According to our database1, Jiageng Chen authored at least 34 papers between 2010 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Security analysis and new models on the intelligent symmetric key encryption.
Computers & Security, 2019
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Special Issue on Advanced Persistent Threat.
Future Generation Comp. Syst., 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
Special issue on Secure Computation on Encrypted Data.
J. Inf. Sec. Appl., 2017
Variable message encryption through blockcipher compression function.
Concurrency and Computation: Practice and Experience, 2017
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Transactions, 2016
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
An efficient batch verification system and its effect in a real time VANET environment.
Security and Communication Networks, 2015
SKENO: Secret key encryption with non-interactive opening.
J. Mathematical Cryptology, 2015
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015
Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
A Single Key Scheduling Based Compression Function.
Proceedings of the Risks and Security of Internet and Systems, 2015
Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptology ePrint Archive, 2014
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Proceedings of the Provable Security - 8th International Conference, 2014
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Proceedings of the Information Security Practice and Experience, 2014
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Novel strategies for searching RC4 key collisions.
Computers & Mathematics with Applications, 2013
Related-Key Boomerang Attacks on KATAN32/48/64.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.
IEICE Transactions, 2012
Generalized Analysis on Key Collisions of Stream Cipher RC4.
IEICE Transactions, 2011
How to Find Short RC4 Colliding Key Pairs.
Proceedings of the Information Security, 14th International Conference, 2011
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Generalized RC4 Key Collisions and Hash Collisions.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.
Proceedings of the Information Security, 2010
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010