Shaoquan Jiang
Orcid: 0000-0001-8114-0782
According to our database1,
Shaoquan Jiang
authored at least 62 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
2023
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations.
CoRR, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
2020
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
IACR Cryptol. ePrint Arch., 2020
2018
Int. J. Netw. Secur., 2018
IEEE Access, 2018
2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Int. J. Netw. Secur., 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Theor. Comput. Sci., 2014
2013
2012
Theor. Comput. Sci., 2012
2011
IEEE Trans. Inf. Theory, 2011
Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions.
Int. J. Found. Comput. Sci., 2011
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Unconditionally secure conference key distribution: Security definitions and their relations.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the Information Security and Cryptology, 2005
2004
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences.
IEEE Trans. Inf. Theory, 2004
IACR Cryptol. ePrint Arch., 2004
Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
2002
2000
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting kappa; symbols within one period.
IEEE Trans. Inf. Theory, 2000
Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1998
Proceedings of the Sequences and their Applications, 1998