Jiang Zhang

From MaRDI portal
(Redirected from Person:247153)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Model predictive complex system control from observational and interventional data
Chaos
2025-01-14Paper
NEV: faster and smaller NTRU encryption using vector decoding2024-08-30Paper
Blockwise rank decoding problem and LRPC codes: cryptosystems with smaller sizes2024-08-30Paper
Hardness of (M)LWE with semi-uniform seeds
Theoretical Computer Science
2024-03-28Paper
Fast blind rotation for bootstrapping FHEs
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Half-tree: halving the cost of tree expansion in COT and DPF
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
A practical NIZK argument for confidential transactions over account-model blockchain2023-03-21Paper
Attribute-based keyword search from lattices
Information Security and Cryptology
2022-10-14Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact2022-04-22Paper
Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN2022-04-22Paper
Non-malleable functions and their applications
Journal of Cryptology
2022-04-04Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes2021-12-01Paper
An improved algorithm for learning sparse parities in the presence of noise
Theoretical Computer Science
2021-06-22Paper
KDM security for identity-based encryption: constructions and separations
Information Sciences
2020-12-10Paper
Lattice-based cryptosystems. A design perspective2020-12-07Paper
Valiant's universal circuits revisited: an overall improvement and a lower bound2020-05-20Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
Secure outsourcing of cryptographic circuits2018-11-07Paper
Security of the SM2 signature scheme against generalized key substitution attacks2018-10-26Paper
Two-round PAKE from approximate SPH and instantiations from lattices2018-02-23Paper
Cryptography with auxiliary input and trapdoor from constant-noise LPN
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Non-malleable functions and their applications
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Generic constructions of integrated PKE and PEKS
Designs, Codes and Cryptography
2016-02-19Paper
Authenticated key exchange from ideal lattices
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Proxy re-encryption with unforgeable re-encryption keys
Cryptology and Network Security
2015-02-10Paper
Black-box separations for one-more (static) CDH and its generalization
Lecture Notes in Computer Science
2015-01-06Paper
PRE: stronger security notions and efficient construction with non-interactive opening
Theoretical Computer Science
2014-06-23Paper
Towards a secure certificateless proxy re-encryption scheme
Provable Security
2013-10-23Paper
A generic construction from selective-IBE to public-key encryption with non-interactive opening
Information Security and Cryptology
2013-01-07Paper
A ciphertext policy attribute-based encryption scheme without pairings
Information Security and Cryptology
2013-01-07Paper
Dynamical Reversibility and A New Theory of Causal Emergence
(available as arXiv preprint)
N/APaper


Research outcomes over time


This page was built for person: Jiang Zhang