Mengce Zheng

Orcid: 0000-0003-0777-4175

According to our database1, Mengce Zheng authored at least 31 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Partial Key Exposure Attack on Common Prime RSA.
IACR Cryptol. ePrint Arch., 2024

Revisiting Small Private Key Attacks on Common Prime RSA.
IEEE Access, 2024

2023
Generalized implicit-key attacks on RSA.
J. Inf. Secur. Appl., September, 2023

Notes on Small Private Key Attacks on Common Prime RSA.
IACR Cryptol. ePrint Arch., 2023

Solving Generalized Bivariate Integer Equations and Its Application to Factoring With Known Bits.
IEEE Access, 2023

2021
Cryptanalysis of the RSA variant based on cubic Pell equation.
Theor. Comput. Sci., 2021

A practical quantum designated verifier signature scheme for E-voting applications.
Quantum Inf. Process., 2021

An improved QKD protocol without public announcement basis using periodically derived basis.
Quantum Inf. Process., 2021

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
IACR Cryptol. ePrint Arch., 2021

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Strengthening Profiled Side Channel Attacks on AES via Multi-view Information Aggregation.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Lattice-Based Cryptanalysis of RSA with Implicitly Related Keys.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020

Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks.
CoRR, 2020

An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020

Research on Online Leakage Assessment.
Proceedings of the Data Science, 2020

Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
Implicit-Key Attack on the RSA Cryptosystem.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Post-Quantum Pseudorandom Functions from Mersenne Primes.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Implicit Related-Key Factorization Problem on the RSA Cryptosystem.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Improved Results on Factoring General RSA Moduli with Known Bits.
IACR Cryptol. ePrint Arch., 2018

Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh Spectrum.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Cryptanalysis of RSA Variants with Modified Euler Quotient.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Generalized cryptanalysis of RSA with small public exponent.
Sci. China Inf. Sci., 2016

2015
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Prime Power RSA with two private exponents.
Sci. China Inf. Sci., 2015


  Loading...