Volgen
cong zhang
cong zhang
Geverifieerd e-mailadres voor zju.edu.cn
Titel
Geciteerd door
Geciteerd door
Jaar
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
402016
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
312018
Leakage-resilient certificateless public key encryption
H Xiong, TH Yuen, C Zhang, SM Yiu, YJ He
Proceedings of the first ACM workshop on Asia public-key cryptography, 13-22, 2013
282013
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
142011
An analysis of the algebraic group model
J Katz, C Zhang, HS Zhou
Cryptology ePrint Archive, 2022
122022
The relationship between idealized models under computationally bounded adversaries
M Zhandry, C Zhang
Cryptology ePrint Archive, 2021
112021
Exponent-inversion signatures and IBE under static assumptions
TH Yuen, SSM Chow, C Zhang, SM Yiu
Cryptology ePrint Archive, 2014
112014
An analysis of the algebraic group model
C Zhang, HS Zhou, J Katz
International Conference on the Theory and Application of Cryptology and …, 2022
102022
Related randomness attacks for public key cryptosystems
TH Yuen, C Zhang, SSM Chow, SM Yiu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
102015
Combiners for chosen-ciphertext security
C Zhang, D Cash, X Wang, X Yu, SSM Chow
International Computing and Combinatorics Conference, 257-268, 2016
92016
Continual leakage-resilient dynamic secret sharing in the split-state model
H Xiong, C Zhang, TH Yuen, EP Zhang, SM Yiu, S Qing
Information and Communications Security: 14th International Conference …, 2012
92012
Indifferentiability for public key cryptosystems
M Zhandry, C Zhang
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
72020
Towards anonymous ciphertext indistinguishability with identity leakage
TH Yuen, C Zhang, SSM Chow, JK Liu
International Conference on Provable Security, 139-153, 2013
72013
Multi-key leakage-resilient threshold cryptography
C Zhang, TH Yuen, H Xiong, SSM Chow, SM Yiu, YJ He
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
72013
A covert channel using core alternation
Y Li, Q Shen, C Zhang, P Sun, Y Chen, S Qing
2012 26th International Conference on Advanced Information Networking and …, 2012
72012
A ciphertext-size lower bound for order-preserving encryption with limited leakage
D Cash, C Zhang
Theory of Cryptography Conference, 159-176, 2018
42018
Impossibility of order-revealing encryption in idealized models
M Zhandry, C Zhang
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
42018
Attribute specified identity-based encryption
H Xiong, TH Yuen, C Zhang, YJ He, SM Yiu
Information Security Practice and Experience: 9th International Conference …, 2013
32013
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
C Zhang, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2023
12023
Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
TH Yuen, C Zhang, SSM Chow
International Conference on Applied Cryptography and Network Security, 419-439, 2022
12022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20