What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fangyu Zheng
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Revisiting Prediction-Based Min-Entropy Estimation: Toward Interpretability, Reliability, and Applicability.
Dongchi Han
Yuan Ma
Tianyu Chen
Shijie Jia
Na Lv
Fangyu Zheng
Xianhui Lu
2024
journals/tches
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches.
Tian Zhou
Fangyu Zheng
Guang Fan
Lipeng Wan
Wenxu Tang
Yixuan Song
Yi Bian
Jingqiang Lin
2024
journals/tifs
ZeroShield: Transparently Mitigating Code Page Sharing Attacks With Zero-Cost Stand-By.
Mingyu Wang
Fangyu Zheng
Jingqiang Lin
Fangjie Jiang
Yuan Ma
2024
conf/ccs
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation.
Wenxu Tang
Fangyu Zheng
Guang Fan
Tian Zhou
Jingqiang Lin
Jiwu Jing
2024
conf/acsac
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis.
Xiangxin Guo
Shijie Jia
Jingqiang Lin
Yuan Ma
Fangyu Zheng
Guangzheng Li
Bowen Xu
Yueqiang Cheng
Kailiang Ji
2023
conf/esorics
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Bowen Xu
Shijie Jia
Jingqiang Lin
Fangyu Zheng
Yuan Ma
Limin Liu
Xiaozhuo Gu
Li Song
2022
conf/esorics
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator.
Lipeng Wan
Fangyu Zheng
Guang Fan
Rong Wei
Lili Gao
Yuewu Wang
Jingqiang Lin
Jiankuo Dong
2022
conf/acsac
CryptoGo: Automatic Detection of Go Cryptographic API Misuses.
Wenqing Li
Shijie Jia
Limin Liu
Fangyu Zheng
Yuan Ma
Jingqiang Lin
2021
journals/tifs
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power.
Lili Gao
Fangyu Zheng
Rong Wei
Jiankuo Dong
Niall Emmart
Yuan Ma
Jingqiang Lin
Charles C. Weems
2021
conf/acsac
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment.
Rong Wei
Fangyu Zheng
Lili Gao
Jiankuo Dong
Guang Fan
Lipeng Wan
Jingqiang Lin
Yuewu Wang
2018
conf/cns
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization.
Shiran Pan
Fangyu Zheng
Wen Tao Zhu
Qiongxiao Wang
2018
conf/cns
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs.
Jiankuo Dong
Fangyu Zheng
Juanjuan Cheng
Jingqiang Lin
Wuqiong Pan
Ziyang Wang
2018
conf/icics
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation.
Ziyang Wang
Fangyu Zheng
Jingqiang Lin
Jiankuo Dong
2017
journals/tifs
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration.
Wuqiong Pan
Fangyu Zheng
Yuan Zhao
Wen Tao Zhu
Jiwu Jing
2017
conf/icics
High-Performance Symmetric Cryptography Server with GPU Acceleration.
Wangzhao Cheng
Fangyu Zheng
Wuqiong Pan
Jingqiang Lin
Huorong Li
Bingyu Li
2016
conf/sec
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks.
Yuan Zhao
Jingqiang Lin
Wuqiong Pan
Cong Xue
Fangyu Zheng
Ziqiang Ma
2016
conf/sacrypt
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA.
Yuan Zhao
Wuqiong Pan
Jingqiang Lin
Peng Liu
Cong Xue
Fangyu Zheng
2014
conf/wisa
Exploiting the Potential of GPUs for Modular Multiplication in ECC.
Fangyu Zheng
Wuqiong Pan
Jingqiang Lin
Jiwu Jing
Yuan Zhao
Coauthors
Bingyu Li
(1)
Bowen Xu
(2)
Charles C. Weems
(1)
Cong Xue
(2)
Dongchi Han
(1)
Fangjie Jiang
(1)
Fangyu Zheng
(18)
Guang Fan
(4)
Guangzheng Li
(1)
Huorong Li
(1)
Jiankuo Dong
(5)
Jingqiang Lin
(15)
Jiwu Jing
(3)
Juanjuan Cheng
(1)
Kailiang Ji
(1)
Li Song
(1)
Lili Gao
(3)
Limin Liu
(2)
Lipeng Wan
(3)
Mingyu Wang
(1)
Na Lv
(1)
Niall Emmart
(1)
Peng Liu
(1)
Qiongxiao Wang
(1)
Rong Wei
(3)
Shijie Jia
(4)
Shiran Pan
(1)
Tian Zhou
(2)
Tianyu Chen
(1)
Wangzhao Cheng
(1)
Wen Tao Zhu
(2)
Wenqing Li
(1)
Wenxu Tang
(2)
Wuqiong Pan
(6)
Xiangxin Guo
(1)
Xianhui Lu
(1)
Xiaozhuo Gu
(1)
Yi Bian
(1)
Yixuan Song
(1)
Yuan Ma
(6)
Yuan Zhao
(4)
Yueqiang Cheng
(1)
Yuewu Wang
(2)
Ziqiang Ma
(1)
Ziyang Wang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to