-
[61] 曹天杰.Cryptanalysis of The LCSS RFID Authentication Protocol,2008
-
[62] 曹天杰.Cryptanalysis of Two ECDLP-Based Proxy Signature Schemes,2008
-
[63] 曹天杰.Smart-phone Based Server-Aided Computation,2008
-
[64] 曹天杰.Cryptanalysis of two password-authenticated key exchange protocols between clients with different passwords,2007
-
[65] 曹天杰.Security Analysis of Some Batch Verifying Signatures from Pairings,2007
-
[66] 曹天杰.Original Signers Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes,2007
-
[67] 曹天杰.Controlled Secret Leakage,2007
-
[68] 曹天杰.Collusion Attack on a Server-Aided Unbalanced RSA Key Generation Protocol,2006
-
[69] 曹天杰.ID-based designated-verifier proxy signatures,2006
-
[70] 曹天杰.Security Analysis of a Server-Aided RSA Key Generation Protocol,2006
-
[71] 曹天杰.一个具有消息恢复的签名方案的安全性分析,2006
-
[72] 曹天杰.基于椭圆曲线的代理多签名方案的安全性分析,2006