Maozhi Xu:
A Note on Cyclic Codes from APN Functions. CoRR abs/1305.7294 (2013) - [i9]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Lever Function to a New Codomain with Adequate Indeterminacy. IACR Cryptol. ePrint Arch. 2013: 246 (2013) - [i8]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Public Key Cryptoscheme Using the Bit-pair Method. IACR Cryptol. ePrint Arch. 2013: 394 (2013) - [i7]Chunming Tang, Yanfeng Qi, Maozhi Xu:
New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields. IACR Cryptol. ePrint Arch. 2013: 405 (2013) - 2012
- [j4]Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0. Des. Codes Cryptogr. 63(3): 331-343 (2012) - [j3]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
The Weight Distributions of Cyclic Codes and Elliptic Curves. IEEE Trans. Inf. Theory 58(12): 7253-7259 (2012) - [i6]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A Note on Weight Distributions of Irreducible Cyclic Codes. CoRR abs/1202.3514 (2012) - [i5]Yu Lou, Huiting Han, Chunming Tang, Maozhi Xu:
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition. IACR Cryptol. ePrint Arch. 2012: 335 (2012) - 2011
- [j2]Chunming Tang, Maozhi Xu, Yanfeng Qi:
Faster pairing computation on genus 2 hyperelliptic curves. Inf. Process. Lett. 111(10): 494-499 (2011) - [c5]Xunxun Shen, Maozhi Xu, Yanhui Zhao:
Multi-Undeniable Signature Schemes. CIS 2011: 954-958 - [c4]Chenggen Song, Maozhi Xu, Chunming Tang:
Pseudorandom Generators Based on Subcovers for Finite Groups. Inscrypt 2011: 379-392 - [i4]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
The Weight Distributions of Cyclic Codes and Elliptic Curves. CoRR abs/1109.0628 (2011) - [i3]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A new class of hyper-bent Boolean functions in binomial forms. CoRR abs/1112.0062 (2011) - [i2]Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0. IACR Cryptol. ePrint Arch. 2011: 315 (2011) - [i1]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms. IACR Cryptol. ePrint Arch. 2011: 600 (2011) - 2010
- [j1]Zhenghua Zhou, Zhi Hu, Maozhi Xu, Wangan Song:
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves. Inf. Process. Lett. 110(22): 1003-1006 (2010) - [c3]Zhi Hu, Maozhi Xu, Zhenghua Zhou:
A Generalization of Verheul's Theorem for Some Ordinary Curves. Inscrypt 2010: 105-114
2000 – 2009
- 2007
- [c2]Jing Zhao, Zhigang Zhang, Maozhi Xu:
A Model of Hierarchical Key Assignment Scheme with CRT. CIS 2007: 815-818 - 2004
- [c1]Shuhong Wang, Jie Wang, Maozhi Xu:
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. ACNS 2004: 414-425
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint