default search action
Haodong Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. Comput. J. 67(1): 323-337 (2024) - [i11]Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3. IACR Cryptol. ePrint Arch. 2024: 1360 (2024) - 2023
- [j5]Wenhao Shi, Haodong Jiang, Zhi Ma:
Solving HNP with One Bit Leakage: An Asymmetric Lattice Sieving Algorithm. Entropy 25(1): 49 (2023) - [j4]Haodong Jiang, Jiang Han, Zhenfeng Zhang, Zhi Ma, Hong Wang:
Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems. IEEE Trans. Inf. Forensics Secur. 18: 5069-5081 (2023) - [c13]Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. ASIACRYPT (4) 2023: 434-468 - [c12]Mengfan Xue, Haodong Jiang, Jiannan Zheng, Yuanfeng Wu, Yuanfan Xu, Jianhu Pan, Wentao Zhu:
Spatiotemporal Excitation Module-based CNN for Diagnosis of Hepatic Malignancy in Four-phase CT Images. EMBC 2023: 1-5 - [c11]Haodong Jiang, Wentao Wang, Yuan Shen, Xinghan Li, Xiaoqiang Ren, Biqiang Mu, Junfeng Wu:
Efficient Planar Pose Estimation via UWB Measurements. ICRA 2023: 1954-1960 - [c10]Wenhao Shi, Jiang Han, Haodong Jiang, Zhi Ma:
Improved Key-Recovery Attacks Under Imperfect SCA Oracle for Lattice-Based KEMs. ProvSec 2023: 67-82 - [c9]Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. SAC 2023: 255-274 - [i10]Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query. IACR Cryptol. ePrint Arch. 2023: 7 (2023) - 2022
- [j3]Yaru Wang, Haodong Jiang, Zhi Ma:
Quantum Misuse Attack on Frodo. Entropy 24(10): 1418 (2022) - [j2]Yaru Wang, Haodong Jiang, Zhi Ma, Hong Wang, Qianheng Duan:
An improved quantum algorithm for the quantum learning with errors problem. Quantum Inf. Process. 21(5): 166 (2022) - [j1]Xinghan Li, Haodong Jiang, Xingyu Chen, He Kong, Junfeng Wu:
Closed-Form Error Propagation on $SE_{n}(3)$ Group for Invariant EKF With Applications to VINS. IEEE Robotics Autom. Lett. 7(4): 10705-10712 (2022) - [i9]Xinghan Li, Haodong Jiang, Xingyu Chen, He Kong, Junfeng Wu:
Closed-form Error Propagation on the SE_n(3) Group for Invariant Extended Kalman Filtering with Applications to VINS. CoRR abs/2206.09100 (2022) - [i8]Haodong Jiang, Wentao Wang, Yuan Shen, Xinghan Li, Xiaoqiang Ren, Biqiang Mu, Junfeng Wu:
Efficient Planar Pose Estimation via UWB Measurements. CoRR abs/2209.06779 (2022) - [i7]Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2022: 1064 (2022) - [i6]Yu Liu, Haodong Jiang, Yunlei Zhao:
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE. IACR Cryptol. ePrint Arch. 2022: 1441 (2022) - 2021
- [c8]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model. ASIACRYPT (1) 2021: 487-517 - [c7]Chen Liu, Jiming Chen, Haoyu Liu, Haodong Jiang, Shibo He:
A Self-Attention Based Method for Wind Speed Forecasting in High-Speed Railway System. DTPI 2021: 106-109 - 2020
- [c6]Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Key Recovery Under Plaintext Checking Attack on LAC. ProvSec 2020: 381-401 - [c5]Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Security of Two NIST Candidates in the Presence of Randomness Reuse. ProvSec 2020: 402-421 - [i5]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [c4]Ke Wang, Haodong Jiang:
Analysis of Two Countermeasures Against the Signal Leakage Attack. AFRICACRYPT 2019: 370-388 - [c3]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. Public Key Cryptography (2) 2019: 618-645 - [c2]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model. PQCrypto 2019: 227-248 - [i4]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2019: 52 (2019) - [i3]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 134 (2019) - [i2]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 494 (2019) - 2018
- [c1]Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma:
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited. CRYPTO (3) 2018: 96-125 - 2017
- [i1]Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma:
Post-quantum IND-CCA-secure KEM without Additional Hash. IACR Cryptol. ePrint Arch. 2017: 1096 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint