Jincheng Zhuang

Orcid: 0000-0003-1159-7597

According to our database1, Jincheng Zhuang authored at least 20 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing.
J. Supercomput., January, 2024

Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoT.
IEEE Internet Things J., January, 2024

2022
DLP in semigroups: Algorithms and lower bounds.
J. Math. Cryptol., 2022

Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms.
Inf. Process. Lett., 2022

Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing.
IACR Cryptol. ePrint Arch., 2022

Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms.
Des. Codes Cryptogr., 2022

LWE from non-commutative group rings.
Des. Codes Cryptogr., 2022

Syndrome decoding meets multiple instances.
CoRR, 2022

2020
Refined analysis to the extended tower number field sieve.
Theor. Comput. Sci., 2020

2019
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity.
Des. Codes Cryptogr., 2019

Geometry-Based Statistical Channel Models of Reflected-Path Self-Interference in Full-Duplex Wireless.
IEEE Access, 2019

2018
Factor base discrete logarithms in Kummer extensions.
Finite Fields Their Appl., 2018

2016
On Determining Deep Holes of Generalized Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2016

Improvements on the Individual Logarithm Step in exTNFS.
IACR Cryptol. ePrint Arch., 2016

LWE from Non-commutative Group Rings.
IACR Cryptol. ePrint Arch., 2016

Classifying and generating exact coset representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q<sup>2</sup></sub>).
Finite Fields Their Appl., 2016

2015
On Generating Coset Representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q<sup>2</sup></sub>).
IACR Cryptol. ePrint Arch., 2015

On Generating Coset Representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q</sub><sup>2</sup>).
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Traps to the BGJT-algorithm for discrete logarithms.
LMS J. Comput. Math., 2014

2013
On certain computations of Pisot numbers.
Inf. Process. Lett., 2013


  Loading...