default search action
Guoyan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Chengliang Tian, Jia Yu, Panpan Meng, Guoyan Zhang, Weizhong Tian, Yan Zhang:
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud. IEEE Trans. Cloud Comput. 12(3): 913-927 (2024) - [j16]Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024) - [j15]Zhenzhen Guo, Gaoli Wang, Yingxin Li, Jianqiang Ni, Guoyan Zhang:
Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs. IEEE Trans. Mob. Comput. 23(4): 3343-3360 (2024) - 2023
- [j14]Congming Wei, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang:
Improved attacks against reduced-round Whirlwind. Des. Codes Cryptogr. 91(11): 3581-3602 (2023) - [j13]Zhenzhen Guo, Gaoli Wang, Guoyan Zhang, Yingxin Li, Jianqiang Ni:
A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain. IEEE Internet Things J. 10(22): 20049-20064 (2023) - [j12]Yongze Kang, Qingyuan Yu, Lingyue Qin, Guoyan Zhang:
Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher. Symmetry 15(6): 1196 (2023) - [j11]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023) - 2021
- [j10]Chun Guo, Guoyan Zhang:
Beyond-birthday security for permutation-based Feistel networks. Des. Codes Cryptogr. 89(3): 407-440 (2021) - 2019
- [j9]Lele Chen, Gaoli Wang, Guoyan Zhang:
MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. Comput. J. 62(12): 1805-1821 (2019) - 2017
- [j8]Yanbin Li, Guoyan Zhang, Wei Wang, Meiqin Wang:
Cryptanalysis of round-reduced ASCON. Sci. China Inf. Sci. 60(3): 38102 (2017) - [j7]Guoyan Zhang, Meicheng Liu:
A distinguisher on PRESENT-like permutations with application to SPONGENT. Sci. China Inf. Sci. 60(7): 72101 (2017) - 2015
- [j6]Guoyan Zhang, Jing Qin:
Lattice-based threshold cryptography and its applications in distributed cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 176-185 (2015) - [j5]Guoyan Zhang, Jing Qin, Shams Qazi:
Multi-Authority Attribute-Based Encryption Scheme from Lattices. J. Univers. Comput. Sci. 21(3): 483-501 (2015) - 2014
- [j4]Guoyan Zhang:
Attribute-Based Certificateless Cryptographic System. J. Comput. 9(1): 72-77 (2014) - [j3]Guoyan Zhang, Feng Wang:
Improvement on a Fuzzy Identity-based Encryption Scheme. J. Comput. 9(11): 2727-2732 (2014) - [j2]Decheng Hong, Jiaqi Xiao, Guoyan Zhang, Shande Yang:
Characteristics of the Sum of Cross-Components of Triaxial Induction Logging Tool in Layered Anisotropic Formation. IEEE Trans. Geosci. Remote. Sens. 52(6): 3107-3115 (2014) - 2009
- [j1]Tong Zhang, Rino Micheloni, Guoyan Zhang, Zhaoran Rena Huang, James Jian-Qiang Lu:
3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives. Proc. IEEE 97(1): 161-174 (2009)
Conference and Workshop Papers
- 2023
- [c23]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. ASIACRYPT (3) 2023: 3-33 - [c22]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404 - 2022
- [c21]Qingyuan Yu, Keting Jia, Guangnan Zou, Guoyan Zhang:
Differential Cryptanalysis of Round-Reduced SPEEDY Family. Inscrypt 2022: 272-291 - 2020
- [c20]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack Against GCM-RUP. CT-RSA 2020: 15-34 - 2016
- [c19]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - 2015
- [c18]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - 2013
- [c17]Kerui Wang, Qiuliang Xu, Guoyan Zhang:
A Secure Threshold Signature Scheme from Lattices. CIS 2013: 469-473 - [c16]Guoyan Zhang, Yonghua Li:
Cooperative multicast transmission strategy for energy-efficient dynamic network coding. ICC Workshops 2013: 479-483 - [c15]Guoyan Zhang, Yonghua Li, Jiaru Lin:
Optimal energy consumption for dynamic network coding in cooperative multicast system. ICT 2013: 1-5 - 2012
- [c14]Guoyan Zhang:
A General Construction for Multi-authority Attribute-Based Encryption. AICI 2012: 333-340 - [c13]Yonghua Li, Fengming Cui, Guoyan Zhang, Jiaru Lin:
On the capacity outage probability for cooperative networking coding system with mulitple relays. IC-NIDC 2012: 558-561 - [c12]Guoyan Zhang, Lei Liu, Yang Liu:
An Attribute-Based Encryption Scheme Secure against Malicious KGC. TrustCom 2012: 1376-1380 - 2011
- [c11]Guoyan Zhang:
A Generic Construction for Proxy Signature Scheme. AICI (2) 2011: 93-100 - [c10]Guoyan Zhang:
A Generic Construction for Proxy Cryptography. CSEE (1) 2011: 284-289 - [c9]Guoyan Zhang, Qiuliang Xu:
Secret Key Awareness Security Public Key Encryption Scheme. ISA 2011: 53-61 - 2010
- [c8]Guoyan Zhang:
Practical Threshold One-Time Proxy Signature Scheme. AINA Workshops 2010: 275-279 - 2009
- [c7]Chengyu Hu, Pengtao Liu, Guoyan Zhang:
Nominative Proxy Ring Signature. SNPD 2009: 225-228 - 2008
- [c6]Guoyan Zhang, Shaohui Wang:
A Certificateless Signature and Group Signature Schemes against Malicious PKG. AINA 2008: 334-341 - [c5]Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network. AINA Workshops 2008: 428-433 - 2007
- [c4]Peter C. Hung, Seán F. McLoone, Magdalena Sánchez, Ronan Farrell, Guoyan Zhang:
Direct and indirect classification of high-frequency LNA performance using machine learning techniques. ANNIIP 2007: 66-75 - 2006
- [c3]Guoyan Zhang, Ronan Farrell:
Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits. DDECS 2006: 89-90 - [c2]Guoyan Zhang, Ronan Farrell:
An Embedded Rectifier-Based Built-In-Test Circuit for CMOS RF Circuits. ICECS 2006: 612-615 - 2005
- [c1]Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:
The Second-Preimage Attack on MD4. CANS 2005: 1-12
Informal and Other Publications
- 2023
- [i7]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. IACR Cryptol. ePrint Arch. 2023: 1286 (2023) - [i6]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. IACR Cryptol. ePrint Arch. 2023: 1359 (2023) - 2019
- [i5]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack against GCM-RUP. IACR Cryptol. ePrint Arch. 2019: 1359 (2019) - 2016
- [i4]Guoyan Zhang, Meicheng Liu:
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT. IACR Cryptol. ePrint Arch. 2016: 236 (2016) - [i3]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - 2014
- [i2]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2012
- [i1]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint