1. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Residuosity Problem and Its Applications to Cryptography, Transactions of the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan, Vol. E71, No. 8, pp. 759-767, August 1988. (Conference version ), (Final version. )
  2. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Several Theorems on Probabilistic Cryptosystems, Transactions of the Institute of Electronics, Information and Communication Engineers of Japan, Vol. E72, No. 7, pp. 819-827, July 1989.
  3. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Connections among Several Versions of One-Way Hash Functions, Special Issue on Cryptography and Information Security, Transactions of the Institute of Electronics, Information and Communication Engineers of Japan, Vol. E73, No. 7, pp. 1092-1099, July 1990.
  4. Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Proving Identity in Three Moves, IEICE Transactions, pp.3602-3606, Vol. E 74, No. 11, November 1991.
  5. Yuliang Zheng and Jennifer Seberry: Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks, the Special Issue on Secure Communications, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, pp. 715-724, June 1993.
    See also Yuliang Zheng: Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks, Preprint No.94-1, Department of Computer Science, University of Wollongong , 24 January 1994.
  6. Yuliang Zheng, Thomas Hardjono and Josef Pieprzyk: The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E76-A, No. 1, pp. 4-13, January 1993.
    See also Yuliang Zheng, Thomas Hardjono and Jennifer Seberry: New Solutions to the Problem of Access Control in a Hierarchy, Preprint 93-02, Department of Computer Science, University of Wollongong, January 1993.
  7. Yuliang Zheng, Thomas Hardjono and Jennifer Seberry: Reusing Shares in Secret Sharing Schemes, The Computer Journal, Vol. 37, No. 3, pp. 199-205, 1994. (Scanned Journal version)
  8. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Nonlinearity and Propagation Characteristics of Balanced Boolean Functions, Information and Computation, Vol. 119, No. 1, pp. 1-13, 1995. (Scanned Journal version)
  9. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Improving the Strict Avalanche Characteristics of Cryptographic Functions, Information Processing Letters, Vol.50, pp.37-41, 1994.
  10. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: Cryptographic Boolean Functions via Group Hadamard Matrices, in the Special Issue: the Hadamard Centenary Conference, the Australasian Journal of Combinatorics, Vol.10, pp.131-145, 1994.
  11. Thomas Hardjono, Yuliang Zheng and Jennifer Seberry: Database Authentication Revisited, Computer & Security, Vol. 13, No. 7, pp. 573-580, 1994.
  12. Yuliang Zheng: On Key Agreement Protocols Based on Tamper-Proof Hardware, Information Processing Letters, Vol.53, pp.49-54, 1995. (Scanned Journal version)
  13. Xian-Mo Zhang and Yuliang Zheng: GAC — The Criterion for Global Avalanche Characteristics of Cryptographic Functions, Journal of Universal Computer Science, Vol. 1, No. 5, pp. 316-333, 1995.
  14. Jennifer Seberry, Xian-Mo Zhang and Yuliang Zheng: The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions, Journal of Universal Computer Science, Vol. 1, No. 2, pp. 136-150, 1995.
  15. Yi Mu, Jennifer Seberry and Yuliang Zheng: Shared Cryptographic Bits via Quantized Quadrature Phase Amplitudes of Light, Optics Communications, Vol. 123, pp. 344-352, 1996. (Scanned version)
  16. Xian-Mo Zhang and Yuliang Zheng: Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors, Design, Codes and Cryptography, Vol. 7, No. 1/2, pp. 111-134, 1996.
  17. Xian-Mo Zhang and Yuliang Zheng: On the Difficulty of Constructing Cryptographically Strong Substitution Boxes, Journal of Universal Computer Science, Vol. 2, No. 3, pp. 147-162, 1996.
  18. Kouichi Sakurai and Yuliang Zheng: On Non-Pseudorandomness from Block Ciphers with Provable Immunity against Linear Cryptanalysis, IEICE Transactions on Fundamentals, Vol. E80-A, No.1, pp.19-24, 1997.
  19. Xian-Mo Zhang and Yuliang Zheng: Cryptographically Resilient Functions, IEEE Transactions on Information Theory, Vol.43, No.5, pp.1740-1747, September 1997.
  20. Yuliang Zheng and Hideki Imai: How to Construct Efficient Signcryption Schemes on Elliptic Curves, Information Processing Letters, Vol.68, pp.227-233, 1998.
  21. Yuliang Zheng, Xian-Mo Zhang and Hideki Imai: Restriction, Terms and Nonlinearity of Boolean Functions, Theoretical Computer Science, Vol.226, No.1-2, pp.207-223, 1999. (An invited paper in the Special Issue on Cryptography, in honor of Professor Arto Salomaa on the occasion of his 65th birthday)
  22. Xian-Mo Zhang and Yuliang Zheng: Relating Differential Distribution Tables to Other Properties of Substitution Boxes, Design, Codes and Cryptography, Vol. 19, No. 1, pp. 45-63, 2000.
  23. Junji Shikata, Yuliang Zheng, Joe Suzuki and Hideki Imai: Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves, IEICE Transactions on Fundamentals, Vol. E83-A, No.4, pp.756-763, April 2000.
