Ren Zhang

Orcid: 0000-0003-2063-1769

Affiliations:
  • Cryptape Co. Ltd., Nervos, Hangzhou, China
  • Katholieke Universiteit Leuven, imec-COSIC, Belgium (former)
  • Peking University, Beijing Key Laboratory of Internet Security Technology, Beijing, China (until 2012)


According to our database1, Ren Zhang authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Time-Averaged Analysis of Selfish Mining in Bitcoin.
IACR Cryptol. ePrint Arch., 2024

2023
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate.
IEEE Trans. Dependable Secur. Comput., 2023

Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines.
IACR Cryptol. ePrint Arch., 2023

2022
NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

VOProof: Efficient zkSNARKs from Vector Oracle Compilers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles.
IACR Cryptol. ePrint Arch., 2021

Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
NC-Max: Breaking the Throughput Limit of Nakamoto Consensus.
IACR Cryptol. ePrint Arch., 2020

Analysing and Improving Shard Allocation Protocols for Sharded Blockchains.
IACR Cryptol. ePrint Arch., 2020

Authenticated and auditable data sharing via smart contract.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SC2Share: Smart Contract for Secure Car Sharing.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2017
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol.
IACR Cryptol. ePrint Arch., 2017

A Voucher-Based Security Middleware for Secure Business Process Outsourcing.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2015
Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin.
IACR Cryptol. ePrint Arch., 2015

2014
Censorship-resistant and privacy-preserving distributed web search.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

2011
Making eclipse attacks computationally infeasible in large-scale DHTs.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011


  Loading...