Guoyan Zhang

Orcid: 0000-0001-7059-5976

According to our database1, Guoyan Zhang authored at least 41 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs.
IEEE Trans. Mob. Comput., April, 2024

Optimal Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Improved attacks against reduced-round Whirlwind.
Des. Codes Cryptogr., November, 2023

Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher.
Symmetry, 2023

A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain.
IEEE Internet Things J., 2023

Automated Meet-in-the-Middle Attack Goes to Feistel.
IACR Cryptol. ePrint Arch., 2023

Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory.
IACR Cryptol. ePrint Arch., 2023

Automated Meet-in-the-Middle Attack Goes to Feistel.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Differential Cryptanalysis of Round-Reduced SPEEDY Family.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Beyond-birthday security for permutation-based Feistel networks.
Des. Codes Cryptogr., 2021

2019
Universal Forgery Attack against GCM-RUP.
IACR Cryptol. ePrint Arch., 2019

MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS.
Comput. J., 2019

2017
A distinguisher on PRESENT-like permutations with application to SPONGENT.
Sci. China Inf. Sci., 2017

Cryptanalysis of round-reduced ASCON.
Sci. China Inf. Sci., 2017

2016
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
IACR Cryptol. ePrint Arch., 2016

2015
Multi-Authority Attribute-Based Encryption Scheme from Lattices.
J. Univers. Comput. Sci., 2015

Lattice-based threshold cryptography and its applications in distributed cloud computing.
Int. J. High Perform. Comput. Netw., 2015

2014
Characteristics of the Sum of Cross-Components of Triaxial Induction Logging Tool in Layered Anisotropic Formation.
IEEE Trans. Geosci. Remote. Sens., 2014

Improvement on a Fuzzy Identity-based Encryption Scheme.
J. Comput., 2014

Attribute-Based Certificateless Cryptographic System.
J. Comput., 2014

Cryptanalysis of JAMBU.
IACR Cryptol. ePrint Arch., 2014

2013
Optimal energy consumption for dynamic network coding in cooperative multicast system.
Proceedings of the 20st International Conference on Telecommunications, 2013

Cooperative multicast transmission strategy for energy-efficient dynamic network coding.
Proceedings of the IEEE International Conference on Communications, 2013

A Secure Threshold Signature Scheme from Lattices.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptol. ePrint Arch., 2012

An Attribute-Based Encryption Scheme Secure against Malicious KGC.
Proceedings of the 11th IEEE International Conference on Trust, 2012

On the capacity outage probability for cooperative networking coding system with mulitple relays.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

A General Construction for Multi-authority Attribute-Based Encryption.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Secret Key Awareness Security Public Key Encryption Scheme.
Proceedings of the Information Security and Assurance - International Conference, 2011

A Generic Construction for Proxy Cryptography.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

A Generic Construction for Proxy Signature Scheme.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
Practical Threshold One-Time Proxy Signature Scheme.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives.
Proc. IEEE, 2009

Nominative Proxy Ring Signature.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

2008
Aggregate and Separate of Signatures in Wireless Network.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Certificateless Signature and Group Signature Schemes against Malicious PKG.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Direct and indirect classification of high-frequency LNA performance using machine learning techniques.
Proceedings of the Artificial Neural Networks and Intelligent Information Processing, 2007

2006
An Embedded Rectifier-Based Built-In-Test Circuit for CMOS RF Circuits.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits.
Proceedings of the 9th IEEE Workshop on Design & Diagnostics of Electronic Circuits & Systems (DDECS 2006), 2006

2005
The Second-Preimage Attack on MD4.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005


  Loading...