Zhengjun Cao

Orcid: 0000-0003-2014-6093

According to our database1, Zhengjun Cao authored at least 137 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network".
IEEE Syst. J., March, 2024

The Practical Advantage of RSA over ECC and Pairings.
IACR Cryptol. ePrint Arch., 2024

A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era".
IACR Cryptol. ePrint Arch., 2024

The Systemic Errors of Banded Quantum Fourier Transformation.
IACR Cryptol. ePrint Arch., 2024

2023
A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services".
Wirel. Pers. Commun., December, 2023

A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0".
IACR Cryptol. ePrint Arch., 2023

Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
IACR Cryptol. ePrint Arch., 2023

A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments".
IACR Cryptol. ePrint Arch., 2023

A note on "authenticated key agreement protocols for dew-assisted IoT systems".
IACR Cryptol. ePrint Arch., 2023

A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor".
IACR Cryptol. ePrint Arch., 2023

A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid".
IACR Cryptol. ePrint Arch., 2023

A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment".
IACR Cryptol. ePrint Arch., 2023

A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function".
IACR Cryptol. ePrint Arch., 2023

A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network".
IACR Cryptol. ePrint Arch., 2023

A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems".
IACR Cryptol. ePrint Arch., 2023

A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT".
IACR Cryptol. ePrint Arch., 2023

A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment".
IACR Cryptol. ePrint Arch., 2023

A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things".
IACR Cryptol. ePrint Arch., 2023

A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT".
IACR Cryptol. ePrint Arch., 2023

The Planck Constant and Quantum Fourier Transformation.
IACR Cryptol. ePrint Arch., 2023

A note on quantum approximate optimization algorithm.
IACR Cryptol. ePrint Arch., 2023

A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment".
IACR Cryptol. ePrint Arch., 2023

A note on "a novel authentication and key agreement scheme for Internet of Vehicles".
IACR Cryptol. ePrint Arch., 2023

2022
A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials.
Int. J. Bifurc. Chaos, 2022

2021
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing".
IEEE Trans. Parallel Distributed Syst., 2021

Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations".
IEEE Trans. Big Data, 2021

A note on "new quantum key agreement protocols based on Bell states".
Quantum Inf. Process., 2021

One privacy-preserving multi-keyword ranked search scheme revisited.
Int. J. Inf. Comput. Secur., 2021

2020
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing.
Int. J. Netw. Secur., 2020

A Note on One Popular Non-Interactive Zero-Knowledge Proof System.
Int. J. Netw. Secur., 2020

Run-based Modular Reduction Method.
Int. J. Netw. Secur., 2020

Evaluation Methods for Chebyshev Polynomials.
IACR Cryptol. ePrint Arch., 2020

Factoring Algorithm Based on Parameterized Newton Method.
IACR Cryptol. ePrint Arch., 2020

2019
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud".
IEEE Trans. Cloud Comput., 2019

2018
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Int. J. Netw. Secur., 2018

Analysis of Deutsch-Jozsa Quantum Algorithm.
IACR Cryptol. ePrint Arch., 2018

A Note On Clauser-Horne-Shimony-Holt Inequality.
IACR Cryptol. ePrint Arch., 2018

A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System.
IACR Cryptol. ePrint Arch., 2018

Remarks on Bell's Inequality.
IACR Cryptol. ePrint Arch., 2018

New Algorithms for Subset Sum Problem.
CoRR, 2018

Analysis of Nederlof's algorithm for subset sum.
CoRR, 2018

A Note on "New techniques for noninteractive zero-knowledge".
CoRR, 2018

2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017

The Paillier's Cryptosystem and Some Variants Revisited.
Int. J. Netw. Secur., 2017

A Note on Two Schemes for Secure Outsourcing of Linear Programming.
Int. J. Netw. Secur., 2017

2016
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations".
IEEE Trans. Parallel Distributed Syst., 2016

An Improved Lindell-Waisbard Private Web Search Scheme.
Int. J. Netw. Secur., 2016

On Two Kinds of Flaws in Some Server-Aided Verification Schemes.
Int. J. Netw. Secur., 2016

The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented.
IACR Cryptol. ePrint Arch., 2016

A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2016

A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
IACR Cryptol. ePrint Arch., 2016

A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud".
IACR Cryptol. ePrint Arch., 2016

A Note On One Realization of a Scalable Shor Algorithm.
CoRR, 2016

A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem.
CoRR, 2016

A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud".
CoRR, 2016

A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization".
CoRR, 2016

2015
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review.
Int. J. Netw. Secur., 2015

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme.
Int. J. Netw. Secur., 2015

Comment on "Realization of a scalable Shor algorithm".
IACR Cryptol. ePrint Arch., 2015

A Note on the Lindell-Waisbard Private Web Search Scheme.
IACR Cryptol. ePrint Arch., 2015

On the Disadvantages of Pairing-based Cryptography.
IACR Cryptol. ePrint Arch., 2015

Comment on Demonstrations of Shor's Algorithm in the Past Decades.
IACR Cryptol. ePrint Arch., 2015

Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability.
IACR Cryptol. ePrint Arch., 2015

A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings".
CoRR, 2015

Comment on Two schemes for Secure Outsourcing of Linear Programming.
CoRR, 2015

On the Weakness of Fully Homomorphic Encryption.
CoRR, 2015

A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like.
CoRR, 2015

A fast string matching algorithm based on lowlight characters in the pattern.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

2014
An improvement of the Barrett modular reduction algorithm.
Int. J. Comput. Math., 2014

A Fast Modular Reduction Method.
IACR Cryptol. ePrint Arch., 2014

Remarks on the Cryptographic Primitive of Attribute-based Encryption.
IACR Cryptol. ePrint Arch., 2014

A Note on the Bellare-Rivest Protocol for Translucent Cryptography.
IACR Cryptol. ePrint Arch., 2014

Analysis of Lewko-Sahai-Waters Revocation System.
IACR Cryptol. ePrint Arch., 2014

Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014

On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers.
IACR Cryptol. ePrint Arch., 2014

The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited.
CoRR, 2014

A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm.
CoRR, 2014

Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P.
CoRR, 2014

A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern.
CoRR, 2014

2013
A Note on Bilinear Groups of a Large Composite Order.
IACR Cryptol. ePrint Arch., 2013

Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis.
IACR Cryptol. ePrint Arch., 2013

Improvement of One Adaptive Oblivious Transfer Scheme.
IACR Cryptol. ePrint Arch., 2013

Improvement of One Anonymous Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013

Eavesdropping or Disrupting a Communication - On the Weakness of Quantum Communications.
IACR Cryptol. ePrint Arch., 2013

A Note On the Storage Requirement for AKS Primality Testing Algorithm.
IACR Cryptol. ePrint Arch., 2013

Ordered Probability Mass Function.
CoRR, 2013

On Two Conversion Methods of Decimal-to-Binary.
CoRR, 2013

Improved Randomized Algorithm for Square Root Extraction.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
On Fast Division Algorithm for Polynomials Using Newton Iteration.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
Note on fast division algorithm for polynomials using Newton iteration
CoRR, 2011

A Heuristic Description of Fast Fourier Transform
CoRR, 2011

Improvement Of Barreto-Voloch Algorithm For Computing $r$th Roots Over Finite Fields
CoRR, 2011

Extension of Barreto-Voloch Root Extraction Method.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Adleman-Manders-Miller Root Extraction Method Revisited.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
A Note On Gottesman-Chuang Quantum Signature Scheme.
IACR Cryptol. ePrint Arch., 2010

An Anonymous ID-based Encryption Revisited.
IACR Cryptol. ePrint Arch., 2010

A Principle for Cryptographic Protocols Beyond Security, Less Parameters.
IACR Cryptol. ePrint Arch., 2010

Improvement of one escrow-free identity-based signature.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Remarks on Some Quantum Cryptographic Schemes.
IACR Cryptol. ePrint Arch., 2009

Improvement of One Quantum Encryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Remarks on One Arbitrated Quantum-signature Scheme.
IACR Cryptol. ePrint Arch., 2009

Analysis of one quantum bit string commitment.
IACR Cryptol. ePrint Arch., 2009

Security Analysis of One Quantum Digital Signature Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Generalized Greedy Algorithm for Shortest Superstring.
Proceedings of the Complex Sciences, 2009

Analysis of Two Signature Schemes from CIS'2006.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Different Authentication Properties and a Signcryption Scheme Revisited.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A General Attack against Several Group Signatures.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Security Analysis of One Verifiable Encryption Scheme.
Proceedings of the Software Engineering, 2008

How to Launch A Birthday Attack Against DES.
IACR Cryptol. ePrint Arch., 2008

Classification of signature-only signature models.
Sci. China Ser. F Inf. Sci., 2008

A Group Key Agreement Scheme Revisited.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
An Efficient Range-Bounded Commitment Scheme.
IACR Cryptol. ePrint Arch., 2007

On the Authentication of One Popular Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2007

On the Big Gap Between |p| and |q| in DSA.
IACR Cryptol. ePrint Arch., 2007

A Strong RSA Signature Scheme and Its Application.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Boudot's Range-Bounded Commitment Scheme Revisited.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
On computing ord<sub>N</sub>(2) and its application.
Inf. Comput., 2006

Classification of Signature-only Signature Models.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Analysis of One Popular Group Signature Scheme.
Proceedings of the Advances in Cryptology, 2006

2005
On the Security of a Group Signature Scheme with Strong Separability.
IACR Cryptol. ePrint Arch., 2005

Untraceability of Two Group Signature Schemes.
IACR Cryptol. ePrint Arch., 2005

A Note on Shor's Quantum Algorithm for Prime Factorization.
IACR Cryptol. ePrint Arch., 2005

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
The generalized decomposition theorem in Banach spaces and its applications.
J. Approx. Theory, 2004

Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
IACR Cryptol. ePrint Arch., 2004

Untraceability of Wang-Fu Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Security Flaws in a Pairing-based Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme.
IACR Cryptol. ePrint Arch., 2004


  Loading...