Edit Profile Deng, Robert Huijie Compute Distance To: Compute Author ID: deng.robert-huijie Published as: Deng, R. H.; Deng, Robert; Deng, Robert H.; Deng, Robert Huijie Documents Indexed: 97 Publications since 1987, including 10 Books all top 5 Co-Authors 1 single-authored 42 Bao, Feng 17 Weng, Jian 13 Zhou, Jianying 11 Lai, Junzuo 9 Liu, Shengli 9 Yang, Yanjiang 8 Li, Yingjiu 8 Wu, Hongjun 6 Qin, Baodong 5 Chen, Kefei 5 Cui, Hui 5 Wang, Guilin 4 Ding, Xuhua 4 Li, Tieyan 4 Zhao, Yunlei 3 Chow, Sherman S. M. 3 Ma, Di 3 Pang, HweeHwa 3 Ren, Kui 3 Wan, Zhiguo 3 Wu, Yongdong 2 Au, Man Ho 2 Chen, Minrong 2 Chu, Cheng-Kang 2 Costello, Daniel J. jun. 2 Feng, Peirong 2 Guan, Chaowen 2 He, Kai 2 Herro, Mark A. 2 Huang, Xinyi 2 Li, Yuanxing 2 Liu, Joseph K. K. 2 Liu, Ximeng 2 Ma, Changshe 2 Sakurai, Kouichi 2 Shen, Jiachen 2 Yan, Zheng 2 Yao, Gang 2 Ye, Dingfeng 2 Ye, Qin-Zhong 2 Yung, Moti 2 Zhu, Huafei 1 Ananda, Akkihebbal L. 1 Cai, Shaoying 1 Chen, Liqun 1 Cheng, Yao 1 Ching, Albert 1 Ding, Wenxiu 1 Du, Jiangling 1 Feng, Dengguo 1 Feng, Gui-Liang 1 Feng, Guiliang 1 Feng, Tao 1 Gao, Xiang 1 Gauthier-Umaña, Valérie 1 Geiselmann, Willi 1 Goi, Bok-Min 1 Gu, Dawu 1 Guo, Yan 1 Han, Yongfei 1 Igarashi, Yoshihide 1 Jeng, Albert B. 1 Joye, Marc 1 Kankanhalli, Mohan S. 1 Kim, Kwangjo 1 Ko, Chi Chung 1 Kou, Weidong 1 Kwak, DongJin 1 Kwak, Jin Ho 1 Lafanechére, Alain 1 Lai, Xuejia 1 Li, Xiangxue 1 Liu, Weiwei 1 Lo, Swee-Won 1 Lopez, Javier 1 Lou, Wenjing 1 Lu, Rongxing 1 Ma, Jianfeng 1 Ma, Siqi 1 Mao, Yijun 1 Moon, SangJae 1 Mu, Yi 1 Ochoa, Martín 1 Phan, Raphael Chung-Wei 1 Pietrobon, Steven S. 1 Preneel, Bart 1 Qing, Sihan 1 Quisquater, Jean-Jacques 1 Schnorr, Claus Peter 1 Sengupta, Binanda 1 Siddiqi, Mohammad Umar 1 Steinwandt, Rainer 1 Sun, Shifeng 1 Tang, Qiang 1 Tian, Yangguang 1 Tran, Ngoc Hieu 1 Ungerboeck, Gottfried 1 Varadharajan, Vijay 1 Wang, Guojun 1 Wang, Shuhong ...and 14 more Co-Authors all top 5 Serials 10 Information Sciences 10 Lecture Notes in Computer Science 4 IEEE Transactions on Computers 4 Computer Networks 3 IEEE Transactions on Information Theory 2 Theoretical Computer Science 2 International Journal of Applied Cryptography 1 IEEE Transactions on Communications 1 Journal of Computer and System Sciences 1 Designs, Codes and Cryptography 1 Computer Networks and ISDN Systems 1 Informatica (Ljubljana) 1 Soft Computing 1 Science China. Information Sciences Fields 81 Information and communication theory, circuits (94-XX) 48 Computer science (68-XX) 11 General and overarching topics; collections (00-XX) 1 Number theory (11-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 46 Publications have been cited 149 times in 131 Documents Cited by ▼ Year ▼ A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521Bao, Feng; Deng, Robert H. 16 1998 On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei 14 1994 Efficient unidirectional proxy re-encryption. Zbl 1284.94064Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H. 10 2010 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 8 2015 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 8 2008 Security analysis of some proxy signatures. Zbl 1092.94518Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H. 7 2004 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 6 2014 Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue 6 2011 Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng 6 2009 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 5 2010 Conditional proxy broadcast re-encryption. Zbl 1284.94065Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H. 5 2009 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 4 2010 Some remarks on a fair exchange protocol. Zbl 0966.68068Zhou, Jianying; Deng, Robert; Bao, Feng 4 2000 Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T. 4 1998 Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. 