zhenfei zhang
zhenfei zhang
Bestätigte E-Mail-Adresse bei algorand.com - Startseite
Zitiert von
Zitiert von
Choosing parameters for ntruencrypt
J Hoffstein, J Pipher, JM Schanck, JH Silverman, W Whyte, Z Zhang
Cryptographers’ Track at the RSA Conference, 3-18, 2017
Falcon: Fast-fourier, lattice-based, compact signatures over ntru
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to NIST Post-Quantum Competition 17, 2017
Round2: KEM and PKE based on GLWR
H Baan, S Bhattacharya, O Garcia-Morchon, R Rietman, L Tolhuizen, ...
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus⋆
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li
Cryptology ePrint Archive, Report 2018/1009, 2018. https://eprint. iacr. org …, 2018
Quantum safe cryptography and security
M Campagna, L Chen, Ö Dagdelen, J Ding, JK Fernick, N Gisin, ...
ETSI White Paper 8, 2015
Round5: Compact and Fast Post-quantum Public-Key Encryption
O Garcia-Morchon, T Laarhoven, R Rietman, MJO Saarinen, L Tolhuizen, ...
Post-Quantum Cryptography, 83, 0
Fully homomorphic encryption using hidden ideal lattice
T Plantard, W Susilo, Z Zhang
IEEE transactions on information forensics and security 8 (12), 2127-2137, 2013
NIST PQ Submission: NTRUEncrypt A lattice based encryption algorithm
Z Zhang, C Chen, J Hoffstein, W Whyte
NIST Post-Quantum Cryptography Standardization: Round 1 Submissions, 2017
Mobile ad-hoc network key management with certificateless cryptography
Z Zhang, W Susilo, R Raad
2008 2nd International Conference on Signal Processing and Communication …, 2008
A signature scheme from Learning with Truncation.
J Hoffstein, J Pipher, W Whyte, Z Zhang
IACR Cryptol. ePrint Arch. 2017, 995, 2017
Reaction attack on outsourced computing with fully homomorphic encryption schemes
Z Zhang, T Plantard, W Susilo
International Conference on Information Security and Cryptology, 419-436, 2011
On the CCA-1 security of somewhat homomorphic encryption over the integers
Z Zhang, T Plantard, W Susilo
International Conference on Information Security Practice and Experience …, 2012
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
JM Schanck, W Whyte, Z Zhang
Proceedings on Privacy Enhancing Technologies 2016 (4), 219-236, 2016
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Annual International Cryptology Conference, 147-175, 2019
LAC: Lattice-based cryptosystems
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
NIST PQC Round 2, 4, 2019
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
MJO Saarinen, S Bhattacharya, O Garcia-Morchon, R Rietman, ...
International Conference on Smart Card Research and Advanced Applications …, 2018
Raptor: A practical lattice-based (linkable) ring signature
X Lu, MH Au, Z Zhang
International Conference on Applied Cryptography and Network Security, 110-130, 2019
Round5: KEM and PKE based on (ring) learning with rounding
H Baan, S Bhattacharya, S Fluhrer, O Garcia-Morchon, T Laarhoven, ...
NIST PQC Round 2, 4, 2019
NIST PQ submission: pqNTRUSign-a modular lattice signature scheme
C Chen, J Hoffstein, W Whyte, Z Zhang
tech. rep., National Institute of Standards and Technology, 2017. https …, 2018
Quantum-safe hybrid (QSH) key exchange for Transport Layer Security (TLS) version 1.3
W Whyte, Z Zhang, S Fluhrer, O Garcia-Morchon
IETF Draft, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20