Zhongxiang Zheng

According to our database1, Zhongxiang Zheng authored at least 23 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption.
CoRR, 2024

2022
A Refinement of Key Mismatch Attack on NewHope.
Comput. J., 2022

A detailed analysis of primal attack and its variants.
Sci. China Inf. Sci., 2022

A More Effective Way of Target Segmentation of Multispectral Imaging Data Using Kmeans Algorithm.
Proceedings of the 7th Asia-Pacific Conference on Intelligent Robot Systems, 2022

2021
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE.
IACR Cryptol. ePrint Arch., 2021

Error estimation of practical convolution discrete Gaussian sampling with rejection sampling.
Sci. China Inf. Sci., 2021

Discrete Gaussian measures and new bounds of the smoothing parameter for lattices.
Appl. Algebra Eng. Commun. Comput., 2021

2020
SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors.
IACR Cryptol. ePrint Arch., 2020

2019
Improved analysis of the reduction from BDD to uSVP.
Inf. Process. Lett., 2019

Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.
IACR Cryptol. ePrint Arch., 2019

Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version).
IACR Cryptol. ePrint Arch., 2019

Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version).
IACR Cryptol. ePrint Arch., 2019

Identity-Concealed Authenticated Encryption from Ring Learning with Errors.
Proceedings of the Provable Security, 2019

Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE.
Proceedings of the Information Security Practice and Experience, 2019

2018
Orthogonalized lattice enumeration for solving SVP.
Sci. China Inf. Sci., 2018

Key Reuse Attack on NewHope Key Exchange Protocol.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
A Key Backup Scheme Based on Bitcoin.
IACR Cryptol. ePrint Arch., 2017

2016
Orthogonalized Lattice Enumeration for Solving SVP.
IACR Cryptol. ePrint Arch., 2016

2014
Efficient Screen Space Anisotropic Blurred Soft Shadows.
IEICE Trans. Inf. Syst., 2014

A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors.
IACR Cryptol. ePrint Arch., 2014

A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method.
Proceedings of the 2013 International Conference on Cyberworlds, 2013

2011
Screen space anisotropic blurred soft shadows.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2011


  Loading...