The following pages link to Jiang Zhang (Q247153):
Displaying 32 items.
- Secure outsourcing of cryptographic circuits (Q1616641) (← links)
- Two-round PAKE from approximate SPH and instantiations from lattices (Q1701433) (← links)
- Security of the SM2 signature scheme against generalized key substitution attacks (Q1989512) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- An improved algorithm for learning sparse parities in the presence of noise (Q2034402) (← links)
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (Q2055683) (← links)
- Non-malleable functions and their applications (Q2121503) (← links)
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact (Q2128569) (← links)
- Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN (Q2129007) (← links)
- Collision resistant hashing from sub-exponential learning parity with noise (Q2176637) (← links)
- Valiant's universal circuits revisited: an overall improvement and a lower bound (Q2181888) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Predicting the concrete security of LWE against the dual attack using binary search (Q2673056) (← links)
- A practical NIZK argument for confidential transactions over account-model blockchain (Q2692322) (← links)
- Non-Malleable Functions and Their Applications (Q2798808) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN (Q2835589) (← links)
- Towards a Secure Certificateless Proxy Re-Encryption Scheme (Q2856175) (← links)
- Black-Box Separations for One-More (Static) CDH and Its Generalization (Q2936619) (← links)
- Authenticated Key Exchange from Ideal Lattices (Q2948401) (← links)
- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening (Q4899207) (← links)
- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings (Q4899217) (← links)
- Attribute-Based Keyword Search from Lattices (Q5040376) (← links)
- Lattice-Based Cryptosystems (Q5139268) (← links)
- Proxy Re-encryption with Unforgeable Re-encryption Keys (Q5498714) (← links)
- Generic constructions of integrated PKE and PEKS (Q5963369) (← links)
- Hardness of (M)LWE with semi-uniform seeds (Q6204543) (← links)
- Dynamical Reversibility and A New Theory of Causal Emergence (Q6523082) (← links)
- NEV: faster and smaller NTRU encryption using vector decoding (Q6595920) (← links)
- Blockwise rank decoding problem and LRPC codes: cryptosystems with smaller sizes (Q6595927) (← links)
- Model predictive complex system control from observational and interventional data (Q6663643) (← links)
- Mixing phases of the Glauber dynamics for the $p$-spin Curie-Weiss model (Q6759372) (← links)