Zhiniang Peng

According to our database1, Zhiniang Peng authored at least 20 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the security of fully homomorphic encryption for data privacy in Internet of Things.
Concurr. Comput. Pract. Exp., 2023

Detecting Union Type Confusion in Component Object Model.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Comments on "A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud".
J. Syst. Archit., 2022

Static Detection of File Access Control Vulnerabilities on Windows System.
Concurr. Comput. Pract. Exp., 2022

COMRace: Detecting Data Race Vulnerabilities in COM Objects.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Danger of using fully homomorphic encryption: A look at Microsoft SEAL.
CoRR, 2019

Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions.
IEEE Access, 2019

BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Access, 2019

MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Circulant UOV: a new UOV variant with shorter private key and faster signature generation.
KSII Trans. Internet Inf. Syst., 2018

All roads lead to Rome: Many ways to double spend your cryptocurrency.
CoRR, 2018

Precomputation Methods for UOV Signature on Energy-Harvesting Sensors.
IEEE Access, 2018

2017
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation.
IEEE Access, 2017

A Secure Variant of the SRP Encryption Scheme with Shorter Private Key.
Proceedings of the Information Security Practice and Experience, 2017

A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU.
Proceedings of the Information Security Practice and Experience, 2016

2015
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Gener. Comput. Syst., 2015

2013
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs.
IACR Cryptol. ePrint Arch., 2013


  Loading...