3 2016 Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082Lai, Junzuo; Deng, Robert H.; Li, Yingjiu 3 2011 Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert 3 2010 New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu 2 2017 Accountable authority identity-based encryption with public traceability. Zbl 1312.94067Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian 2 2013 Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo 2 2003 Trellis-coded multidimensional phase modulation. Zbl 0702.94003Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun. 2 1990 Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060Ding, Wenxiu; Yan, Zheng; Deng, Robert H. 1 2017 Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua 1 2017 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 1 2016 Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang 1 2014 Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian 1 2014 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116Lai, Junzuo; Deng, Robert H.; Liu, Shengli 1 2011 A new framework for RFID privacy. Zbl 1404.94063Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei 1 2010 Multiuser private queries over encrypted databases. Zbl 1171.68460Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 1 2009 An efficient PIR construction using trusted hardware. Zbl 1181.68140Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2008 nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart 1 2008 Routing optimization security in mobile IPv6. Zbl 1113.68022Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H. 1 2006 Authenticating query results in data publishing. Zbl 1122.94435Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying 1 2005 Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442Zhu, Huafei; Bao, Feng; Deng, Robert H. 1 2005 Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin 1 2005 Security analysis of two signcryption schemes. Zbl 1109.68489Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae 1 2004 Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U. 1 2004 Privacy protection for transactions of digital goods. Zbl 1050.68537Bao, Feng; Deng, Robert 1 2001 An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052Bao, Feng; Deng, Robert H.; Feng, Peirong 1 2001 Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun 1 2001 Evolution of fair non-repudiation with TTP. Zbl 0924.68078Zhou, Jianying; Deng, Robert; Bao, Feng 1 1999 Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 1 1998 RSA-type signatures in the presence of transient faults. Zbl 1083.94515Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H. 1 1997 Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018Deng, Robert H.; Costello, Daniel J. jun. 1 1987 Attribute-based encryption with expressive and authorized keyword search. Zbl 1386.94068Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu 2 2017 Encrypted data processing with homomorphic re-encryption. Zbl 1429.68060Ding, Wenxiu; Yan, Zheng; Deng, Robert H. 1 2017 Adaptable key-policy attribute-based encryption with time interval. Zbl 1384.94083Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua 1 2017 Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. Zbl 1346.94104He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. 3 2016 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 1 2016 Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei 8 2015 Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei 6 2014 Towards semantically secure outsourcing of association rule mining on categorical data. Zbl 1339.68225Lai, Junzuo; Li, Yingjiu; Deng, Robert H.; Weng, Jian; Guan, Chaowen; Yan, Qiang 1 2014 Adaptable ciphertext-policy attribute-based encryption. Zbl 1307.94067Lai, Junzuo; Deng, Robert H.; Yang, Yanjiang; Weng, Jian 1 2014 Accountable authority identity-based encryption with public traceability. Zbl 1312.94067Lai, Junzuo; Deng, Robert H.; Zhao, Yunlei; Weng, Jian 2 2013 Cryptanalysis of a certificateless signcryption