Jiageng Chen

According to our database1, Jiageng Chen authored at least 32 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Special Issue on Advanced Persistent Threat.
Future Generation Comp. Syst., 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Sec. Appl., 2017

Variable message encryption through blockcipher compression function.
Concurrency and Computation: Practice and Experience, 2017

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Transactions, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An efficient batch verification system and its effect in a real time VANET environment.
Security and Communication Networks, 2015

SKENO: Secret key encryption with non-interactive opening.
J. Mathematical Cryptology, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015

Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Single Key Scheduling Based Compression Function.
Proceedings of the Risks and Security of Internet and Systems, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptology ePrint Archive, 2014

A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Proceedings of the Provable Security - 8th International Conference, 2014

Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014

Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Proceedings of the Information Security Practice and Experience, 2014

A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Novel strategies for searching RC4 key collisions.
Computers & Mathematics with Applications, 2013

Related-Key Boomerang Attacks on KATAN32/48/64.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.
IEICE Transactions, 2012

2011
Generalized Analysis on Key Collisions of Stream Cipher RC4.
IEICE Transactions, 2011

How to Find Short RC4 Colliding Key Pairs.
Proceedings of the Information Security, 14th International Conference, 2011

Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Generalized RC4 Key Collisions and Hash Collisions.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.
Proceedings of the Information Security, 2010

A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...