Xiyong Zhang
Orcid: 0000-0002-6221-726X
According to our database1,
Xiyong Zhang
authored at least 32 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient and Flexible Differet-Radix Montgomery Modular Multiplication for Hardware Implementation.
CoRR, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
2021
CoRR, 2021
2020
Model and criteria on the global finite-time synchronization of the chaotic gyrostat systems.
Math. Comput. Simul., 2020
2019
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
Ad Hoc Networks, 2019
2017
Adv. Math. Commun., 2017
2016
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016
2015
2014
Finding normal bases over finite fields with prescribed trace self-orthogonal relations.
Finite Fields Their Appl., 2014
2013
CoRR, 2013
2012
IEEE Trans. Inf. Theory, 2012
Finite Fields Their Appl., 2012
2011
Wirel. Commun. Mob. Comput., 2011
The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables.
IEEE Trans. Inf. Theory, 2011
Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011
Characterizations of Bent and Almost Bent Function on \mathbb<i>Z</i><sub><i>p</i></sub><sup>2</sup>.
Graphs Comb., 2011
Comput. Secur., 2011
2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010
2009
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Proceedings of the First International Conference on Foundations of Informatics, 2008
2007
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007
2006
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006