scheme in the standard model. Zbl 1206.94097Weng, Jian; Yao, Guoxiang; Deng, Robert H.; Chen, Min-Rong; Li, Xiangxue 6 2011 Fully secure cipertext-policy hiding CP-ABE. Zbl 1325.68082Lai, Junzuo; Deng, Robert H.; Li, Yingjiu 3 2011 Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116Lai, Junzuo; Deng, Robert H.; Liu, Shengli 1 2011 Efficient unidirectional proxy re-encryption. Zbl 1284.94064Chow, Sherman S. M.; Weng, Jian; Yang, Yanjiang; Deng, Robert H. 10 2010 Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong 5 2010 Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei 4 2010 Efficient discrete logarithm based multi-signature scheme in the plain public key model. Zbl 1215.94060Ma, Changshe; Weng, Jian; Li, Yingjiu; Deng, Robert 3 2010 A new framework for RFID privacy. Zbl 1404.94063Deng, Robert H.; Li, Yingjiu; Yung, Moti; Zhao, Yunlei 1 2010 Efficient conditional proxy re-encryption with chosen-ciphertext security. Zbl 1307.94106Weng, Jian; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng 6 2009 Conditional proxy broadcast re-encryption. Zbl 1284.94065Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H. 5 2009 Multiuser private queries over encrypted databases. Zbl 1171.68460Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 1 2009 Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei 8 2008 An efficient PIR construction using trusted hardware. Zbl 1181.68140Yang, Yanjiang; Ding, Xuhua; Deng, Robert H.; Bao, Feng 1 2008 nPAKE\(^{ + }\): a hierarchical group password-authenticated key exchange protocol using different passwords. Zbl 1285.94099Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart 1 2008 Routing optimization security in mobile IPv6. Zbl 1113.68022Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H. 1 2006 New efficient MDS array codes for RAID. II: Rabin-like codes for tolerating multiple (greater than or equal to 4) disk failures. Zbl 1344.94102Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 New efficient MDS array codes for RAID. I: Reed-Solomon-like codes for tolerating three disk failures. Zbl 1344.94101Feng, Gui-Liang; Deng, Robert H.; Bao, Feng; Shen, Jia-Chen 3 2005 Authenticating query results in data publishing. Zbl 1122.94435Ma, Di; Deng, Robert H.; Pang, Hweehwa; Zhou, Jianying 1 2005 Sequential aggregate signatures working over independent homomorphic trapdoor one-way permutation domains. Zbl 1122.94442Zhu, Huafei; Bao, Feng; Deng, Robert H. 1 2005 Efficient and robust key management for large mobile ad hoc networks. Zbl 1101.68367Zhu, Bo; Bao, Feng; Deng, Robert H.; Kankanhalli, Mohan S.; Wang, Guilin 1 2005 Security analysis of some proxy signatures. Zbl 1092.94518Wang, Guilin; Bao, Feng; Zhou, Jianying; Deng, Robert H. 7 2004 Security analysis of two signcryption schemes. Zbl 1109.68489Wang, Guilin; Deng, Robert H.; Kwak, DongJin; Moon, SangJae 1 2004 Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity. Zbl 1103.68512Goi, Bok-Min; Phan, Raphael C.-W.; Yang, Yanjiang; Bao, Feng; Deng, Robert H.; Siddiqi, M. U. 1 2004 Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo 2 2003 Privacy protection for transactions of digital goods. Zbl 1050.68537Bao, Feng; Deng, Robert 1 2001 An efficient and practical scheme for privacy protection in the e-commerce of digital goods. Zbl 0981.68052Bao, Feng; Deng, Robert H.; Feng, Peirong 1 2001 Cryptanalysis of two sparse polynomial based public key cryptosystems. Zbl 0988.94510Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun 1 2001 Some remarks on a fair exchange protocol. Zbl 0966.68068Zhou, Jianying; Deng, Robert; Bao, Feng 4 2000 Evolution of fair non-repudiation with TTP. Zbl 0924.68078Zhou, Jianying; Deng, Robert; Bao, Feng 1 1999 A signcryption scheme with signature directly verifiable by public key. Zbl 1067.94521Bao, Feng; Deng, Robert H. 16 1998 Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. Zbl 