Liqiang Peng

According to our database1, Liqiang Peng authored at least 27 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Context-aware and ethics-first crowd mobility portraits over massive smart card data.
Multim. Syst., April, 2023

Encode and Permute that Database! Single-Server Private Information Retrieval with Constant Online Time, Communication, and Client-Side Storage.
IACR Cryptol. ePrint Arch., 2023

Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval.
IACR Cryptol. ePrint Arch., 2023

2019
Generalized cryptanalysis of small CRT-exponent RSA.
Theor. Comput. Sci., 2019

Small CRT-Exponent RSA Revisited.
J. Cryptol., 2019

2018
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

Certifying Variant of RSA with Generalized Moduli.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Deterministic Algorithm for Computing Divisors in an Interval.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Cryptanalysis of an RSA variant with moduli N=prql.
J. Math. Cryptol., 2017

Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

Recent Progress on Coppersmith's Lattice-Based Method: A Survey.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Results on Cryptanalysis of Prime Power RSA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

An Improved Analysis on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Solving Linear Equations Modulo Unknown Divisors: Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Analysis of two knapsack public key cryptosystems.
IET Commun., 2013


  Loading...