Yanzhao Shen

Orcid: 0000-0003-2657-3723

According to our database1, Yanzhao Shen authored at least 20 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PVO-Based Reversible Data Hiding Using Two-Stage Embedding and FPM Mode Selection.
IEEE Trans. Circuits Syst. Video Technol., April, 2025

High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection.
IEEE Trans. Dependable Secur. Comput., 2025

Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.
IACR Cryptol. ePrint Arch., 2025

2024
High-capacity reversible data hiding in encrypted images based on adaptive block coding selection.
J. Vis. Commun. Image Represent., 2024

2023
Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol.
Symmetry, August, 2023

Practical and Efficient Secure Aggregation for Privacy-Preserving Machine Learning.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

2022
Correction to: A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2022

NSSIA: A New Self-Sovereign Identity Scheme with Accountability.
CoRR, 2022

Improved Collision Detection Of MD5 Using Sufficient Condition Combination.
Comput. J., 2022

2021
A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2021

2020
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020

Improved Single-Key Attacks on 2-GOST.
Secur. Commun. Networks, 2020

2018
Improved Preimage Attacks on RIPEMD-160 and HAS-160.
KSII Trans. Internet Inf. Syst., 2018

Improved cryptanalysis of step-reduced SM3.
Sci. China Inf. Sci., 2018

2017
Cryptanalysis of 48-step RIPEMD-160.
IACR Trans. Symmetric Cryptol., 2017

2016
Cryptanalysis of Reduced-Round Midori64 Block Cipher.
IACR Cryptol. ePrint Arch., 2016

2014
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Preimage and pseudo-collision attacks on step-reduced SM3 hash function.
Inf. Process. Lett., 2013

2012
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

2010
A 13-bit, low-power, compact ADC suitable for sensor applications.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010


  Loading...