Kang Yang
Orcid: 0000-0002-7453-4043Affiliations:
- State Key Laboratory of Cryptology, Beijing, China
- Institute of Software, Chinese Academy of Sciences, Beijing, China (Ph.D)
According to our database1,
Kang Yang
authored at least 56 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols.
IACR Cryptol. ePrint Arch., 2025
Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Secur. Saf., 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2020
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013