What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhenfeng Zhang
Google Scholar
63
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
ThPlA: Threshold Passwordless Authentication Made Usable and Scalable.
Qianwen Gao
Yuan Lu
Kunpeng Bai
Zhenfeng Zhang
Yichi Tu
2024
journals/joc
Lattice-Based Programmable Hash Functions and Applications.
Jiang Zhang
Yu Chen
Zhenfeng Zhang
2024
conf/sp
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography.
Weihao Bai
Long Chen
Qianwen Gao
Zhenfeng Zhang
2023
journals/tifs
Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems.
Haodong Jiang
Jiang Han
Zhenfeng Zhang
Zhi Ma
Hong Wang
2023
journals/tifs
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability.
Guofeng Tang
Bo Pang
Long Chen
Zhenfeng Zhang
2023
conf/asiacrypt
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query.
Haodong Jiang
Zhi Ma
Zhenfeng Zhang
2023
conf/sacrypt
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks.
Ruiqi Mi
Haodong Jiang
Zhenfeng Zhang
2022
conf/ccs
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.
Yingzi Gao
Yuan Lu
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2022
conf/ndss
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice.
Bingyong Guo
Yuan Lu
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2021
journals/compsec
Superword: A honeyword system for achieving higher security goals.
Yimin Guo
Zhenfeng Zhang
Yajun Guo
2021
journals/tifs
Direct Anonymous Attestation With Optimal TPM Signing Efficiency.
Kang Yang
Liqun Chen
Zhenfeng Zhang
Christopher J. P. Newton
Bo Yang
Li Xi
2021
conf/uss
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.
Yuchen Wang
Zhenfeng Zhang
Yongquan Xie
2021
conf/asiacrypt
On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model.
Haodong Jiang
Zhenfeng Zhang
Zhi Ma
2020
journals/compsec
Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585].
Kexin Hu
Zhenfeng Zhang
Kaiwen Guo
2020
journals/compsec
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518].
Yimin Guo
Zhenfeng Zhang
2020
journals/compsec
Nudging personalized password policies by understanding users' personality.
Yimin Guo
Zhenfeng Zhang
Yajun Guo
Xiaowei Guo
2020
journals/compsec
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435].
Yimin Guo
Zhenfeng Zhang
Yajun Guo
2020
journals/tifs
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols.
Xinyu Li
Jing Xu
Xiong Fan
Yuchen Wang
Zhenfeng Zhang
2020
conf/ccs
Dumbo: Faster Asynchronous BFT Protocols.
Bingyong Guo
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2020
conf/eurosp
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting.
Xinyu Li
Jing Xu
Zhenfeng Zhang
Xiao Lan
Yuchen Wang
2020
conf/provsec
Security of Two NIST Candidates in the Presence of Randomness Reuse.
Ke Wang
Zhenfeng Zhang
Haodong Jiang
2020
conf/provsec
Key Recovery Under Plaintext Checking Attack on LAC.
Ke Wang
Zhenfeng Zhang
Haodong Jiang
2020
conf/ndss
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Zhenfeng Zhang
Yuchen Wang
Kang Yang
2020
conf/pkc
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
Jiang Zhang
Yu Yu
Shuqin Fan
Zhenfeng Zhang
Kang Yang
2019
journals/compsec
: A new password policy for creating memorable and strong passwords.
Yimin Guo
Zhenfeng Zhang
Yajun Guo
2019
journals/compsec
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications.
Kexin Hu
Zhenfeng Zhang
Kaiwen Guo
2019
conf/esorics
Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network.
Hui Guo
Zhenfeng Zhang
Jing Xu
Mingyuan Xia
2019
conf/pkc
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model.
Haodong Jiang
Zhenfeng Zhang
Zhi Ma
2018
journals/compsec
LPSE: Lightweight password-strength estimation for password meters.
Yimin Guo
Zhenfeng Zhang
2018
conf/acisp
Fast Lottery-Based Micropayments for Decentralized Currencies.
Kexin Hu
Zhenfeng Zhang
2018
conf/crypto
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Haodong Jiang
Zhenfeng Zhang
Long Chen
Hong Wang
Zhi Ma
2018
conf/asiacrypt
On the Hardness of the Computational Ring-LWR Problem and Its Applications.
Long Chen
Zhenfeng Zhang
Zhenfei Zhang
2017
conf/provsec
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Long Chen
Zhenfeng Zhang
2017
conf/icics
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace.
Zhenyu Chen
Yanyan Fu
Min Zhang
Zhenfeng Zhang
Hao Li
2017
conf/tcc
Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension.
Long Chen
Zhenfeng Zhang
Xueqing Wang
2016
conf/ccs
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Zhenfeng Zhang
Kang Yang
Xuexian Hu
Yuchen Wang
2016
conf/ccs
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications.
Lin Zhang
Zhenfeng Zhang
Xuexian Hu
2016
conf/crypto
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
Jiang Zhang
Yu Chen
Zhenfeng Zhang
2016
conf/sp
Multiple Handshakes Security of TLS 1.3 Candidates.
Xinyu Li
Jing Xu
Zhenfeng Zhang
Dengguo Feng
Honggang Hu
2016
conf/icisc
Expanded Framework for Dual System Encryption and Its Application.
Minqian Wang
Zhenfeng Zhang
2015
conf/acns
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model.
Jing Xu
Xuexian Hu
Zhenfeng Zhang
2015
conf/pkc
Simpler Efficient Group Signatures from Lattices.
