What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fangguo Zhang
Google Scholar
ORCID:
0000-0002-0486-6413
52
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Deny Whatever You Want: Dual-Deniable Public-Key Encryption.
Zhiyuan An
Fangguo Zhang
2024
conf/acisp
Parallel Algorithms on Hyperelliptic Pairings Using Hyperelliptic Nets.
Chao Chen
Fangguo Zhang
2024
conf/icics
New Construction of Code-Based Signature Schemes.
Yang Yang
Fangguo Zhang
2023
journals/tches
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees.
Yu Dai
Fangguo Zhang
Chang-An Zhao
2023
journals/istr
Isogeny computation on Kummer lines and applications.
Chao Chen
Fangguo Zhang
Changan Zhao
2023
conf/esorics
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience.
Zhiyuan An
Haibo Tian
Chao Chen
Fangguo Zhang
2023
conf/dsn
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
Haibin Zhang
Sisi Duan
Chao Liu
Boxin Zhao
Xuanji Meng
Shengli Liu
Yong Yu
Fangguo Zhang
Liehuang Zhu
2021
conf/acisp
Forward-Secure Group Encryptions from Lattices.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2021
conf/provsec
Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges.
Zhuoran Zhang
Zheng Zhang
Fangguo Zhang
2021
conf/icics
Lattice-Based Secret Handshakes with Reusable Credentials.
Zhiyuan An
Zhuoran Zhang
Yamin Wen
Fangguo Zhang
2021
conf/asiacrypt
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2020
journals/tifs
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
Lingling Xu
Wanhua Li
Fangguo Zhang
Rong Cheng
Shaohua Tang
2020
conf/acisp
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves.
Yan Huang
Fangguo Zhang
Zhi Hu
Zhijie Liu
2020
conf/esorics
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory.
Zhuoran Zhang
Fangguo Zhang
Haibo Tian
2020
conf/icics
New Practical Public-Key Deniable Encryption.
Yanmei Cao
Fangguo Zhang
Chongzhi Gao
Xiaofeng Chen
2019
conf/asiajcis
Subliminal Channels in the Code-based Ring Signature Scheme.
Bingsen Wang
Zhuoran Zhang
Fangguo Zhang
2019
conf/provsec
Solving ECDLP via List Decoding.
Fangguo Zhang
Shengli Liu
2018
conf/fc
Anonymous Post-Quantum Cryptocash.
Huang Zhang
Fangguo Zhang
Haibo Tian
Man Ho Au
2017
conf/provsec
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem.
Fangguo Zhang
2016
conf/ccs
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Shuai Han
Shengli Liu
Fangguo Zhang
Kefei Chen
2015
conf/ccs
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Haibo Tian
Fangguo Zhang
Kui Ren
2015
conf/ccs
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Rong Cheng
Jingbo Yan
Chaowen Guan
Fangguo Zhang
Kui Ren
2015
conf/esorics
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Chaowen Guan
Kui Ren
Fangguo Zhang
Florian Kerschbaum
Jia Yu
2012
journals/compsec
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast.
Xingwen Zhao
Fangguo Zhang
2012
conf/acns
Zero-Value Point Attacks on Kummer-Based Cryptosystem.
Fangguo Zhang
Qiping Lin
Shengli Liu
2011
conf/acisp
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation.
Yusong Du
Fangguo Zhang
2011
conf/icisc
On the Resistance of Boolean Functions against Fast Algebraic Attacks.
Yusong Du
Fangguo Zhang
Meicheng Liu
2011
conf/provsec
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures.
Rong Cheng
Bo Zhang
Fangguo Zhang
2011
conf/icics
Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions.
Yusong Du
Fangguo Zhang
2010
conf/acisp
Identity-Based Chameleon Hash Scheme without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Haibo Tian
Jin Li
Kwangjo Kim
2010
conf/fc
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Xiaofeng Chen
Fangguo Zhang
Haibo Tian
Qianhong Wu
Yi Mu
Jangseong Kim
Kwangjo Kim
2010
conf/icisc
Oblivious Transfer with Complex Attribute-Based Access Control.
Lingling Xu
Fangguo Zhang
2009
conf/wisa
ID-Based Adaptive Oblivious Transfer.
