Follow
cong zhang
cong zhang
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
352016
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
272018
Leakage-resilient certificateless public key encryption
H Xiong, TH Yuen, C Zhang, SM Yiu, YJ He
Proceedings of the first ACM workshop on Asia public-key cryptography, 13-22, 2013
242013
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
132011
Exponent-inversion signatures and IBE under static assumptions
TH Yuen, SSM Chow, C Zhang, SM Yiu
Cryptology ePrint Archive, 2014
112014
Related randomness attacks for public key cryptosystems
TH Yuen, C Zhang, SSM Chow, SM Yiu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
Continual leakage-resilient dynamic secret sharing in the split-state model
H Xiong, C Zhang, TH Yuen, EP Zhang, SM Yiu, S Qing
Information and Communications Security: 14th International Conference …, 2012
92012
The relationship between idealized models under computationally bounded adversaries
M Zhandry, C Zhang
Cryptology ePrint Archive, 2021
82021
A covert channel using core alternation
Y Li, Q Shen, C Zhang, P Sun, Y Chen, S Qing
2012 26th International Conference on Advanced Information Networking and …, 2012
82012
Towards anonymous ciphertext indistinguishability with identity leakage
TH Yuen, C Zhang, SSM Chow, JK Liu
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
72013
Combiners for chosen-ciphertext security
C Zhang, D Cash, X Wang, X Yu, SSM Chow
Computing and Combinatorics: 22nd International Conference, COCOON 2016, Ho …, 2016
62016
Multi-key leakage-resilient threshold cryptography
C Zhang, TH Yuen, H Xiong, SSM Chow, SM Yiu, YJ He
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
62013
Indifferentiability for public key cryptosystems
M Zhandry, C Zhang
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
52020
An analysis of the algebraic group model
J Katz, C Zhang, HS Zhou
Cryptology ePrint Archive, 2022
42022
A ciphertext-size lower bound for order-preserving encryption with limited leakage
D Cash, C Zhang
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
42018
Impossibility of order-revealing encryption in idealized models
M Zhandry, C Zhang
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
32018
Attribute specified identity-based encryption
H Xiong, TH Yuen, C Zhang, YJ He, SM Yiu
Information Security Practice and Experience: 9th International Conference …, 2013
32013
Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
TH Yuen, C Zhang, SSM Chow
Applied Cryptography and Network Security: 20th International Conference …, 2022
2022
Don’t Tamper with Dual System Encryption
TH Yuen, C Zhang, SSM Chow
Applied Cryptography and Network Security: 20th International Conference …, 2022
2022
Indifferentiable Signatures: High Performance and Fallback Security
C Papamanthou, C Zhang, HS Zhou
Cryptology ePrint Archive, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20