Kelong Cong

Orcid: 0000-0002-2636-4406

According to our database1, Kelong Cong authored at least 22 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Threshold (Fully) Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

Row Reduction Techniques for n-Party Garbling.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Efficient Fuzzy Labeled PSI from Vector Ring-OLE.
Proceedings of the Cryptology and Network Security - 24th International Conference, 2025

Faster VOLEitH Signatures from All-But-One Vector Commitment and Half-Tree.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2024

Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

Panacea: Non-Interactive and Stateless Oblivious RAM.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

The Key Lattice Framework for Concurrent Group Messaging.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Efficient and Secure k-NN Classification from Improved Data-Oblivious Programs and Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Poster: Panacea - Stateless and Non-Interactive Oblivious RAM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Efficient Isogeny Proofs Using Generic Techniques.
Proceedings of the Applied Cryptography and Network Security, 2023

Reusable, Instant and Private Payment Guarantees for Cryptocurrencies.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Optimizing Registration Based Encryption.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2018
A Blockchain Consensus Protocol with Horizontal Scalability.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

2017
Implicit Consensus: Blockchain with Unbounded Throughput.
CoRR, 2017

2015
Localization accuracy of classification techniques for Wi-Fi environments.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015


  Loading...