Password based key exchange with mutual authentication S Jiang, G Gong International Workshop on Selected Areas in Cryptography, 267-279, 2004 | 126 | 2004 |
Attribute-based encryption without key cloning MJ Hinek, S Jiang, R Safavi-Naini, SF Shahandashti International Journal of Applied Cryptography 2 (3), 250-270, 2012 | 90 | 2012 |
An efficient deniable key exchange protocol S Jiang, R Safavi-Naini Financial Cryptography and Data Security: 12th International Conference, FC …, 2008 | 30 | 2008 |
Keyless authentication in a noisy model S Jiang IEEE transactions on information forensics and security 9 (6), 1024-1033, 2014 | 26 | 2014 |
An efficient conditionally anonymous ring signature in the random oracle model S Zeng, S Jiang, Z Qin Theoretical Computer Science 461, 106-114, 2012 | 26 | 2012 |
Optimal Secure Message Transmission by Public Discussion H Shi, S Jiang, R Safavi-Naini, MA Tuhin IEEE Transactions on Information Theory 57 (1), 572-585, 2011 | 21 | 2011 |
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period S Jiang, Z Dai, K Imamura IEEE Transactions on Information Theory 46 (3), 1174-1177, 2000 | 20 | 2000 |
The editing generator and its cryptanalysis G Gong, S Jiang International Journal of Wireless and Mobile Computing 1 (1), 46-52, 2005 | 19 | 2005 |
Asymptotic behavior of normalized linear complexity of ultimately nonperiodic binary sequences Z Dai, S Jiang, K Imamura, G Gong IEEE transactions on information theory 50 (11), 2911-2915, 2004 | 17 | 2004 |
Improved algorithm of Louvain communities dipartition ZF Wu, PF Wang, ZG Qin, SQ Jiang Journal of University of Electronic Science and Technology of China 42 (1 …, 2013 | 16 | 2013 |
On the optimality of keyless authentication in a noisy model S Jiang IEEE Transactions on Information Forensics and Security 10 (6), 1250-1261, 2015 | 15 | 2015 |
Analysis of an ABE scheme with verifiable outsourced decryption Y Liao, Y He, F Li, S Jiang, S Zhou Sensors 18 (1), 176, 2018 | 14 | 2018 |
A new conditionally anonymous ring signature S Zeng, S Jiang, Z Qin International Computing and Combinatorics Conference (COCOON), 479-491, 2011 | 14 | 2011 |
On edit distance attack to alternating step generator S Jiang, G Gong Mathematical Properties of Sequences and Other Combinatorial Structures, 85-92, 2003 | 14 | 2003 |
Deniable authentication on the internet S Jiang Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007 …, 2008 | 13 | 2008 |
Message Authentication Code over a wiretap channel D Chen, S Jiang, Z Qin 2015 IEEE International Symposium on Information Theory (ISIT), 2301-2305, 2015 | 12 | 2015 |
On interleaved sequences over finite fields S Jiang, Z Dai, G Gong Discrete mathematics 252 (1-3), 161-178, 2002 | 12 | 2002 |
Insecurity of a key-policy attribute based encryption scheme with equality test Y Liao, H Chen, F Li, S Jiang, S Zhou, R Mohammed IEEE Access 6, 10189-10196, 2018 | 11 | 2018 |
Corruption-localizing hashing GD Crescenzo, S Jiang, R Safavi-Naini European Symposium on Research in Computer Security (ESORICS), 489-504, 2009 | 11* | 2009 |
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model S Jiang, G Gong, J He, K Nguyen, H Wang IACR international conference on public-key cryptography, 396-427, 2020 | 10 | 2020 |