Zhenfei Zhang

Orcid: 0000-0001-5131-5377

According to our database1, Zhenfei Zhang authored at least 62 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Parallel Zero-knowledge Virtual Machine.
IACR Cryptol. ePrint Arch., 2024

A New Benchmark and Model for Challenging Image Manipulation Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Origami: Fold a Plonk for Ethereum's VDF.
IACR Cryptol. ePrint Arch., 2023

Chipmunk: Better Synchronized Multi-Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2023

VeriZexe: Decentralized Private Computation with Universal Setup.
Proceedings of the 32nd USENIX Security Symposium, 2023

Two-Stage Dual Augmentation with CLIP for Improved Text-to-Sketch Synthesis.
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023

Tomato leaf diseases classification with convolutional neural network.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

2022
An SVP attack on Vortex.
IACR Cryptol. ePrint Arch., 2022

VERI-ZEXE: Decentralized Private Computation with Universal Setup.
IACR Cryptol. ePrint Arch., 2022

Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2022

HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates.
IACR Cryptol. ePrint Arch., 2022

TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022

Improving Class Activation Map for Weakly Supervised Object Localization.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field.
IACR Cryptol. ePrint Arch., 2021

TensorCrypto.
IACR Cryptol. ePrint Arch., 2021

ZEN: Efficient Zero-Knowledge Proofs for Neural Networks.
IACR Cryptol. ePrint Arch., 2021

Manta: a Plug and Play Private DeFi Stack.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021

Hybrid Dual Attack on LWE with Arbitrary Secrets.
IACR Cryptol. ePrint Arch., 2021

2020
Pointproofs: Aggregating Proofs for Multiple Vector Commitments.
IACR Cryptol. ePrint Arch., 2020

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.
IACR Cryptol. ePrint Arch., 2020

Manta: Privacy Preserving Decentralized Exchange.
IACR Cryptol. ePrint Arch., 2020

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
IACR Cryptol. ePrint Arch., 2020

Modular lattice signatures, revisited.
Des. Codes Cryptogr., 2020

Improving Text to Image Generation using Mode-seeking Function.
CoRR, 2020

Attention-based Selection Strategy for Weakly Supervised Object Localization.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

(Linkable) Ring Signature from Hash-Then-One-Way Signature.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.
IACR Cryptol. ePrint Arch., 2019

Middle-Product Learning with Rounding Problem and its Applications.
IACR Cryptol. ePrint Arch., 2019

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

Wetland Environmental Protection and Spatial Distribution of Plant Communities in Arid and Semi-Arid Areas of Northwest China.
Proceedings of the 8th International Conference on Agro-Geoinformatics, 2019

Ring Signatures Based on Middle-Product Learning with Errors Problems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Optimizing Polynomial Convolution for NTRUEncrypt.
IEEE Trans. Computers, 2018

Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.
IACR Cryptol. ePrint Arch., 2018

LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018

Raptor: A Practical Lattice-Based (Linkable) Ring Signature.
IACR Cryptol. ePrint Arch., 2018

A signature scheme from the finite field isomorphism problem.
IACR Cryptol. ePrint Arch., 2018

On the Hardness of the Computational Ring-LWR Problem and its Applications.
IACR Cryptol. ePrint Arch., 2018

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018

Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A signature scheme from Learning with Truncation.
IACR Cryptol. ePrint Arch., 2017

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptol. ePrint Arch., 2017

Round2: KEM and PKE based on GLWR.
IACR Cryptol. ePrint Arch., 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

Correlation between climate warming and changes in agricultural caloric resources in arid regions of northwest China.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

2016
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
Proc. Priv. Enhancing Technol., 2016

NTRU Modular Lattice Signature Scheme on CUDA GPUs.
IACR Cryptol. ePrint Arch., 2016

2015
A quantum-safe circuit-extension handshake for Tor.
IACR Cryptol. ePrint Arch., 2015

DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015

Choosing Parameters for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2015

LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme.
Des. Codes Cryptogr., 2015

2014
An enhancement for heuristic attribute reduction algorithm in rough set.
Expert Syst. Appl., 2014

2013
Fully Homomorphic Encryption Using Hidden Ideal Lattice.
IEEE Trans. Inf. Forensics Secur., 2013

Adaptive Precision Floating Point LLL.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Lattice Reduction for Modular Knapsack.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
Proceedings of the Information Security Practice and Experience, 2012

2011
AGFSM: An new FSM based on adapted Gaussian membership in case retrieval model for customer-driven design.
Expert Syst. Appl., 2011

Integration of similarity measurement and dynamic SVM for electrically evoked potentials prediction in visual prostheses research.
Expert Syst. Appl., 2011

Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2009
A case retrieval method combined with similarity measurement and multi-criteria decision making for concurrent design.
Expert Syst. Appl., 2009


  Loading...