Fangguo Zhang
Xingwen Zhao
Xiaofeng Chen
2008
conf/ccs
Efficient designated confirmer signature from bilinear pairings.
Fangguo Zhang
Xiaofeng Chen
Baodian Wei
2008
conf/acns
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Jin Li
Kwangjo Kim
Fangguo Zhang
Duncan S. Wong
2007
conf/acns
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Yi Mu
2007
conf/provsec
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Jin Li
Kwangjo Kim
Fangguo Zhang
Xiaofeng Chen
2006
conf/fc
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Yi Mu
Willy Susilo
2006
conf/iwsec
Ad Hoc Group Signatures.
Qianhong Wu
Willy Susilo
Yi Mu
Fangguo Zhang
2005
conf/acisp
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.
Victor K. Wei
Tsz Hon Yuen
Fangguo Zhang
2005
conf/fc
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Fangguo Zhang
Willy Susilo
Yi Mu
2005
conf/icisc
An Efficient Static Blind Ring Signature Scheme.
Qianhong Wu
Fangguo Zhang
Willy Susilo
Yi Mu
2004
conf/acisp
Identity-Based Strong Designated Verifier Signature Schemes.
Willy Susilo
Fangguo Zhang
Yi Mu
2004
conf/acns
Limited Verifier Signature from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Kwangjo Kim
2004
conf/pkc
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Fangguo Zhang
Reihaneh Safavi-Naini
Willy Susilo
2004
conf/icics
Perfect Concurrent Signature Schemes.
Willy Susilo
Yi Mu
Fangguo Zhang
2003
conf/acisp
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
Fangguo Zhang
Kwangjo Kim
2003
conf/icics
ID-Based Distributed "Magic Ink" Signature from Pairings.
Yan Xie
Fangguo Zhang
Xiaofeng Chen
Kwangjo Kim
2002
conf/acisp
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
Fangguo Zhang
Shengli Liu
Kwangjo Kim
2002
conf/asiacrypt
ID-Based Blind Signature and Ring Signature from Pairings.
Fangguo Zhang
Kwangjo Kim
2001
conf/icics
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Fangguo Zhang
Futai Zhang
Yumin Wang
2000
conf/sec
Fair Electronic Cash Systems with Multiple Banks.
Fangguo Zhang
Futai Zhang
Yumin Wang
Coauthors
Baodian Wei
(1)
Bingsen Wang
(1)
Bo Zhang
(1)
Boxin Zhao
(1)
Chang-An Zhao
(1)
Changan Zhao
(1)
Chao Chen
(3)
Chao Liu
(1)
Chaowen Guan
(2)
Chongzhi Gao
(1)
Duncan S. Wong
(1)
Fangguo Zhang
(52)
Florian Kerschbaum
(1)
Futai Zhang
(2)
Haibin Zhang
(1)
Haibo Tian
(6)
Huang Zhang
(1)
Jangseong Kim
(1)
Jia Yu
(1)
Jin Li
(3)
Jing Pan
(2)
Jingbo Yan
(1)
Kefei Chen
(1)
Kui Ren
(3)
Kwangjo Kim
(9)
Liehuang Zhu
(1)
Lingling Xu
(2)
Man Ho Au
(1)
Meicheng Liu
(1)
Qianhong Wu
(3)
Qiping Lin
(1)
Reihaneh Safavi-Naini
(1)
Rong Cheng
(3)
Shaohua Tang
(1)
Shengli Liu
(5)
Shuai Han
(1)
Sisi Duan
(1)
Tsz Hon Yuen
(1)
Victor K. Wei
(1)
Wanhua Li
(1)
Willy Susilo
(11)
Xiaofeng Chen
(12)
Xingwen Zhao
(2)
Xuanji Meng
(1)
Yamin Wen
(1)
Yan Huang
(1)
Yan Xie
(1)
Yang Yang
(1)
Yanmei Cao
(1)
Yi Mu
(8)
Yong Yu
(1)
Yu Dai
(1)
Yumin Wang
(2)
Yusong Du
(3)
Zheng Zhang
(1)
Zhi Hu
(1)
Zhijie Liu
(1)
Zhiyuan An
(3)
Zhuoran Zhang
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to