Phong Q. Nguyen
Jiang Zhang
Zhenfeng Zhang
2015
conf/eurocrypt
Authenticated Key Exchange from Ideal Lattices.
Jiang Zhang
Zhenfeng Zhang
Jintai Ding
Michael Snook
Özgür Dagdelen
2014
conf/icics
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Yanfei Guo
Zhenfeng Zhang
Jiang Zhang
Xuexian Hu
2014
conf/asiacrypt
Black-Box Separations for One-More (Static) CDH and Its Generalization.
Jiang Zhang
Zhenfeng Zhang
Yu Chen
Yanfei Guo
Zongyang Zhang
2014
conf/cans
Proxy Re-encryption with Unforgeable Re-encryption Keys.
Hui Guo
Zhenfeng Zhang
Jiang Zhang
2013
conf/icisc
Certificateless Proxy Re-Encryption Without Pairings.
Kang Yang
Jing Xu
Zhenfeng Zhang
2013
conf/provsec
Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Hui Guo
Zhenfeng Zhang
Jiang Zhang
Cheng Chen
2013
conf/ctrsa
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
San Ling
Huaxiong Wang
2012
conf/ccs
Ciphertext policy attribute-based encryption from lattices.
Jiang Zhang
Zhenfeng Zhang
Aijun Ge
2012
conf/acisp
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts.
Aijun Ge
Rui Zhang
Cheng Chen
Chuangui Ma
Zhenfeng Zhang
2012
conf/provsec
Combined Public-Key Schemes: The Case of ABE and ABS.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
2012
conf/provsec
Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Cheng Chen
Zhenfeng Zhang
Dengguo Feng
2012
conf/provsec
Authenticated Key Exchange with Entities from Different Settings and Varied Groups.
Yanfei Guo
Zhenfeng Zhang
2011
conf/provsec
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security.
Fushan Wei
Chuangui Ma
Zhenfeng Zhang
2011
conf/provsec
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Cheng Chen
Zhenfeng Zhang
Dengguo Feng
2010
conf/wisa
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks.
Kehua Bao
Zhenfeng Zhang
2006
conf/acisp
Key Replacement Attack Against a Generic Construction of Certificateless Signature.
Bessie C. Hu
Duncan S. Wong
Zhenfeng Zhang
Xiaotie Deng
2006
conf/acns
Certificateless Public-Key Signature: Security Model and Efficient Construction.
Zhenfeng Zhang
Duncan S. Wong
Jing Xu
Dengguo Feng
2005
conf/icics
Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Zhenfeng Zhang
Dengguo Feng
Jing Xu
Yongbin Zhou
2005
conf/cans
ID-Based Aggregate Signatures from Bilinear Pairings.
Jing Xu
Zhenfeng Zhang
Dengguo Feng
2005
conf/cans
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Zhenfeng Zhang
Jing Xu
Dengguo Feng
2004
conf/wisa
A Ring Signature Scheme Using Bilinear Pairings.
Jing Xu
Zhenfeng Zhang
Dengguo Feng
Coauthors
Aijun Ge
(2)
Bessie C. Hu
(1)
Bingyong Guo
(2)
Bo Pang
(1)
Bo Yang
(1)
Cheng Chen
(6)
Christopher J. P. Newton
(1)
Chuangui Ma
(2)
Dengguo Feng
(10)
Duncan S. Wong
(2)
Fushan Wei
(1)
Guofeng Tang
(1)
Hao Li
(1)
Haodong Jiang
(8)
Hong Wang
(2)
Honggang Hu
(1)
Hoon Wei Lim
(2)
Huaxiong Wang
(1)
Hui Guo
(3)
Jiang Han
(1)
Jiang Zhang
(1)
Jiang Zhang
(9)
Jie Chen
(2)
Jing Xu
(14)
Jintai Ding
(1)
Kaiwen Guo
(2)
Kang Yang
(5)
Ke Wang
(2)
Kehua Bao
(1)
Kexin Hu
(3)
Kunpeng Bai
(1)
Li Xi
(1)
Lin Zhang
(1)
Liqun Chen
(1)
Long Chen
(5)
Long Chen
(1)
Michael Snook
(1)
Min Zhang
(1)
Mingyuan Xia
(1)
Minqian Wang
(1)
Özgür Dagdelen
(1)
Phong Q. Nguyen
(1)
Qiang Tang
(3)
Qianwen Gao
(2)
Rui Zhang
(1)
Ruiqi Mi
(1)
San Ling
(1)
Shuqin Fan
(1)
Weihao Bai
(1)
Xiao Lan
(1)
Xiaotie Deng
(1)
Xiaowei Guo
(1)
Xinyu Li
(3)
Xiong Fan
(1)
Xueqing Wang
(1)
Xuexian Hu
(4)
Yajun Guo
(4)
Yanfei Guo
(3)
Yanyan Fu
(1)
Yichi Tu
(1)
Yimin Guo
(6)
Yingzi Gao
(1)
Yongbin Zhou
(1)
Yongquan Xie
(1)
Yu Chen
(1)
Yu Chen
(2)
Yu Yu
(1)
Yuan Lu
(3)
Yuchen Wang
(5)
Zhenfei Zhang
(1)
Zhenfeng Zhang
(63)
Zhenliang Lu
(3)
Zhenyu Chen
(1)
Zhi Ma
(5)
Zongyang Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to