Follow
Jincheng Zhuang
Title
Cited by
Cited by
Year
Traps to the BGJT-algorithm for discrete logarithms
Q Cheng, D Wan, J Zhuang
LMS Journal of Computation and Mathematics 17 (A), 218-229, 2014
232014
On determining deep holes of generalized Reed–Solomon codes
J Zhuang, Q Cheng, J Li
IEEE Transactions on Information Theory 62 (1), 199-207, 2015
142015
LWE from non-commutative group rings
Q Cheng, J Zhang, J Zhuang
Designs, Codes and Cryptography, 1-25, 2021
122021
On determining deep holes of generalized Reed-Solomon codes
Q Cheng, J Li, J Zhuang
International Symposium on Algorithms and Computation, 100-110, 2013
82013
Improvements on the individual logarithm step in extended tower number field sieve
Y Zhu, J Zhuang, C Lv, D Lin
Cryptology ePrint Archive, Report 2016/727, 2016, http://eprint. iacr. org …, 2016
72016
DLP in semigroups: Algorithms and lower bounds
J Han, J Zhuang
Journal of Mathematical Cryptology 16 (1), 278-288, 2022
62022
On certain computations of Pisot numbers
Q Cheng, J Zhuang
Information Processing Letters 113 (8), 271-275, 2013
52013
Refined analysis to the extended tower number field sieve
Y Zhu, J Wen, J Zhuang, C Lv, D Lin
Theoretical computer science 814, 49-68, 2020
42020
A variant of the Galbraith–Ruprai algorithm for discrete logarithms with improved complexity
Y Zhu, J Zhuang, H Yi, C Lv, D Lin
Designs, Codes and Cryptography 87, 971-986, 2019
32019
Factor base discrete logarithms in Kummer Extensions
D Xiao, J Zhuang, Q Cheng
Finite Fields and Their Applications 53, 205-225, 2018
32018
On Generating Coset Representatives of in
J Zhuang, Q Cheng
Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016
32016
Vector Sum Range Decision for Verifiable Multi-User Fuzzy Keyword Search in Cloud-Assisted IoT
J Han, L Qi, J Zhuang
IEEE Internet of Things Journal, 2023
22023
Classifying and generating exact coset representatives of PGL2 (Fq) in PGL2 (Fq2)
Y Zhu, J Zhuang, C Lv, D Lin
Finite Fields and Their Applications 42, 118-127, 2016
22016
Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms
H Wu, J Zhuang, Q Duan, Y Zhu
Information Processing Letters 175, 106225, 2022
12022
Improving the Gaudry–Schost algorithm for multidimensional discrete logarithms
H Wu, J Zhuang
Designs, Codes and Cryptography 90 (1), 107-119, 2022
12022
Hardness of Entropic Module-LWE
H Lin, M Wang, J Zhuang, Y Wang
Cryptology ePrint Archive, 2020
12020
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
L Qi, J Zhuang
The Journal of Supercomputing, 1-32, 2023
2023
Solution counts and sums of roots of unity
J Zhuang, Q Cheng, J Wen
Journal of Number Theory 240, 551-561, 2022
2022
Determining deep hole trees of generalized Reed-Solomon codes and an application
Z JinCheng, LIN DongDai, LV Chang
SCIENTIA SINICA Mathematica 47 (11), 1615-1620, 2017
2017
Improvements on the Individual Logarithm Step in exTNFS.
Y Zhu, J Zhuang, C Lv, D Lin
IACR Cryptology ePrint Archive 2016, 727, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20