Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Jinyong
    Last name: Chang
    DBLP: 151/7156
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 19 of 19  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu.
    The ECCA Security of Hybrid Encryptions.
    Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu.
    The KDM-CCA Security of REACT.
    Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang 0016.
    Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
    Comput. J. 2017, Volume 60 (0) 2017
    Conference paper
    Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang.
    KDM Security for Identity-Based Encryption: Constructions and Separations.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
    Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue.
    Separations in circular security for arbitrary length key cycles, revisited.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Journal article
    Jinyong Chang, Rui Xue.
    A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.
    JCM 2015, Volume 10 (0) 2015
    Conference paper
    Jinyong Chang, Rui Xue.
    Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Fei Tang, Hongda Li, Jinyong Chang.
    Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Journal article
    Fei Tang, Hongda Li, Jinyong Chang.
    Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Journal article
    Jinyong Chang, Rui Xue, Anling Zhang.
    The KDM-CCA Security of the Kurosawa-Desmedt Scheme.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Bei Liang, Hongda Li, Jinyong Chang.
    The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
    Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Bei Liang, Hongda Li, Jinyong Chang.
    Verifiable Random Functions from (Leveled) Multilinear Maps.
    Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Bei Liang, Hongda Li, Jinyong Chang.
    Constrained Verifiable Random Functions from Indistinguishability Obfuscation.
    Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo.
    Verifiable Proxy Re-encryption from Indistinguishability Obfuscation.
    Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Jinyong Chang, Rui Xue.
    KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited.
    SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 2014 (0) 2014
    Conference paper
    Jinyong Chang, Rui Xue.
    General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.
    JSW 2014, Volume 9 (0) 2014
    Conference paper
    Jinyong Chang, Rui Xue.
    On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Show item 1 to 19 of 19  

    Your query returned 19 matches in the database.