Yonghui Zheng

Orcid: 0000-0002-0826-0320

According to our database1, Yonghui Zheng authored at least 17 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Application of Discrete Pruned Enumeration in Solving BDD.
Symmetry, February, 2023

2022
Lattice Enumeration with Discrete Pruning: Improvement, Cost Estimation and Optimal Parameters.
IACR Cryptol. ePrint Arch., 2022

Atomic visualization of the emergence of orthorhombic phase in Hf0.5Zr0.5O2 ferroelectric film with in-situ rapid thermal annealing.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits 2022), 2022

2021
Using SubSieve Technique to Accelerate TupleSieve Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

2020
A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem.
IEEE Access, 2020

An Efficient Sieve Algorithm with Evolutionary Technique.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve Algorithms.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Genetic Algorithm with Restart Strategy for Solving Approximate Shortest Vector Problem.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

An Improved BKW Algorithm For LWE With Binary Uniform Errors.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2019
An Enumeration-Like Vector Sampling Method for Solving Approximate SVP.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2015
Construction of perfect diffusion layers from linear feedback shift registers.
IET Inf. Secur., 2015

Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters.
IACR Cryptol. ePrint Arch., 2015

Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model.
Proceedings of the Cloud Computing and Big Data, 2015

2013
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data.
J. Networks, 2013

2012
ID-Based Signatures from Lattices in the Random Oracle Model.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2009
Autocorrelations of <i>l</i>-sequences with prime connection integer.
Cryptogr. Commun., 2009

2007
Certified E-Mail Protocol in the ID-Based Setting.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007


  Loading...