What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Liqiang Peng
Google Scholar
ORCID:
0009-0008-4717-1604
15
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Charge Your Clients: Payable Secure Computation and Its Applications.
Cong Zhang
Liqiang Peng
Weiran Liu
Shuaishuai Li
Meng Hao
Lei Zhang
Dongdai Lin
2025
conf/uss
Practical Keyword Private Information Retrieval from Key-to-Index Mappings.
Meng Hao
Weiran Liu
Liqiang Peng
Cong Zhang
Pengfei Wu
Lei Zhang
Hongwei Li
Robert H. Deng
2025
conf/uss
Improved Secure Two-party Computation from a Geometric Perspective.
Hao Guo
Liqiang Peng
Haiyang Xue
Li Peng
Weiran Liu
Zhe Liu
Lei Hu
2024
conf/ccs
Unbalanced Private Set Union with Reduced Computation and Communication.
Cong Zhang
Yu Chen
Weiran Liu
Liqiang Peng
Meng Hao
Anyu Wang
Xiaoyun Wang
2024
conf/uss
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval.
Meng Hao
Weiran Liu
Liqiang Peng
Hongwei Li
Cong Zhang
Hanxiao Chen
Tianwei Zhang
2019
journals/joc
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2018
conf/acisp
A Deterministic Algorithm for Computing Divisors in an Interval.
Liqiang Peng
Yao Lu
Noboru Kunihiro
Rui Zhang
Lei Hu
2018
conf/icics
Certifying Variant of RSA with Generalized Moduli.
Yao Lu
Noboru Kunihiro
Rui Zhang
Liqiang Peng
Hui Ma
2017
conf/eurocrypt
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2016
conf/icisc
Improved Results on Cryptanalysis of Prime Power RSA.
Liqiang Peng
Lei Hu
Yao Lu
2015
conf/iwsec
Implicit Factorization of RSA Moduli Revisited (Short Paper).
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
2015
conf/asiacrypt
Solving Linear Equations Modulo Unknown Divisors: Revisited.
Yao Lu
Rui Zhang
Liqiang Peng
Dongdai Lin
2015
conf/sacrypt
Towards Optimal Bounds for Implicit Factorization Problem.
Yao Lu
Liqiang Peng
Rui Zhang
Lei Hu
Dongdai Lin
2014
conf/acns
Partial Key Exposure Attacks on Takagi's Variant of RSA.
Zhangjie Huang
Lei Hu
Jun Xu
Liqiang Peng
Yonghong Xie
2014
conf/africacrypt
Further Improvement of Factoring RSA Moduli with Implicit Hint.
Liqiang Peng
Lei Hu
Jun Xu
Zhangjie Huang
Yonghong Xie
Coauthors
Anyu Wang
(1)
Atsushi Takayasu
(2)
Cong Zhang
(4)
Dongdai Lin
(3)
Haiyang Xue
(1)
Hanxiao Chen
(1)
Hao Guo
(1)
Hongwei Li
(2)
Hui Ma
(1)
Jun Xu
(3)
Lei Hu
(1)
Lei Hu
(6)
Lei Zhang
(1)
Lei Zhang
(1)
Li Peng
(1)
Liqiang Peng
(15)
Meng Hao
(4)
Noboru Kunihiro
(2)
Pengfei Wu
(1)
Robert H. Deng
(1)
Rui Zhang
(4)
Shuaishuai Li
(1)
Tianwei Zhang
(1)
Weiran Liu
(5)
Xiaoyun Wang
(1)
Yao Lu
(8)
Yonghong Xie
(2)
Yu Chen
(1)
Zhangjie Huang
(3)
Zhe Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to