Traps to the BGJT-algorithm for discrete logarithms Q Cheng, D Wan, J Zhuang LMS Journal of Computation and Mathematics 17 (A), 218-229, 2014 | 23 | 2014 |
On determining deep holes of generalized Reed–Solomon codes J Zhuang, Q Cheng, J Li IEEE Transactions on Information Theory 62 (1), 199-207, 2015 | 14 | 2015 |
LWE from non-commutative group rings Q Cheng, J Zhang, J Zhuang Designs, Codes and Cryptography, 1-25, 2021 | 12 | 2021 |
On determining deep holes of generalized Reed-Solomon codes Q Cheng, J Li, J Zhuang International Symposium on Algorithms and Computation, 100-110, 2013 | 8 | 2013 |
Improvements on the individual logarithm step in extended tower number field sieve Y Zhu, J Zhuang, C Lv, D Lin Cryptology ePrint Archive, Report 2016/727, 2016, http://eprint. iacr. org …, 2016 | 7 | 2016 |
DLP in semigroups: Algorithms and lower bounds J Han, J Zhuang Journal of Mathematical Cryptology 16 (1), 278-288, 2022 | 6 | 2022 |
On certain computations of Pisot numbers Q Cheng, J Zhuang Information Processing Letters 113 (8), 271-275, 2013 | 5 | 2013 |
Refined analysis to the extended tower number field sieve Y Zhu, J Wen, J Zhuang, C Lv, D Lin Theoretical computer science 814, 49-68, 2020 | 4 | 2020 |
A variant of the Galbraith–Ruprai algorithm for discrete logarithms with improved complexity Y Zhu, J Zhuang, H Yi, C Lv, D Lin Designs, Codes and Cryptography 87, 971-986, 2019 | 3 | 2019 |
Factor base discrete logarithms in Kummer Extensions D Xiao, J Zhuang, Q Cheng Finite Fields and Their Applications 53, 205-225, 2018 | 3 | 2018 |
On Generating Coset Representatives of in J Zhuang, Q Cheng Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016 | 3 | 2016 |
Vector Sum Range Decision for Verifiable Multi-User Fuzzy Keyword Search in Cloud-Assisted IoT J Han, L Qi, J Zhuang IEEE Internet of Things Journal, 2023 | 2 | 2023 |
Classifying and generating exact coset representatives of PGL2 (Fq) in PGL2 (Fq2) Y Zhu, J Zhuang, C Lv, D Lin Finite Fields and Their Applications 42, 118-127, 2016 | 2 | 2016 |
Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms H Wu, J Zhuang, Q Duan, Y Zhu Information Processing Letters 175, 106225, 2022 | 1 | 2022 |
Improving the Gaudry–Schost algorithm for multidimensional discrete logarithms H Wu, J Zhuang Designs, Codes and Cryptography 90 (1), 107-119, 2022 | 1 | 2022 |
Hardness of Entropic Module-LWE H Lin, M Wang, J Zhuang, Y Wang Cryptology ePrint Archive, 2020 | 1 | 2020 |
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing L Qi, J Zhuang The Journal of Supercomputing, 1-32, 2023 | | 2023 |
Solution counts and sums of roots of unity J Zhuang, Q Cheng, J Wen Journal of Number Theory 240, 551-561, 2022 | | 2022 |
Determining deep hole trees of generalized Reed-Solomon codes and an application Z JinCheng, LIN DongDai, LV Chang SCIENTIA SINICA Mathematica 47 (11), 1615-1620, 2017 | | 2017 |
Improvements on the Individual Logarithm Step in exTNFS. Y Zhu, J Zhuang, C Lv, D Lin IACR Cryptology ePrint Archive 2016, 727, 2016 | | 2016 |