Guoyan Zhang

According to our database1, Guoyan Zhang authored at least 29 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A distinguisher on PRESENT-like permutations with application to SPONGENT.
SCIENCE CHINA Information Sciences, 2017

Cryptanalysis of round-reduced ASCON.
SCIENCE CHINA Information Sciences, 2017

2016
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT.
IACR Cryptology ePrint Archive, 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multi-Authority Attribute-Based Encryption Scheme from Lattices.
J. UCS, 2015

Lattice-based threshold cryptography and its applications in distributed cloud computing.
IJHPCN, 2015

Cryptanalysis of JAMBU.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Characteristics of the Sum of Cross-Components of Triaxial Induction Logging Tool in Layered Anisotropic Formation.
IEEE Trans. Geoscience and Remote Sensing, 2014

Improvement on a Fuzzy Identity-based Encryption Scheme.
JCP, 2014

Attribute-Based Certificateless Cryptographic System.
JCP, 2014

2013
Optimal energy consumption for dynamic network coding in cooperative multicast system.
Proceedings of the 20st International Conference on Telecommunications, 2013

Cooperative multicast transmission strategy for energy-efficient dynamic network coding.
Proceedings of the IEEE International Conference on Communications, 2013

A Secure Threshold Signature Scheme from Lattices.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptology ePrint Archive, 2012

An Attribute-Based Encryption Scheme Secure against Malicious KGC.
Proceedings of the 11th IEEE International Conference on Trust, 2012

On the capacity outage probability for cooperative networking coding system with mulitple relays.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

A General Construction for Multi-authority Attribute-Based Encryption.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Secret Key Awareness Security Public Key Encryption Scheme.
Proceedings of the Information Security and Assurance - International Conference, 2011

A Generic Construction for Proxy Cryptography.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

A Generic Construction for Proxy Signature Scheme.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
Practical Threshold One-Time Proxy Signature Scheme.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives.
Proceedings of the IEEE, 2009

Nominative Proxy Ring Signature.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

2008
Aggregate and Separate of Signatures in Wireless Network.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Certificateless Signature and Group Signature Schemes against Malicious PKG.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Direct and indirect classification of high-frequency LNA performance using machine learning techniques.
Proceedings of the Artificial Neural Networks and Intelligent Information Processing, 2007

2006
An Embedded Rectifier-Based Built-In-Test Circuit for CMOS RF Circuits.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits.
Proceedings of the 9th IEEE Workshop on Design & Diagnostics of Electronic Circuits & Systems (DDECS 2006), 2006

2005
The Second-Preimage Attack on MD4.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...