Muxiang Zhang

According to our database1, Muxiang Zhang authored at least 14 papers between 2000 and 2007.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing.
IACR Cryptol. ePrint Arch., 2007

Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues.
Proceedings of the Progress in Cryptology, 2007

2005
Security analysis and enhancements of 3GPP authentication and key agreement protocol.
IEEE Trans. Wirel. Commun., 2005

Breaking an improved password authenticated key exchange protocol for imbalanced wireless networks.
IEEE Commun. Lett., 2005

2004
Analysis of the SPEKE password-authenticated key exchange protocol.
IEEE Commun. Lett., 2004

New Approaches to Password Authenticated Key Exchange based on RSA.
IACR Cryptol. ePrint Arch., 2004

Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks.
Proceedings of the Information Security, 7th International Conference, 2004

Password Authenticated Key Exchange Using Quadratic Residues.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2003

Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks.
Proceedings of the Information Security and Cryptology, 2003

2000
Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers.
J. Cryptol., 2000

Analysis of IS-95 CDMA Voice Privacy.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

The Software-Oriented Stream Cipher SSC2.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000


  Loading...