  24. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: An Optimization of Credit-Payment for Expressway Toll Collection Systems, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E83-A, No.8, pp.1681-1690, 2000.
  25. Yuliang Zheng and Xian-Mo Zhang: The kth-Order Nonhomomorphicity of S-Boxes, Journal of Universal Computer Science, Vol.6, No.8, pp.830-848, 2000.
  26. Tim Ebringer, Yuliang Zheng and Peter Thorne: Parasitic Authentication to Protect Your E-Wallet, IEEE Computer, Vol.33, No.10, pp.54-60, October 2000.
  27. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E84-A, No.1, pp.222-230, 2001.
  28. Xian-Mo Zhang and Yuliang Zheng: On Plateaued Functions, IEEE Transactions on Information Theory, Vol.47, No.3, pp.1215-1223, March 2001.
  29. Goichiro Hanaoka, Yuliang Zheng and Hideki Imai: Improving the Secure Electronic Transaction Protocol by Using Signcryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E84-A, No.8, pp.2042-2051, 2001.
  30. Yuliang Zheng and Xian-Mo Zhang: A New Property of Maiorana-McFarland Functions, Bulletin of the Institute of Combinatorics and its Applications, ISSN 1183-1278, Vol.33, pp. 13-22, September 2001.
  31. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng and Hideki Imai: A Traitor Traceable Conference System with Dynamic Sender, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E85-A, No.1, pp.167-174, 2002.
  32. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng and Hideki Imai: A Hierarchical Non-Interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks, The Computer Journal, Vol.45, No.3, pp.293-303, 2002.
  33. Yuliang Zheng and Xian-Mo Zhang: Connections among Nonlinearity Avalanche and Correlation Immunity, Theoretical Computer Science, No.292, pp.697-710, 2003.
  34. Joonsang Baek and Yuliang Zheng: Zheng and Seberry’s Public Key Encryption Scheme Revisited, International Journal of Information Security, Vol.2, No.1, pp.34-44, November 2003. (DOI: 10.1007/s10207-003-0023-7)
  35. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng and Hideki Imai: Efficient Unconditionally Secure Digital Signatures, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E87-A, No.1, pp.120-130, 2004.
  36. Laurence Bull, David Squire and Yuliang Zheng: A Hierarchical Extraction Policy for Content Extraction Signatures, International Journal on Digital Libraries, Special issue on Security, 2004, Springer-Verlag. ISSN: 0938-1279 (Paper) 1432-0622 (Online)
  37. Ron Steinfeld and Yuliang Zheng: On the Security of RSA with Primes Sharing Least-Significant Bits, AAECC–Applied Algebra in Engineering, Communication and Computing, Vol.15, Nos. 3-4, pp.179-200, 2004, Springer-Verlag. ISSN: 1432-5012 (Paper) 1432-1300 (Online)
  38. Yuliang Zheng and Xian-Mo Zhang: The Generalized XOR Lemma, Theoretical Computer Science, Vol.329/1-3, pp.331-337, 2004.
  39. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Tsutomu Matsumoto and Hideki Imai: Unconditionally Secure Authenticated Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol.E87-A, No.5, pp.1119-1131, 2004.
  40. Xintao Wu, Yongge Wang, Songtao Guo and Yuliang Zheng: Privacy Preserving Database Generation for Database Application Testing, Fundamenta Informaticae, Vol.78, No.4, pp. 595-612, 2007.
  41. Joonsang Baek, Ron Steinfeld and Yuliang Zheng: Formal Proofs for the Security of Signcryption, Journal of Cryptology, Vol. 20, Issue 2, pp.203-235, April 2007.
  42. Hideki Imai, Goichiro Hanaoka, Ueli Maurer and Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security, IEEE Transactions on Information Theory, pp.2405 – 2407, Volume 54, Issue 6, June 2008.
  43. Jia Fan, Yuliang Zheng and Xiaofu Tang: Signcryption with Non-interactive Non-repudiation without Random Oracles, Transactions on Computational Sciences, Special Issue on Security in Computing, Lecture Notes in Computer Science, Vol. 6340, pp. 202-230, Springer Verlag, December 2010, ISBN 978-3-642-17498-8.
  44. Puwen Wei, Xiaoyun Wang and Yuliang Zheng: Public Key Encryption without Random Oracle Made Truly Practical (full version), Computers and Electrical Engineering, Vol. 38, Issue 4, pp. 975-985, Elsevier, 2012.
  45. Jia Fan, Yuliang Zheng and Xiaofu Tang: Key-Insulated Signcryption, Journal of Universal Computer Science, Vol. 19, No. 10, pp. 1351-1374, 2013.
  46. Jia Fan, Yuliang Zheng and Xiaofu Tang: A New Construction of Identity-based Signcryption Without Random Oracles, International Journal of Foundations of Computer Science, Vol. 25, No. 01, pp.1-23, 2014.
  47. Puwen Wei and Yuliang Zheng: On the Construction of Public Key Encryption with Sender Recovery, International Journal of Foundations of Computer Science, 2014.
  48. Graham Enos and Yuliang Zheng: An ID-based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption, Information Processing Letters, 2015. (to appear)