Hong-Sheng Zhou
Orcid: 0000-0003-3534-6629
According to our database1,
Hong-Sheng Zhou
authored at least 78 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 39th International Symposium on Distributed Computing, 2025
Single-Input Functionality Against a Dishonest Majority: Practical and Round-Optimal.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the 45th IEEE International Conference on Distributed Computing Systems, 2025
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
2024
Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Two Halves Make a Whole: How to Reconcile Soundness and Robustness in Watermarking for Large Language Models.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 38th International Symposium on Distributed Computing, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
J. Comput. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Proceedings of the 15th Conference on the Theory of Quantum Computation, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019
2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake).
IACR Cryptol. ePrint Arch., 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006