0903.94036Bao, F.; Deng, R. H.; Han, Y.; Jeng, A.; Narasimhalu, A. D.; Ngair, T. 4 1998 Cryptanalysis of Rijmen-Preneel trapdoor ciphers. Zbl 0987.94510Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong 1 1998 RSA-type signatures in the presence of transient faults. Zbl 1083.94515Joye, Marc; Quisquater, Jean-Jacques; Bao, Feng; Deng, Robert H. 1 1997 On the equivalence of McEliece’s and Niederreiter’s public-key cryptosystems. Zbl 0803.94016Li, Yuan Xing; Deng, Robert H.; Wang, Xin Mei 14 1994 Trellis-coded multidimensional phase modulation. Zbl 0702.94003Pietrobon, Steven S.; Deng, Robert H.; Lafanechére, Alain; Ungerboeck, Gottfried; Costello, Daniel J. jun. 2 1990 Decoding of DBEC-TBED Reed-Solomon codes. Zbl 0641.94018Deng, Robert H.; Costello, Daniel J. jun. 1 1987 all cited Publications top 5 cited Publications all top 5 Cited by 350 Authors 8 Deng, Robert Huijie 8 Weng, Jian 6 Lai, Junzuo 6 Susilo, Willy 4 Qin, Baodong 4 Wong, Duncan S. 3 Au, Man Ho 3 Cao, Zhenfu 3 Chen, Yu 3 Gu, Dawu 3 Guo, Fuchun 3 Hanaoka, Goichiro 3 Hu, Yupu 3 Huang, Zhengan 3 Jia, Dingding 3 Li, Bao 3 Li, Jiguo 3 Liu, Shengli 3 Matsuda, Takahiro 3 Mu, Yi 3 Shao, Jun 3 Wang, Huaxiong 2 Bernstein, Daniel Julius 2 Chen, Kefei 2 Chen, Wenbin 2 Chow, Sherman S. M. 2 Chu, Cheng-Kang 2 Dutta, Ratna 2 Emura, Keita 2 Fan, Kai 2 Faonio, Antonio 2 Han, Shuai 2 He, Kai 2 Huang, Xinyi 2 Kawai, Yutaka 2 Kou, Weidong 2 Kumar, Neeraj 2 Kunihiro, Noboru 2 Lai, Jianchang 2 Lange, Tanja 2 Lee, Hyung Tae 2 Liang, Kaitai 2 Liu, Joseph K. K. 2 Lu, Rongxing 2 Lu, Xianhui 2 Márquez-Corbella, Irene 2 Martínez-Moro, Edgar 2 Otmani, Ayoub 2 Parampalli, Udaya 2 Pellikaan, Ruud 2 Peters, Christiane 2 Qian, Haifeng 2 Shen, Jian 2 Sun, Shifeng 2 Venturi, Daniele 2 Wang, Baocang 2 Wang, Licheng 2 Wu, Ge 2 Wu, Wei 2 Xiao, Guozhen 2 Youn, Taek-Young 2 Yu, Yong 2 Yu, Yu 2 Zhang, Futai 2 Zhang, Mingwu 2 Zhang, Yichen 2 Zhang, Zhenfeng 2 Zhao, Zhen 2 Zhou, Jianying 1 Araki, Shunsuke 1 Aref, Mohammad Reza 1 Backes, Michael 1 Bao, Feng 1 Barbier, Morgan 1 Berger, Thierry P. 1 Berzati, Alexandre 1 Boldyreva, Alexandra 1 Bossert, Martin 1 Brogle, Kyle 1 Canovas, Cécile 1 Cao, Xuefei 1 Cayrel, Pierre-Louis 1 Chabot, Christophe 1 Chang, Ting-Yi 1 Chatterjee, Krishnendu 1 Chen, Cheng 1 Chen, Jie 1 Chen, Liqing 1 Chen, Minrong 1 Chen, Rongmao 1 Chen, Wen 1 Chen, Xiaofeng 1 Chen, Xiu-Bo 1 Cheng, Chen 1 Ciet, Mathieu 1 Cui, Hui 1 Dallot, Léonard 1 Damgård, Ivan Bjerre 1 Daneshgar, Amir 1 Datta, Anupam ...and 250 more Authors all top 5 Cited in 29 Serials 18 Information Sciences 14 Theoretical Computer Science 10 Designs, Codes and Cryptography 6 Journal of Computer and System Sciences 4 Computers & Mathematics with Applications 4 Science China. Information Sciences 3 Applied Mathematics and Computation 3 Journal of Cryptology 3 Soft Computing 3 Wuhan University Journal of Natural Sciences (WUJNS) 2 Discrete Applied Mathematics 2 Information Processing Letters 2 Frontiers of Computer Science 2 Prikladnaya Diskretnaya Matematika 1 Journal of Algebra 1 Journal of Symbolic Computation 1 Algorithmica 1 Information and Computation 1 Mathematical and Computer Modelling 1 Formal Aspects of Computing 1 International Journal of Foundations of Computer Science 1 Applicable Algebra in Engineering, Communication and Computing 1 Finite Fields and their Applications 1 Journal of Applied Mathematics 1 Sādhanā 1 Journal of Shanghai Jiaotong University (Science) 1 Mathematics in Computer Science 1 Journal of Mathematical Cryptology 1 Cryptography and Communications all top 5 Cited in 11 Fields 120 Information and communication theory, circuits (94-XX) 47 Computer science (68-XX) 10 Number theory (11-XX) 5 Algebraic geometry (14-XX) 2 Commutative algebra (13-XX) 2 Quantum theory (81-XX) 1 Field theory and polynomials (12-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Operator theory (47-XX) 1 Numerical analysis (65-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Citations by Year