zhenfei zhang
zhenfei zhang
Ethereum Foundation
Geverifieerd e-mailadres voor ethereum.org - Homepage
Geciteerd door
Geciteerd door
Choosing parameters for ntruencrypt
J Hoffstein, J Pipher, JM Schanck, JH Silverman, W Whyte, Z Zhang
Cryptographers’ Track at the RSA Conference, 3-18, 2017
Falcon: Fast-fourier, lattice-based, compact signatures over ntru
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to NIST Post-Quantum Competition 17, 2017
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus⋆
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li
Cryptology ePrint Archive, Report 2018/1009, 2018. https://eprint. iacr. org …, 2018
Round5: Compact and Fast Post-quantum Public-Key Encryption
O Garcia-Morchon, T Laarhoven, R Rietman, MJO Saarinen, L Tolhuizen, ...
Post-Quantum Cryptography, 83, 0
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Annual International Cryptology Conference, 147-175, 2019
Round2: KEM and PKE based on GLWR
H Baan, S Bhattacharya, O Garcia-Morchon, R Rietman, L Tolhuizen, ...
Fully homomorphic encryption using hidden ideal lattice
T Plantard, W Susilo, Z Zhang
IEEE transactions on information forensics and security 8 (12), 2127-2137, 2013
NIST PQ Submission: NTRUEncrypt A lattice based encryption algorithm
Z Zhang, C Chen, J Hoffstein, W Whyte
NIST Post-Quantum Cryptography Standardization: Round 1 Submissions, 2017
Raptor: A practical lattice-based (linkable) ring signature
X Lu, MH Au, Z Zhang
International Conference on Applied Cryptography and Network Security, 110-130, 2019
Pointproofs: aggregating proofs for multiple vector commitments
S Gorbunov, L Reyzin, H Wee, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges
M Campagna, L Chen, O Dagdelen, J Ding, J Fernick, N Gisin, D Hayford, ...
European Telecommunications Standards Institute 8, 1-64, 2015
Reaction attack on outsourced computing with fully homomorphic encryption schemes
Z Zhang, T Plantard, W Susilo
International Conference on Information Security and Cryptology, 419-436, 2011
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
NIST Round 3 Submissions, 2020
NTRU algorithm specifications and supporting documentation
C Chen, O Danba, J Hoffstein, A Hülsing, J Rijneveld, JM Schanck, ...
Second PQC Standardization Conference, 2019
Mobile ad-hoc network key management with certificateless cryptography
Z Zhang, W Susilo, R Raad
2008 2nd International Conference on Signal Processing and Communication …, 2008
Quantum safe cryptography and security
M Campagna, L Chen, Ö Dagdelen, J Ding, JK Fernick, N Gisin, ...
ETSI White Paper 8, 2015
On the CCA-1 security of somewhat homomorphic encryption over the integers
Z Zhang, T Plantard, W Susilo
International Conference on Information Security Practice and Experience …, 2012
A signature scheme from learning with truncation
J Hoffstein, J Pipher, W Whyte, Z Zhang
Cryptology ePrint Archive, 2017
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
MJO Saarinen, S Bhattacharya, O Garcia-Morchon, R Rietman, ...
International Conference on Smart Card Research and Advanced Applications …, 2018
NIST PQ submission: pqNTRUSign-a modular lattice signature scheme
C Chen, J Hoffstein, W Whyte, Z Zhang
tech. rep., National Institute of Standards and Technology, 2017. https …, 2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20