Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Maria Concetta Palumbo
Zhuo-Jia Fu
Qinghu Wang
William Jacobs
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
GONG-LIANG CHEN
Author Info
Open Visualization
Name
Affiliation
Papers
GONG-LIANG CHEN
Department of Mathematics, Nonlinear Science Centre, Wuhan University, Wuhan 430072, People's Republic of China
29
Collaborators
Citations
PageRank
31
160
13.54
Referers
Referees
References
414
428
323
Search Limit
100
428
Publications (29 rows)
Collaborators (31 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A practical solution to clone problem in anonymous information system.
1
0.41
2020
Compact E-Cash with Practical and Complete Tracing
0
0.34
2019
New results on the state cycles of Trivium.
0
0.34
2019
Micro-Trivium: A Lightweight Algorithm Designed For Radio Frequency Identification Systems
0
0.34
2017
An Untraceable ECC-Based Remote User Authentication Scheme.
0
0.34
2017
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.
3
0.38
2016
Cube attack on reduced-round Enhanced-Bivium
0
0.34
2016
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
1
0.35
2015
Novel bit-parallel multiplier for GF(2m) defined by all-one polynomial using generalized Karatsuba algorithm
2
0.37
2014
Provably secure E-cash system with practical and efficient complete tracing
3
0.39
2014
Escrowable identity-based authenticated key agreement protocol with strong security.
11
0.59
2013
The Algorithm of AAES.
0
0.34
2013
Strongly secure identity-based authenticated key agreement protocols in the escrow mode
27
0.53
2013
Low complexity bit-parallel GF(2m) multiplier for all-one polynomials.
0
0.34
2012
A New Ultralightweight RFID Authentication Protocol with Permutation
57
1.96
2012
Quavium - A New Stream Cipher Inspired By Trivium
2
0.37
2012
An alternative class of irreducible polynomials for optimal extension fields
0
0.34
2011
Speedup of bit-parallel Karatsuba multiplier in GF(2 m) generated by trinomials
6
0.47
2011
Strongly secure identity-based authenticated key agreement protocols
15
0.59
2011
Fast forth power and its application in inversion computation for a special class of trinomials
0
0.34
2010
An extension of TYT inversion algorithm in polynomial basis
1
0.40
2010
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
12
0.60
2010
On the Design of Trivium.
0
0.34
2009
Identity-Based Directed Signature Scheme from Bilinear Pairings.
5
0.51
2008
A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology
3
0.41
2007
A New Construction of Time Capsule Signature.
1
0.35
2006
Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings
0
0.34
2006
ID-based one round authenticated group key agreement protocol with bilinear pairings
9
0.54
2005
Characterization of opaque automata
1
0.61
2002
1