Jiageng Chen

Orcid: 0000-0001-9033-2575

According to our database1, Jiageng Chen authored at least 79 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
High-speed implementation of rainbow table method on heterogeneous multi-device architecture.
Future Gener. Comput. Syst., June, 2023

Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain.
Comput. J., April, 2023

Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard.
Int. J. Netw. Manag., 2023

Editorial for special issue on security and trust on networked systems.
Int. J. Netw. Manag., 2023

MLCT: A multi-level contact tracing scheme with strong privacy.
Concurr. Comput. Pract. Exp., 2023

Constant-Size Group Signatures with Message-Dependent Opening from Lattices.
Proceedings of the Provable and Practical Security, 2023

CFChain: A Crowdfunding Platform that Supports Identity Authentication, Privacy Protection, and Efficient Audit.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Weight Matters: An Empirical Investigation of Distance Oracles on Knowledge Graphs.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework.
J. Inf. Secur. Appl., 2022

ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain.
IEICE Trans. Inf. Syst., 2022

A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain.
Connect. Sci., 2022

Threshold identity authentication signature: Impersonation prevention in social network services.
Concurr. Comput. Pract. Exp., 2022

A Solution for the Offline Double-Spending Issue of Digital Currencies.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Parallel Validity Analysis of the Boomerang Attack Model.
Proceedings of the Emerging Information Security and Applications, 2022

A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers.
J. Supercomput., 2021

Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging.
Sensors, 2021

ElearnChain: A privacy-preserving consortium blockchain system for e-learning educational records.
J. Inf. Secur. Appl., 2021

Network traffic identification of several open source secure proxy protocols.
Int. J. Netw. Manag., 2021

User location privacy protection mechanism for location-based services.
Digit. Commun. Networks, 2021

Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes.
IEEE Access, 2021

Efficient Attribute-Based Signature for Monotone Predicates.
Proceedings of the Provable and Practical Security, 2021

Practical and Provable Secure Vehicular Component Protection Scheme.
Proceedings of the Emerging Information Security and Applications, 2021

AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger.
Proceedings of the Emerging Information Security and Applications, 2021

2020
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
J. Inf. Secur. Appl., 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

Optimized GPU Framework for Block Cipher Differential Search.
IACR Cryptol. ePrint Arch., 2020

Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models.
IACR Cryptol. ePrint Arch., 2020

A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.
Frontiers Comput. Sci., 2020

Secure and Traceable Attribute-Based Sequential Aggregate Signature.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Security, Privacy, and Trust on Internet of Things.
Wirel. Commun. Mob. Comput., 2019

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019

AI-Driven Cyber Security Analytics and Privacy Protection.
Secur. Commun. Networks, 2019

Efficient implementation of lightweight block ciphers on volta and pascal architecture.
J. Inf. Secur. Appl., 2019

GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers.
IACR Cryptol. ePrint Arch., 2019

An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019

Security analysis and new models on the intelligent symmetric key encryption.
Comput. Secur., 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Cryptanalysis of Raindrop and FBC.
Proceedings of the Network and System Security - 13th International Conference, 2019

The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018

Special Issue on Advanced Persistent Threat.
Future Gener. Comput. Syst., 2018

Chatting Application Monitoring on Android System and its Detection based on the Correlation Test.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Secur. Appl., 2017

Variable message encryption through blockcipher compression function.
Concurr. Comput. Pract. Exp., 2017

Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An efficient batch verification system and its effect in a real time VANET environment.
Secur. Commun. Networks, 2015

SKENO: Secret key encryption with non-interactive opening.
J. Math. Cryptol., 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A New Statistical Approach for Integral Attack.
Proceedings of the Network and System Security - 9th International Conference, 2015

Improved Differential Characteristic Searching Methods.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Single Key Scheduling Based Compression Function.
Proceedings of the Risks and Security of Internet and Systems, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptol. ePrint Arch., 2014

A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Proceedings of the Provable Security - 8th International Conference, 2014

Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014

Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.
Proceedings of the Information Security Practice and Experience, 2014

A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Novel strategies for searching RC4 key collisions.
Comput. Math. Appl., 2013

Related-Key Boomerang Attacks on KATAN32/48/64.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Generalized Analysis on Key Collisions of Stream Cipher RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

How to Find Short RC4 Colliding Key Pairs.
Proceedings of the Information Security, 14th International Conference, 2011

Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Generalized RC4 Key Collisions and Hash Collisions.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.
Proceedings of the Information Security, 2010

A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...