Kunpeng Wang

According to our database1, Kunpeng Wang authored at least 63 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
3-D Particle Surface Reconstruction From Multiview 2-D Images With Structure From Motion and Shape From Shading (January 2020).
IEEE Trans. Ind. Electron., 2021

Study on the hydrodynamic behaviour of journal bearing with herringbone grooved sleeve considering cavitation.
Int. J. Comput. Sci. Math., 2021

Hybrid Dual Attack on LWE with Arbitrary Secrets.
IACR Cryptol. ePrint Arch., 2021

2020
Multi-Modality Medical Image Fusion Using Convolutional Neural Network and Contrast Pyramid.
Sensors, 2020

SecureBP from Homomorphic Encryption.
Secur. Commun. Networks, 2020

Ferrograph Analysis With Improved Particle Segmentation and Classification Methods.
J. Comput. Inf. Sci. Eng., 2020

Real-time Arm Gesture Recognition in Smart Home Scenarios via Millimeter Wave Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

2019
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme.
Inf. Sci., 2019

Fully homomorphic encryption based on the ring learning with rounding problem.
IET Inf. Secur., 2019

PCA-based GRS analysis enhances the effectiveness for genetic correlation detection.
Briefings Bioinform., 2019

The Effects of Walking Speed and Hardness of Terrain on the Foot-Terrain Interaction and Driving Torque for Planar Human Walking.
IEEE Access, 2019

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes.
IEEE Access, 2019

GPU-based 3D cryo-EM reconstruction with key-value streams: poster.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.
Proceedings of the Information Security Practice and Experience, 2019

Parallelizing cryo-EM 3D reconstruction on GPU cluster with a partitioned and streamed model.
Proceedings of the ACM International Conference on Supercomputing, 2019

Analysis of Joint Torque under Single Movement Cycle of Underwater Legged Robot.
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019

Design, Development and Testing of a Wearable sEMG Acquisition System.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Large-scale Parallel Design for Cryo-EM Structure Determination on Heterogeneous Many-core Architectures.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
LWR-Based Fully Homomorphic Encryption, Revisited.
Secur. Commun. Networks, 2018

Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE.
IACR Cryptol. ePrint Arch., 2018

Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
IACR Cryptol. ePrint Arch., 2018

Cover attacks for elliptic curves with cofactor two.
Des. Codes Cryptogr., 2018

Verifiable Decryption for Fully Homomorphic Encryption.
Proceedings of the Information Security - 21st International Conference, 2018

Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Proceedings of the Information Security Practice and Experience, 2018

Probability Preservation Property with Relative Error and Its Applications.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A Novel Geometric Dictionary Construction Approach for Sparse Representation Based Image Fusion.
Entropy, 2017

Compact (Targeted Homomorphic) Inner Product Encryption from LWE.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Hashing into Twisted Jacobi Intersection Curves.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Management of Machine Room in Power System Based on Intelligent Monitoring.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Constructing Isogenies on Extended Jacobi Quartic Curves.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Deterministic Encoding into Twisted Edwards Curves.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Efficient Leveled Identity-Based FHE.
Proceedings of the Network and System Security - 9th International Conference, 2015

LWE-Based FHE with Better Parameters.
Proceedings of the Advances in Information and Computer Security, 2015

Hashing into Jacobi Quartic Curves.
Proceedings of the Information Security - 18th International Conference, 2015

Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Models of Curves from GHS Attack in Odd Characteristic.
Proceedings of the Information Security Practice and Experience, 2015

Analysis of Fractional ωmbNAF for Scalar Multiplication.
Proceedings of the Information Security Practice and Experience, 2015

Improved Tripling on Elliptic Curves.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Hashing into Generalized Huff Curves.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Fully Homomorphic Encryption with Auxiliary Inputs.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

A Note on Diem's Proof.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Fast Symmetric Pairing Revisited.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Joint Triple-Base Number System for Multi-Scalar Multiplication.
Proceedings of the Information Security Practice and Experience, 2013

About Hash into Montgomery Form Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2013

Demonstration of a 200 kW/200 kWh energy storage system on an 11kV UK distribution feeder.
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Omega Pairing on Hyperelliptic Curves.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Triple-Base Number System for Scalar Multiplication.
Proceedings of the Progress in Cryptology, 2013

On the Expansion Length Of Triple-Base Number Systems.
Proceedings of the Progress in Cryptology, 2013

2012
On Efficient Pairings on Elliptic Curves over Extension Fields.
IACR Cryptol. ePrint Arch., 2012

An Improved Twisted Ate Pairing over KSS Curves with k = 18.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Another Elliptic Curve Model for Faster Pairing Computation.
Proceedings of the Information Security Practice and Experience, 2011

2010
Pairing Computation on Elliptic Curves of Jacobi Quartic Form.
IACR Cryptol. ePrint Arch., 2010

Cubic surface fitting to image by combination.
Sci. China Inf. Sci., 2010

A Deniable Group Key Establishment Protocol in the Standard Model.
Proceedings of the Information Security, 2010

2009
New Greedy Algorithm for Computing Double-Base Chains.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
On optimal simultaneous rational approximation to (omega, omega<sup>2</sup>)<sup>tau</sup> with omega being some kind of cubic algebraic function.
J. Approx. Theory, 2007

2006
Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.
Proceedings of the Sequences and Their Applications, 2006

A Workflow Management System for Dynamic Alliance.
Proceedings of the Knowledge Enterprise: Intelligent Strategies in Product Design, 2006

2005
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7.
IACR Cryptol. ePrint Arch., 2005


  Loading...