Jiageng Chen

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting
International Journal of Applied Cryptography
2025-05-14Paper
Efficient attribute-based signature for monotone predicates2023-04-13Paper
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree
1515.9406
2022-12-21Paper
Quantum-resistant identity-based signature with message recovery and proxy delegation
Symmetry
2019-07-10Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks
IEEE Transactions on Computers
2018-06-27Paper
Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework
Information Security and Privacy
2016-09-02Paper
Accurate estimation of the full differential distribution for general Feistel structures
Information Security and Cryptology
2016-07-25Paper
Novel strategies for searching RC4 key collisions
Computers & Mathematics with Applications
2016-07-06Paper
A provable secure batch authentication scheme for EPCGen2 tags
Provable Security
2015-09-29Paper
A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
SKENO: Secret key encryption with non-interactive opening
Journal of Mathematical Cryptology
2015-08-07Paper
Related-key boomerang attacks on KATAN32/48/64
Information Security and Privacy
2013-06-28Paper
How to find short RC4 colliding key pairs
Lecture Notes in Computer Science
2011-10-28Paper
A new practical key recovery attack on the stream cipher RC4 under related-key model
Information Security and Cryptology
2011-07-29Paper
Generalized RC4 key collisions and hash collisions
Lecture Notes in Computer Science
2010-09-10Paper


Research outcomes over time


This page was built for person: Jiageng Chen