Zhenfeng Zhang

According to our database1, Zhenfeng Zhang authored at least 89 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Analysis of Two Countermeasures against the Signal Leakage Attack.
IACR Cryptology ePrint Archive, 2019

Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model.
IACR Cryptology ePrint Archive, 2019

2018
Protect white-box AES to resist table composition attacks.
IET Information Security, 2018

Direct Anonymous Attestation with Optimal TPM Signing Efficiency.
IACR Cryptology ePrint Archive, 2018

Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications.
IACR Cryptology ePrint Archive, 2018

LPSE: Lightweight password-strength estimation for password meters.
Computers & Security, 2018

A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Channel Estimation Method Based on the Improved LMS Algorithm for MIMO-OFDM Systems.
Proceedings of the 12th International Symposium on Medical Information and Communication Technology, 2018

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Hardness of the Computational Ring-LWR Problem and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Fast Lottery-Based Micropayments for Decentralized Currencies.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.
Wireless Personal Communications, 2017

Towards Secure Data Distribution Systems in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2017

Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange.
IEEE Communications Letters, 2017

Post-quantum IND-CCA-secure KEM without Additional Hash.
IACR Cryptology ePrint Archive, 2017

Universally composable anonymous password authenticated key exchange.
SCIENCE CHINA Information Sciences, 2017

Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Proceedings of the Provable Security, 2017

The De-anonymization Method Based on User Spatio-Temporal Mobility Trace.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
Superpixel-Based Segmentation for 3D Prostate MR Images.
IEEE Trans. Med. Imaging, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptology ePrint Archive, 2016

Generic constructions of integrated PKE and PEKS.
Des. Codes Cryptography, 2016

Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme.
Concurrency and Computation: Practice and Experience, 2016

Multiple Handshakes Security of TLS 1.3 Candidates.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

UC-secure and Contributory Password-Authenticated Group Key Exchange.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Expanded Framework for Dual System Encryption and Its Application.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

UC-secure Two-Server Password-Based Authentication Protocol and Its Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Universally composable three-party password-authenticated key exchange with contributiveness.
Int. J. Communication Systems, 2015

Non-Transferable Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2015

Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Simpler Efficient Group Signatures from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Authenticated Key Exchange from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
PRE: Stronger security notions and efficient construction with non-interactive opening.
Theor. Comput. Sci., 2014

Authenticated Key Exchange from Ideal Lattices.
IACR Cryptology ePrint Archive, 2014

DAA-Related APIs in TPM 2.0 Revisited.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Proxy Re-encryption with Unforgeable Re-encryption Keys.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Black-Box Separations for One-More (Static) CDH and Its Generalization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
IEEE Trans. Parallel Distrib. Syst., 2013

Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IEICE Transactions, 2013

Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Proceedings of the Provable Security - 7th International Conference, 2013

Certificateless Proxy Re-Encryption Without Pairings.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Secure and Efficient Data-Sharing in Clouds.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768].
Journal of Systems and Software, 2012

Gateway-oriented password-authenticated key exchange protocol in the standard model.
Journal of Systems and Software, 2012

PRE - Stronger Security Notion and Efficient Construction with New Property.
IACR Cryptology ePrint Archive, 2012

Integrated PKE and PEKS - Stronger Security Notions and New Constructions.
IACR Cryptology ePrint Archive, 2012

Authenticated Key Exchange with Entities from Different Settings and Varied Groups.
Proceedings of the Provable Security - 6th International Conference, 2012

Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Proceedings of the Provable Security - 6th International Conference, 2012

Combined Public-Key Schemes: The Case of ABE and ABS.
Proceedings of the Provable Security - 6th International Conference, 2012

Ciphertext policy attribute-based encryption from lattices.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions.
IACR Cryptology ePrint Archive, 2011

Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security.
Proceedings of the Provable Security - 5th International Conference, 2011

Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Proceedings of the Provable Security - 5th International Conference, 2011

A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security.
Proceedings of the Global Communications Conference, 2010

2009
Certificateless Threshold Ring Signature.
Inf. Sci., 2009

The generalized Mandelbrot set perturbed by composing noise of additive and multiplicative.
Applied Mathematics and Computation, 2009

2008
A New Anonymous Password-Based Authenticated Key Exchange Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
Certificateless signature: a new security model and an improved generic construction.
Des. Codes Cryptography, 2007

2006
Key Replacement Attack on a Certificateless Signature Scheme.
IACR Cryptology ePrint Archive, 2006

Certificateless Public-Key Signature: Security Model and Efficient Construction.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

Key Replacement Attack Against a Generic Construction of Certificateless Signature.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Communications Letters, 2005

On the Security of a Certificateless Public-Key Encryption.
IACR Cryptology ePrint Archive, 2005

Cryptanalysis of some signature schemes with message recovery.
Applied Mathematics and Computation, 2005

A Generic Scheme for Zero-Knowledge Sets.
Proceedings of the Applied Public Key Infrastructure, 2005

Efficient Fair Certified E-Mail Delivery Based on RSA.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

ID-Based Proxy Signature Using Bilinear Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

ID-Based Aggregate Signatures from Bilinear Pairings.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Identity Based Threshold Proxy Signature.
IACR Cryptology ePrint Archive, 2004

A Ring Signature Scheme Using Bilinear Pairings.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem.
IACR Cryptology ePrint Archive, 2003

2002
Cryptanalysis on AW digital signature scheme based on error-correcting codes.
Science in China Series F: Information Sciences, 2002


  Loading...