1. Yuliang Zheng: An Intelligent Communication Terminal Controller using Micro-Processors, (in Chinese), Presented at 1984 National Conference on Applications of Micro-computers in Telecommunications, Ermei, China, October 1984.
  2. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: On Probabilistic Public Key Encryption Schemes with Authentication Ability, (in Japanese), 1986 National Conference Record (on communications), IEICE, No.12, p. 1-12, Tokyo, September 1986.
  3. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Remarks on the Kurosawa-Itoh-Takeuchi Cryptosystem and the Rabin Cryptosystem, (in Japanese), Proceedings of the 9th Symposium on Information Theory and Its Applications, D1-1, pp.667-672, Akakura, October 1986.
  4. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: New Approach to Zero-Knowledge Proof for All NP Statements, Proceedings of the 1987 Symposium on Cryptography and Information Security, Takarazuka, February 1987.
  5. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Cryptographic Applications of the rth Residuosity Problem with r an Odd Integer, Proceedings of the 1988 Symposium on Cryptography and Information Security, Kannami, February 1988.
  6. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Polynomial Security of a Probabilistic Cryptosystem Based on Residuosity Problem, IEICE Technical Reports on Information Security, Japan, ISEC88-4, Tokyo, May 1988.
  7. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: An Efficient Dice Casting Protocol Based on Residuosity Problem, 1988 National Spring Conference Record, IEICE, p. 1-295. Tokyo, March 1988.
  8. M. Kurosaki, Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Simple Protocols for Showing Membership of Several Groups, (in Japanese), Proceedings of the 11th Symposium on Information Theory and Its Applications, pp.585-590, Beppu, December 1988.
  9. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: A Family of Truly Secure Symmetric Block Ciphers and Its Practical Variants, (in Japanese), Proceedings of the 1989 Symposium on Cryptography and Information Security, Gotenba, February 1989.
  10. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: On the Construction of Pseudorandom Permutations, IEICE Technical Reports on Information Security, Japan, ISEC88-41, Yokohama, March 1989.
  11. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Impossibility and Optimality Results on Constructing Pseudorandom Permutations, (See also helpful graphics .) Advances in Cryptology — EuroCrypt’89, Lecture Notes in Computer Science, Vol. 434, pp. 412-422, Springer-Verlag, 1990.
  12. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproven Hypotheses, (See also helpful graphics .) Advances in Cryptology — Crypto’89, Lecture Notes in Computer Science, Vol. 435, pp. 461-480, Springer-Verlag, 1990.
  13. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: One-Way Hash Function Based on Weakened Assumption, 1990 National Spring Conference Record, IEICE of Japan, p. 1-289, Tokyo, March 1990.
  14. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Provably Secure One-Way Hash Functions, (invited talk), Presented at 1990 Workshop on Cryptography and Information Security, Hiroshima, August 1990.
  15. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Structural Properties of One-Way Hash Functions, Advances in Cryptology — Crypto’90, Lecture Notes in Computer Science, Vol. 537, pp. 285-302, Springer-Verlag, 1991.
  16. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Duality between Two Cryptographic Primitives, Proceedings of the 8-th International Conference on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC-8), Lecture Notes in Computer Science, Vol. 508, pp.379-390, Springer-Verlag, 1991.
  17. Yuliang Zheng, Thomas Hardjono and Josef Pieprzyk: Sibling Intractable Function Families and Their Applications, Advances in Cryptology — AsiaCrypt’91, Lecture Notes in Computer Science, Vol.739, pp. 124-138, Springer-Verlag, 1993.
  18. Babak Sadeghiyan, Yuliang Zheng and Josef Pieprzyk: On the Construction a Family Of Strong One-Way Permutations, Advances in Cryptology – ASIACRYPT’91, LNCS, Vol.739, pp.97-110, Springer-Verlag, 1993.
  19. Yuliang Zheng, Thomas Hardjono and Jennifer Seberry: How to Recycle Shares in Secret Sharing Schemes, Presented at 15-th Australian Computer Science Conference (ACSC-15), February 1992.
    (See the journal version: Reusing shares in secret sharing schemes, The Computer Journal, Vol. 37, No. 3, pp. 199-205, 1994.)
  20. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry: A New Approach to Database Authentication, Research and Practical Issues in Databases – Proceedings of the 3rd Australian Database Conference, pp.334-343, Ed. B. Srinivasan and J.Zeleznikow, World Scientific, 1992.
  21. Yuliang Zheng and Jennifer Seberry: Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks, Advances in Cryptology — Crypto’92, Lecture Notes in Computer Science, Vol. 740, pp.292-304, Springer-Verlag, 1993.
  22. Yuliang Zheng, Josef Pieprzyk and Jennifer Seberry: HAVAL — A One-Way Hashing Algorithm with Variable Length of Output, Advances in Cryptology — AusCrypt’92, Lecture Notes in Computer Science, Vol. 718, pp. 83-104, Springer-Verlag, Berlin, 1993. ( Get the latest version of the source code for HAVAL.)
  23. Thomas Hardjono and Yuliang Zheng: A Practical Digital Multisignature Scheme Based on Discrete Logarithms, Advances in Cryptology — AusCrypt’92, Lecture Notes in Computer Science, Vol. 718, pp. 122-132, Springer-Verlag, Berlin, 1993.
  24. Josef Pieprzyk, Babak Sadeghiyan and Yuliang Zheng: Permutations Based on Single Pseudo-Random Functions, Presented at the 16-th Australian Computer Science Conference (ACSC-16), February 1993.
  25. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Systematic Generation of Cryptographically Robust S-Boxes, Proceedings of the First ACM Conference on Computer and Communications Security, pp.171-182, The Association for Computing Machinery, New York, November 1993.
  26. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: On Constructions and Nonlinearity of Correlation Immune Functions, Advances in Cryptology — EuroCrypt’93, Lecture Notes in Computer Science, Vol. 765, pp. 181-199, Springer-Verlag, Berlin, 1994.
  27. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics, Advances in Cryptology — Crypto’93, Lecture Notes in Computer Science, Vol. 773, pp. 49-60, Springer-Verlag, Berlin, 1994.
  28. Yuliang Zheng: How to Break and Repair Leighton and Micali’s Key Agreement Protocol, Advances in Cryptology – EUROCRYPT’94, Italy, May 1994, LNCS, Vol.950, pp.299-305, Springer-Verlag, Berlin, 1995.
  29. Chris Chance, Luke O’Connor, Josef Pieprzyk, Rei Safavi-Naini and Yuliang Zheng: Comments on Soviet Encryption Algorithm, Advances in Cryptology – EUROCRYPT’94, LNCS, Vol.950, pp.433-438, Springer-Verlag, Berlin, 1995.
    See also Chris Chance, Luke O’Connor, Josef Pieprzyk, Rei Safavi-Naini and Yuliang Zheng: Further Comments on Soviet Encryption Algorithm, University of Wollongong, Australia, Technical Report TR-9-94, 1994.
  30. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Relationships among Nonlinearity Criteria, Advances in Cryptology — EuroCrypt’94, Lecture Notes in Computer Science, Vol. 950, pp. 376-388, Springer-Verlag, 1995.
  31. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Nonlinearity Characteristics of Quadratic Substitution Boxes, Proceedings of the 1994 Workshop on Selected Area in Cryptography (SAC’94), Kingston, Ontario, Canada, pp. 14-27, May 1994.
  32. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: How to Improve the SAC, Proceedings of the 1994 Workshop on Selected Area in Cryptography (SAC’94), Kingston, Ontario, Canada, pp.52-58, May 1994.
  33. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Pitfalls in Designing Substitution Boxes, Advances in Cryptology — Crypto’94, Lecture Notes in Computer Science, Vol. 839, pp. 383-396, Springer-Verlag, Berlin, 1994.
  34. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry: Anonymous and Verifiable Databases: towards a Practical Solution, the 1994 IFIP SEC’94 International Conference on Information Security, Dutch Caribbean, IFIP, pp.134-141, May 1994.
  35. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry: Kuperee: an Approach to Kerberos-Type Authentication Using Public Keys, Upper Layer Protocols, Architectures and Applications, IFIP Transactions C: Communication Systems, pp.65-76, North-Holland, 1994.
  36. Mark Arnold and Yuliang Zheng: Network Security Case Studies: Secure Talk, Proceedings of the Australian UNIX Users’ Group Conference (AUUG94), pp.95-104, Melbourne, September 6-9, 1994. (Received the only best paper award. Arnold also received $500 as the best student speaker. The award was presented by Dr Dennis Ritchie, the co-inventor of Unix and the head of the computing technology research department of the AT&T Bell Labs.)
  37. Asad Jiwa, Jennifer Seberry and Yuliang Zheng: Network Security Featuring Beacon Based Authentication, Proceedings of the 5th Australasian Conference on Information Systems (ACIS’94), pp.577-588, Melbourne, September 27-29, 1994.
  38. Asad Jiwa, Jennifer Seberry and Yuliang Zheng: Beacon Based Authentication, Computer Security – ESORICS’94, LNCS, Vol.875, pp.125-141, Springer-Verlag, Berlin, 1994.
  39. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Structures of Highly Nonlinear Cryptographic Functions, Volume 1 of Proceedings of the 1994 International Symposium on Information Theory and its Application (ISITA’94), NCP 94/9, The Institute of Engineers, Australia, pp.229-234, 1994.
  40. Yi Mu, Yuliang Zheng and Yan-Xia Lin: Multi-User Quantum Cryptography, Volume 1 of Proceedings of the 1994 International Symposium on Information Theory and its Application (ISITA’94), NCP 94/9, The Institute of Engineers, Australia, pp.245-250, 1994.
  41. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Structures of Cryptographic Functions with Strong Avalanche Characteristics, Advances in Cryptology — AsiaCrypt’94, Lecture Notes in Computer Science, Vol.917, pp.119-132, Springer-Verlag, 1995.
  42. Yuliang Zheng: STRANDOM – A Cryptographically Strong Pseudo-Random Number Generator Based on HAVAL, Presented at the Rump Session at AsiaCrypt’94, December 1994. ( Get the latest version of the source code for STRANDOM.)
  43. Chenthurvasan Duraiappan and Yuliang Zheng: Enhancing Security in GSM, 1994 International Computer Symposium, December 1994, Taiwan.
  44. Chenthurvasan Duraiappan and Yuliang Zheng: Speech Security and Authentication in Mobile Communications,Proceedings of the Fifth Australian International Conference on Speech Science and Technology (SST’94), pp.182-187, Perth, 6-8 December 1994.
  45. Nitin Devikar and Yuliang Zheng: Security Enhanced Direct Store Delivery System,Proceedings of the 18th Australasian Computer Science Conference (ACSC’95), pp.130-135, Adelaide, February 1995.
  46. Xian-Mo Zhang and Yuliang Zheng: On Nonlinear Resilient Functions, Advances in Cryptology — EuroCrypt’95, Lecture Notes in Computer Science, Vol. 921, pp. 274-288, Springer-Verlag, 1995. (final version),
  47. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Relating Nonlinearity to Propagation Characteristics, Proceedings of 1995 Cryptography Policy and Algorithms Conference, pp.283-297, Brisbane, July 1995.
  48. Koichi Sakurai and Yuliang Zheng: On Pseudo-Randomness from Block Ciphers: MISTY versus DES in Cryptographic Security, Proceedings of the 1996 Symposium on Cryptography and Information Security, pp.11C1-10, January 29-31, 1996, Komura, Japan
  49. Xian-Mo Zhang and Yuliang Zheng: Auto-Correlation and New Bounds on the Nonlinearity of Cryptographic Functions, Advances in Cryptology — EuroCrypt’96, Lecture Notes in Computer Science, Vol. 1070, pp. 294-306, Springer-Verlag, 1996.
  50. Yuliang Zheng: Fraud Prevention and User Privacy in Mobile Computing, Proceedings of the 1996 Workshop on Mobile Computing, Databases and Applications, pp.60-65, February 1996.
  51. Xian-Mo Zhang and Yuliang Zheng: Difference Distribution Table of a Regular Substitution Box, Proceedings of the Third Annual Workshop on Selected Areas in Cryptography (SAC’96), pp. 57-60, August 1996, Kingston, Ontario, Canada.
  52. Yuliang Zheng: An Authentication and Security Protocol for Mobile Computing, Mobile Communications – Technology, Tools, Applications, Authentication and Security (Proceedings of IFIP World Conference on Mobile Communications), Edited by J. L. Encarnacao and J. M. Rabaey, pp.249-257, Chapman & Hall, 2-6 September 1996, Canberra, Australia. ( The slides contain an improvement to the protocol. )
  53. Yuliang Zheng: Authentication and Security Based on Broadcasting Channels, Volume 2 of Proceedings of the 1996 IEEE International Symposium on Information Theory and its Application (ISITA’96), Victoria, B.C., Canada, pp.448-451, 1996.
  54. Yi Mu and Yuliang Zheng: An Alternative Model of Quantum Key Agreement via Beam-Splitter Based Photon Coupling, Information Security and Privacy — ACISP’96, Lecture Notes in Computer Science, Vol. 1172, pp. 320-331, Springer-Verlag, 1996.
  55. Yuliang Zheng and Tsutomu Matsumoto: Breaking Smart Card Implementations of ElGamal Signature and Its Variants Presented at the Rump Session of Asiacrypt96, 5 November 1996. (The slides)
  56. Koichi Sakurai and Yuliang Zheng: Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis, Algorithms and Computation — Proceedings of the 7th International Symposium ISAAC’96, LNCS, Vol.1178, pp.376-385, December 16-18, 1996, Osaka, Japan.
  57. Yuliang Zheng and Tsutomu Matsumoto: Breaking Real-World Implementations of Cryptosystems by Manipulating their Random Number Generation, Proceedings of the 1997 Symposium on Cryptography and Information Security, pp.6B1-6, January 29 February 1, 1997, Fukuoka, Japan.
  58. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: ATM Cell Based Security Implementation, Proceedings of the Second New Zealand ATM and Broadband Workshop – ATMWORKS’97, pp.67-82, February 1997.
  59. Jussipekka Leiwo and Yuliang Zheng: A Method to Aid in Documenting and Harmonization of Information Security Requirements, Proceedings of 1997 IFIP TC11 International Conference on Information Systems Security, May 1997.
  60. Jussipekka Leiwo and Yuliang Zheng: Layered Protection of Availability, Proceedings of 1997 Pacific Asian Conference on Information Systems, Brisbane, Australia, April 1997.
  61. Yuliang Zheng: The SPEED Cipher, Financial Cryptography — First International Conference FC’97, Anquilla, the British West Indies, 24-28 February 1997, Lecture Notes in Computer Science, Vol.1318, pp.71-89, Springer-Verlag. ( Get the latest version of the source code for SPEED.)
  62. Jussipekka Leiwo and Yuliang Zheng: A Method to Implement a Denial of Service Protection Base, Information Security and Privacy – ACISP’97, LNCS, Vol.1270, pp.90-101, Springer-Verlag, 1997.
  63. Xian-Mo Zhang and Yuliang Zheng: New Lower Bounds on Nonlinearity and A Class of Highly Nonlinear Functions, Information Security and Privacy — ACISP’97, Lecture Notes in Computer Science, Vol. 1270, pp. 90-101, Springer-Verlag, 1997.
  64. Yuliang Zheng: Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption), Advances in Cryptology — Crypto’97, Lecture Notes in Computer Science, Vol. 1294, pp. 165-179, Springer-Verlag, 1997 (revised version). Also available is the full version which has 47 pages.
  65. Xian-Mo Zhang, Yuliang Zheng and Hideki Imai: Non-existence of Certain Quadratic S-boxes and Two Bounds on Nonlinear Characteristics of General S-boxes, Proceedings of the Forth Annual Workshop on Selected Areas in Cryptography (SAC’97), pp. 27-39, August 1997.
  66. Xian-Mo Zhang, Yuliang Zheng and Hideki Imai: Duality of Boolean Functions and Its Cryptographic Significance, Information and Communications Security — Proceedings of 1997 International Conference on Information and Communications Security (ICICS’97), Beijing, Lecture Notes in Computer Science, Vol. 1334, pp. 159-169, Springer-Verlag, 1997.
  67. Xian-Mo Zhang, Yuliang Zheng and Hideki Imai: Differential Distribution Tables and Other Properties of Substitution Boxes, Proceedings of the 1997 Joint Workshop on Information Security and Cryptology (JW-ISC’97), pp.19-30, October 26-28, 1997, Seoul, Korea.
  68. Tsuyoshi Nishioka, Kanta Matsuura, Yuliang Zheng and Hideki Imai: A Proposal for Authenticated Key Recovery System, in Proceedings of the 1997 Joint Workshop on Information Security and Cryptology (JW-ISC’97), pp.189-196, October 26-28, 1997, Seoul, Korea.
  69. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: Building Secure High-Speed Extranets, Proceedings of the 2nd Nordic Workshop on Secure IT Systems (NORDSEC’97), #3 in Session 3 – Secure Applications. Helsinki, Finland, November 6-7, 1997. (ISBN 951-2237-83-0)
  70. Jussipekka Leiwo and Yuliang Zheng: A Framework for the Management of Information Security, Information Security — Proceedings of the 1997 Information Security Workshop (ISW’97), Ishikawa, Japan, LNCS, Vol.1396, pp. 232-245, Springer-Verlag, 1998.
  71. Yuliang Zheng: Signcryption and Its Applications in Efficient Public Key Solutions, Proceedings of 1997 Information Security Workshop (ISW’97), Lecture Notes in Computer Science, vol.1397, pp.291-312, Springer-Verlag, 1998. (invited lecture)
  72. Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng: A Mandatory Access Control Policy Model for Information Security Requirements, Computer Science — Proceedings of the 21st Australasian Computer Science Conference (ACSC’98), pp.527-538, Perth, February 1998. (Australian Computer Science Communications, Vol.20, No.1, Springer.)
  73. Yuliang Zheng and Hideki Imai: Compact and Unforgeable Key Establishment over an ATM Network, Proceedings of IEEE INFOCOM’98, pp.411-418, 29/3-3/4 1998, San Francisco. (Download full version here.)
  74. Kanta Matsuura, Yuliang Zheng and Hideki Imai: Compact and Flexible Resolution of CBT Multicast Key-Distribution, Proceedings of the Second International Conference on Worldwide Computing and Its Applications (WWCA’98), Lecture Notes in Computer Science, Vol. 1368, pp. 190–205, Springer-Verlag, 1998.
  75. M. Mihaljevic, Yuliang Zheng and Hideki Imai: A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation, Public Key Cryptography — Proceedings of PKC’98, 5-6 February, 1998, Yokohama, Japan, LNCS, Vol.1341, pp.217-233, Springer-Verlag, 1998.
  76. Miodrag Mihaljevic, Yuliang Zheng and Hideki Imai: A Fast Cryptographic Hash Function Based on Linear Cellular Automata over GF(q), Proceedings of the IFIP 14th International Information Security Conference (IFIP/SEC’98), Chapman & Hall, September 1998, pp.96-110, Vienna, Austria.
  77. Yuliang Zheng and Hideki Imai: Efficient Signcryption Schemes On Elliptic Curves , Proceedings of the IFIP 14th International Information Security Conference (IFIP/SEC’98), Chapman & Hall, September 1998, Vienna, Austria.
  78. Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng: An Object-Oriented Modeling Approach to the Management of Information Security, Proceedings of the IFIP 14th International Information Security Conference (IFIP/SEC’98), IFIP, pp.575-579, Vienna, Austria, 1998.
  79. Yuliang Zheng: Teaching Information Security to Network Computing Professionals, presented at the Fourth IFIP TC11 Working Group 11.8 Workshop on Information Security Education, 2 September 1998, Vienna.
  80. Xian-Mo Zhang, Yuliang Zheng and Hideki Imai: Connections between Nonlinearity and Restrictions, Terms and Hypergraphs of Boolean Functions, Proceedings of 1998 IEEE International Symposium on Information Theory, p.439, IEEE Press, August 1998, MIT, Boston.
  81. Goichiro Hanaoka, Yuliang Zheng and Hideki Imai: LITESET: a Light-Weight Secure Electronic Transaction Protocol, Information Security and Privacy — ACISP’98, Lecture Notes in Computer Science, Vol. 1438, pp. 215-226, Springer-Verlag, 1998. (full version)
  82. Xian-Mo Zhang and Yuliang Zheng: The Nonhomomorphicity of Boolean Functions, Proceedings of the Fifth Annual Workshop on Selected Areas in Cryptography (SAC’98), Kingston, Ontario, Canada, August 1998, LNCS, Vol.1556, pp. 280-295, Springer-Verlag, 1999.
  83. Mi-Ra Kim, Ji-Hwang Park and Yuliang Zheng: Human-Machine Identification Using Visual Cryptography, Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS’98), November 1998, Melbourne, pp. 178-182, IEEE.
  84. Goichiro Hanaoka, Tsuyoshi Nishioka, Kanta Matsuura, Yuliang Zheng and Hideki Imai: On Hierarchical KPS: an Optimized KPS against Collusion Attacks, Proceedings of the 1998 IEEE International Symposium on Information Theory and its Application (ISITA’98), pp.247-250, Mexico City, October 1998.
  85. Kensuke Baba, Keiichi Iwamura, Yuliang Zheng, and Hideki Imai: An Interactive Protocol for Image Fingerprinting, Proceedings of the 1998 IEEE International Symposium on Information Theory and its Application (ISITA’98), pp.355-359, Mexico City, October 1998.
  86. Miodrag Mihaljevic, Yuliang Zheng and Hideki Imai: A Fast and Secure Stream Cipher based on Cellular Automata over GF(q), Proceedings of IEEE GLOBECOM’98, pp.3250-3255, IEEE. (ISBN 0-7803-4985-7)
  87. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: Fast Batch Verification of Schnorr Signature, Proceedings of the 3rd Nordic Workshop on Secure IT Systems (NORDSEC’98), Norway, November 5-6, 1998. (ISBN 829-9398-01-0)
  88. Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng: Harmonizer – A Tool for Dealing with information Security Requirements in Organizations, Proceedings of the 3rd Nordic Workshop on Secure IT Systems (NORDSEC’98), Norway, November 5-6, 1998.
  89. Jun Han and Yuliang Zheng: Security Characterization and Integrity Assurance for Software Components and Component-Based Systems, Proceedings of 1998 Australasian Workshop on Software Architectures (AWSA’98), pp.83-87, Melbourne, Australia, November 1998. (ISBN 0-7326-1781-2)
  90. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: A Block-Based Approach to Secure ATM- Networking, Proceedings of the 1998 International Computer Symposium (ICS’98), pp.41-48, Taiwan, December 1998. (ISBN 957-8845-11-1)
  91. Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng: A Model for Assurance of External Properties of Information Security Requirements, Proceedings of the 1998 International Computer Symposium (ICS’98), pp.124-131, Taiwan, December 1998. (ISBN 957-8845-11-1)
  92. Yuliang Zheng and Xian-Mo Zhang: The Nonhomomorphicity of S-Boxes, Proceedings of the 1998 International Conference on Information Security and Cryptography (ICISC’98), pp.131-145, Seoul, Korea, December 1998. (ISBN 89-85305-14-X)
  93. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: Encrypted Message Authentication by Firewalls, Proceedings of 1999 International Workshop on Practice and Theory in Public Key Cryptography (PKC’99), 1-3 March, 1999, Kamakura, Japan, LNCS, Vol.1560, pp.69-81, Springer-Verlag, 1999.
  94. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption, Computer Science — Proceedings of the 22nd Australasian Computer Science Conference (ACSC’99), pp.420-431, Auckland, January 1999. (Australian Computer Science Communications, Vol.21, No.1, Springer.)
  95. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: An Optimized Credit-Payment System for Expressway Toll Collection Systems, Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC’99), Editors: Manuel Blum & C. H. Lee, pp.203-212, Hong Kong, July 1999. (ISBN 962-937-049-2)
  96. Yuliang Zheng and Xian-Mo Zhang: The k-th Order Nonhomomorphicity of S-Boxes, Proceedings of the 1999 Information Theory and Networking Workshop, Metsovo, Greece, 26 June-1 July 1999.
  97. Yuliang Zheng and Xian-Mo Zhang: Strong Linear Dependence and Unbiased Distribution of Non-Propagative Vectors, Selected Areas in Cryptography – Proceedings of SAC’99, Kingston, Ontario, Canada, August 1999, LNCS, Vol.1758, pp. 92-105, Springer-Verlag, 1999.
  98. Jussipekka Leiwo, Chandana Gamage and Yuliang Zheng: Organizational Modeling for Efficient Specification of Information Security Requirements, Advances in Databases and Information Systems — Proceedings of the 1999 East-European Conference on Advances in Databases and Information Systems, Maribor, Slovenia, 13-16 September 1999, LNCS, Vol.1691, pp.247-260, Springer-Verlag.
  99. Junji Shikata, Yuliang Zheng, Joe Suzuki and Hideki Imai: Optimizing the Menezes-Okamoto-Vanstone Algorithm for Non-Supersingular Elliptic Curves, Advances in Cryptology – Asiacrypt’99, Singapore, November 1999, LNCS, Vol.1716, pp.86-102, Springer-Verlag.
  100. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: An efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks, Proceedings of Asiacrypt’99, Singapore, November 1999, LNCS, Vol.1716, pp.348-362, Springer-Verlag.
  101. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks, Proceedings of the Second International Conference on Information and Communication Security (ICICS’99), Sydney, November 1999, LNCS, Vol.1726, pp.157-168, Springer-Verlag.
  102. Yuliang Zheng and Xian-Mo Zhang: Plateaued Functions, Proceedings of the Second International Conference on Information and Communication Security (ICICS’99), Sydney, November 1999, LNCS, Vol.1726, pp.284-300, Springer-Verlag.
  103. H.-J. Lee, J.-H. Park and Yuliang Zheng: Digital Watermarking Robust against JPEG Compression, Proceedings of the 1999 International Information Security Workshop (ISW’99), LNCS, Vol.1729, pp.167-177, Springer-Verlag, 1999.
  104. Khaled Khan, Jun Han and Yuliang Zheng: Security Properties of Software Components, Proceedings of the 1999 International Information Security Workshop (ISW’99), LNCS, Vol.1729, pp.52-56, Springer-Verlag, 1999.
  105. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: Timestamps for Network Authentication Protocols Revisited, Proceedings of the 4th Nordic Workshop on Secure IT Systems (NORDSEC’99), pp.269-290, Norway, November 1-2, 1999. (ISBN 91-7153-955-7)
  106. Yuliang Zheng and Xian-Mo Zhang: Relationships between Bent Functions and Complementary Plateaued Functions, Proceedings of the 1999 International Conference on Information Security and Cryptology (ICISC’99), LNCS, Vol.1787, pp.60-75, Springer-Verlag, 2000.
  107. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: Why Hierarchical Key Distribution is Appropriate for Multicast Networks, Proceedings of the 1999 International Conference on Information Security and Cryptology (ICISC’99), LNCS, Vol.1787, pp.120-131, Springer-Verlag, 2000.
  108. Khaled Khan, Jun Han and Yuliang Zheng: Characterizing User Data Protection of Software Components, Proceedings of 2000 Australian Software Engineering Conference (ASWEC2000), pp.3-11, Canberra, Australia, April 2000, IEEE Computer Society Press. (ISBN 0-7695-0631-3)
  109. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng: High Performance Agile Crypto Modules, Information Security and Privacy – ACISP2000, LNCS, Vol.1841, pp.74-88, Springer-Verlag, 2000.
  110. Yuji Watanabe, Yuliang Zheng and Hideki Imai: Traitor Traceable Signature Scheme, Proceedings of 2000 IEEE International Symposium on Information Theory, Sorrento, Italy, IEEE Press, June 2000.
  111. Tim Ebringer, Yuliang Zheng and Peter Thorne: Parasitic Authentication, Smart Card Research and Advanced Applications — Proceedings of IFIP TC8/WG8.8 4th Working Conference on Smart Card Research and Advanced Applications (CARDIS2000), Bristol, UK, September 2000, pp. 307-326, Kluwer Academic Publishers.
  112. Yuliang Zheng and Xian-Mo Zhang: Improved Upper Bound on Nonlinearity of High Order Correlation Immune Functions, Selected Areas in Cryptography – Proceedings of SAC2000, Waterloo, Canada, August 2000, LNCS, Vol.2012, pp. 262-274, Springer-Verlag, 2001.
  113. Yuliang Zheng and Xian-Mo Zhang: Non-Separable Cryptographic Functions, Proceedings of the 2000 IEEE International Symposium on Information Theory and its Application (ISITA2000), pp.51-58, Hawaii, November 2000.
  114. Yuji Watanabe, Yuliang Zheng and Hideki Imai: Software Copyright Protection In the Presence of Corrupted Providers, Proceedings of the 2000 IEEE International Symposium on Information Theory and its Application (ISITA2000), pp.501-504, Hawaii, November 2000.
  115. Goichiro Hanaoka, Yuliang Zheng and Hideki Imai: Renewing Scheme for Secret Keys in ID-based Cryptosystems, Proceedings of the 2000 IEEE International Symposium on Information Theory and its Application (ISITA2000), pp.227-230, Hawaii, November 2000.
  116. Jun Han and Yuliang Zheng: Security Characterisation and Integrity Assurance for Component-Based Software, Proceedings of the 2000 International Conference on Software Methods and Tools (SMT2000), P. Croll and J. Gray (editors), Wollongong, Australia, November 2000, pages 61-66. IEEE Computer Society Press. (Invited paper)
  117. Khaled Khan, Jun Han and Yuliang Zheng: Security Characterisation of Software Components and Their Composition, Proceedings of the 35th International Symposium on Object Oriented Languages and Systems (TOOLS-Asia 2000), Xian, China, November 2000, pages 240-249. IEEE Computer Society Press.
  118. Yuliang Zheng and Xian-Mo Zhang: On Relationships among Propagation Degree, Nonlinearity and Correlation Immunity, Advances in Cryptology – Asiacrypt2000, Kyoto, December 2000, LNCS, Vol.1976, pp.470-482, Springer-Verlag.
  119. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng and Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability, Advances in Cryptology – Asiacrypt2000, Kyoto, December 2000, LNCS, Vol.1976, pp.130-142, Springer-Verlag.
  120. Patrik Mihailescu, Elizabeth Kendall and Yuliang Zheng: Mobile Agent Platform for Mobile Devices, ASA/MA 2000, Zurich, September 2000.
  121. Sung-Ming Yen and Yuliang Zheng: Weighted One-Way Hash Chain and Its Applications, Proceedings of the 2000 International Information Security Workshop (ISW2000), LNCS, Vol.1975, pp.135-148, Springer-Verlag, November 2000.
  122. Ron Steinfeld and Yuliang Zheng: A Signcryption Scheme Based on Integer Factorization, Proceedings of the 2000 International Information Security Workshop (ISW2000), LNCS, Vol. 1975, pp.308-322, Springer-Verlag, November 2000.
  123. Khaled Khan, Jun Han and Yuliang Zheng: A Scenario Based Security Characterisation of Software Components, Proceedings of the 3rd Australian Workshop on Software Architectures, Sydney, Melbourne, pp. 55-63, sponsored by IEEE Computer Society NSW section, Published by Monash University, November 19-20, 2000.
  124. Khaled Khan, Jun Han and Yuliang Zheng: Specifying Security Requirements and Assurances of Software Components, Proceedings of the 5th Australian Workshop on Requirements Engineering, Brisbane, pp. 57-65, December 8-9, 2000.
  125. Yuliang Zheng: Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite, Proceedings of 2001 International Workshop on Practice and Theory in Public Key Cryptography (PKC2001), Chejo, Korea, LNCS, Vol.1992, pp.48-63, Springer-Verlag, February 2001.
  126. Ron Steinfeld and Yuliang Zheng: An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits, Topics in Cryptology — CT-RSA 2001, LNCS, Vol.2020, pp.52-62, Springer-Verlag, April 2001.
  127. Khaled Khan, Jun Han and Yuliang Zheng: A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components, Proceedings of the 2001 Australian Software Engineering Conference (ASWEC’01), Canberra, Australia, pp. 117-126, IEEE Computer Society Press, August 2001.
  128. Ron Steinfeld, Laurence Bull and Yuliang Zheng: Content Extraction Signatures, Proceedings of the 2001 International Conference on Information Security and Cryptology (ICISC2001), LNCS, Vol.2288, pp.285-304, Springer-Verlag, 2002. Full version with detailed proofs.
  129. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng: Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (Or: The Importance of the Order of Decryption and Validation), Proceedings of the 8th IMA International Conference on Cryptography and Coding, Royal Agricultural College, Cirencester, UK, LNCS, Vol.2260, pp. 114-127, Springer-Verlag, December 2001.
  130. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng and Hideki Imai: Efficient and Unconditionally Secure Signature Schemes and a Security Analysis of a Multireceiver Authentication Code, Proceedings of 2002 International Workshop on Practice and Theory in Public Key Cryptography (PKC2002), Paris, LNCS, Vol.2274, pp.64-79, Springer-Verlag, February 2002.
  131. Joonsang Baek, Ron Steinfeld and Yuliang Zheng: Formal Proofs for the Security of Signcryption, Proceedings of 2002 International Workshop on Practice and Theory in Public Key Cryptography (PKC2002), Paris, LNCS, Vol.2274, pp.80-98, Springer-Verlag, February 2002.
  132. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng and Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes, Advances in Cryptology – Eurocrypt2002, Amsterdam, LNCS, Vol.2332, pp.434-449, Springer-Verlag, April 2002.
  133. Ron Steinfeld, Joonsang Baek and Yuliang Zheng, On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes, Information Security and Privacy – ACISP2002, LNCS, Vol.2384, pp.241-256, Springer-Verlag, 2002.
  134. Lawrence Teo and Yuliang Zheng, Secure and Automated Software Updates across Organizational Boundaries, Proceedings of the 3rd IEEE Annual Information Assurance Workshop, IEEE Press, June 2002.
  135. Lawrence Teo, Yuliang Zheng and Gail-Joon Ahn: Intrusion Detection Force: an Infrastructure for Internet Scale intrusion Detection, Proceedings of the First IEEE International Workshop on Information Assurance (IWIA03), pp.73-86, IEEE Press, March 2003.
  136. Seungjoo Kim, Masahiro Mambo and Yuliang Zheng: Rethink Chosen-Ciphertext Security under Kerckhoffs’ Assumption, Topics in Cryptology — CT-RSA 2003, LNCS, Vol.2612, pp.227-243, Springer-Verlag, April 2003.
  137. Lawrence Teo, Gail-Joon Ahn and Yuliang Zheng: Dynamic and Risk-Aware Network Access Management, Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT03), pp.217-230, ACM, June 2003.
  138. Yongge Wang, Yuliang Zheng and Bill Chu: Efficient and Secure Storage Systems based on Peer-to-Peer Systems, Proceedings of The 2003 International Conference on Artificial Intelligence — Intelligent Pervasive Computing Workshop (IC-AI’03), June 23-26, 2003, Las Vegas, Nevada, USA, pages 17-22, 2003, (Eds. H.R.Arabnia, R. Joshua, and Y. Mun) CSREA Press.
  139. Laurence Bull, David Squire, Jan Newmarch and Yuliang Zheng: Grouping Verifiable Content for Selective Disclosure using XML Signatures, Information Security and Privacy – ACISP2003, LNCS, Vol.2727, pp.1-12, Springer-Verlag, 2003.
  140. Xintao Wu, Yongge Wang, and Yuliang Zheng: Privacy Preserving Database Application Testing, Proceedings of the 2003 ACM Workshop on Privacy in Electronic Society, pp.118-128, ACM, June 2003.
  141. Yongge Wang, and Yuliang Zheng: Fast and Secure WORM Storage Systems, Proceedings of the Second IEEE International Security in Storage Workshop (SISW 2003), IEEE Computer Society, pp. 11-19, 2003. (ISNB 0-7695-2059-6)
  142. Joonsang Baek and Yuliang Zheng: Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman Group, Proceedings of 2003 IEEE GLOBECOM Conference, Communication Security Track, SC04-7, pp.1491-1495, IEEE Press, 2003.
  143. Joonsang Baek and Yuliang Zheng: Identity-Based Threshold Decryption, Proceedings of 2004 International Workshop on Practice and Theory in Public Key Cryptography (PKC2004), Singapore, LNCS, Vol.2947, pp.262-276, Springer-Verlag, March 2004.
  144. Joonsang Baek and Yuliang Zheng: Identity-Based Threshold Signature Scheme from the Bilinear Pairings, Proceedings of the 2004 International Conference on Information Technology (ITCC’04), Information Assurance and Security Track (IAS’04), pp.124-128, IEEE Computer Society, April 2004. (ISBN 0-7695-2108-8)
  145. Gautam Singaraju, Lawrence Teo and Yuliang Zheng: A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic, Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA04), pp.79-93, IEEE Press, April 2004. (ISBN 0-7695-2117-7)
  146. Yongge Wang, Xintao Wu and Yuliang Zheng: Privacy Preserving Data Generation for Database Application Performance Testing, Proceedings of the First International Conference on Trust and Privacy in Digital Business (TrustBus 2004), Eds. Sokratis Katsikas, Javier Lopez, Guenther Pernul, LNCS Vol. 3184, pp. 142–151. Springer-Verlag, 2004.
  147. Xintao Wu, Yongge Wang and Yuliang Zheng: Statistical Database Modeling for Privacy Preserving Database Generation, Proceedings of the 15th International Symposium on Methodologies for Intelligent Systems, Saratoga Spring, New York. May 25-28, 2005. LNCS Vol. 3488, pp. 382-390. Springer-Verlag.
  148. Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won and Yuliang Zheng: A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services, Proceedings of the 5th International Conference on Web Engineering (ICWE 2005), Sydney, Australia, July 27-29, 2005, LNCS Vol. 3579, pp. 91-196, Springer-Verlag. Editors: David Lowe, Martin Gaedke. ISBN: 3-540-27996-2.
  149. Yuliang Zheng and Yongge Wang: Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption, Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, Fairfax, VA, USA, November 11, 2005, pp.103-107, ACM Press, ISBN: ISBN:1-59593-233-X.
  150. Xintao Wu, Chintan Sanghvi, Yongge Wang and Yuliang Zheng: Privacy Aware Data Generation for Testing Database Applications, Proceedings of the 9th International Database Engineering and Application Symposium (IDEAS05), Montreal, Canada, July 25-27, 2005. pp. 317-326. (acceptance ratio: 30/144).
  151. Neil Kauer, Tony Suarez and Yuliang Zheng: Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms, The First NIST Cryptographic Hash Workshop, Gaithersburg, Maryland, 10/31-11/1/2005.
  152. Yuliang Zheng: Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks, Proceedings of Secure Mobile Ad-hoc Networks and Sensors: First International Workshop (MADNES 2005), Singapore, September 20-22, 2005. LNCS Vol. 4074, p. 117, Springer-Verlag.
  153. Mike Burmester, Virgil Gligor, Evangelos Kranakis, Doug Tygar and Yuliang Zheng: Panel: Authentication in Constrained Environments, Proceedings of Secure Mobile Ad-hoc Networks and Sensors: First International Workshop (MADNES 2005), Singapore, September 20-22, 2005. LNCS Vol. 4074, pp. 186-191, Springer-Verlag.
  154. Josef Pieprzyk, Xian-Mo Zhang and Yuliang Zheng: On Algebraic Immunity and Annihilators, Proceedings of the 2006 International Conference on Information Security and Cryptology (ICISC 2006), Busan, Korea, November 30-December 1, 2006. LNCS Vol. 4296, pp.65-80, Springer-Verlag. (ISSN 0302-9743)
  155. Yuliang Zheng and Xian-Mo Zhang: On Balanced Nonlinear Boolean Functions, Boolean Functions in Cryptology and Information Security, NATO Science for Peace and Security Series D: Information and Communication Security, Vol. 18, Edited by Bart Preneel and Oleg A. Logachev, pp. 243-280, IOS Press, 2008. (ISBN 978-1-58603-878-6) (invited talk)
  156. Yuliang Zheng: Coded Modulation and the Arrival of Signcryption, NATO Advanced Research Workshop on Enhancing Crypto-Primitives with Techniques from Coding Theory, October 6-9, 2008, Veliko Tarnovo, Bulgaria. (invited talk)
  157. Yuliang Zheng: Security in a Resource Constrained Environment, Indo-US Science and Technology Forum, invited keynote, Kochi, India, August 19-21, 2009.
  158. Puwen Wei, Xiaoyun Wang and Yuliang Zheng: Public Key Encryption without Random Oracle Made Truly Practical, Proceedings of the 11 th International Conference on Information and Communication Security (ICICS 2009), Beijing, China, December 15-17, 2009. LNCS Vol. 5927 pp.107-120, Springer-Verlag.
  159. Jia Fan, Xiaofu Tang and Yuliang Zheng: A Single Key Pair is Adequate for the Zheng Signcryption, Information Security and Privacy – ACISP2011, LNCS, Vol.6812, pp. 371-388, Springer-Verlag, 2011.
  160. Puwen Wei, Xiaoyun Wang and Yuliang Zheng: Public Key Encryption for the Forgetful, Cryptography and Security: From Theory to Applications, Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, David Naccache (Ed.), 2012, LNCS Vol.6805, pp.185-206, Springer-Verlag. (Invited)
  161. Puwen Wei and Yuliang Zheng: Efficient Public Key Encryption Admitting Decryption by Sender, Proceedings of the 9th European PKI Workshop: Research and Applications, Pisa, Italy, September 13-14, 2012. LNCS Vol. 7868, pp.37-52, Springer-Verlag, 2013.
  162. Puwen Wei, Yuliang Zheng and Wei Wang: Multi-Recipient Encryption in a Heterogeneous Setting, Information Security Practice and Experience (ISPEC 2014), LNCS Vol.8434, pp. 462-480, Springer-Verlag, May 2014.