zhenfei zhang
zhenfei zhang
Ethereum Foundation
Verified email at - Homepage
Cited by
Cited by
Falcon: Fast-fourier, lattice-based, compact signatures over ntru
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to NIST Post-Quantum Competition 17, 2017
Choosing Parameters for NTRUEncrypt
J Hoffstein, J Pipher, JM Schanck, JH Silverman, W Whyte, Z Zhang
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
NIST PQ submission: pqNTRUSign-a modular lattice signature scheme
C Chen, J Hoffstein, W Whyte, Z Zhang
tech. rep., National Institute of Standards and Technology, 2017. https …, 2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus⋆
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li
Cryptology ePrint Archive, Report 2018/1009, 2018. https://eprint. iacr. org …, 2018
T Prest, PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, ...
Post-Quantum Cryptography Project of NIST, 2020
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
Round5: Compact and Fast Post-quantum Public-Key Encryption
O Garcia-Morchon, T Laarhoven, R Rietman, MJO Saarinen, L Tolhuizen, ...
Post-Quantum Cryptography, 83, 0
Round2: KEM and PKE based on GLWR
H Baan, S Bhattacharya, O Garcia-Morchon, R Rietman, L Tolhuizen, ...
Pointproofs: aggregating proofs for multiple vector commitments
S Gorbunov, L Reyzin, H Wee, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Raptor: A practical lattice-based (linkable) ring signature
X Lu, MH Au, Z Zhang
International Conference on Applied Cryptography and Network Security, 110-130, 2019
Fully homomorphic encryption using hidden ideal lattice
T Plantard, W Susilo, Z Zhang
IEEE transactions on information forensics and security 8 (12), 2127-2137, 2013
NIST PQ Submission: NTRUEncrypt A lattice based encryption algorithm
Z Zhang, C Chen, J Hoffstein, W Whyte
NIST Post-Quantum Cryptography Standardization: Round 1 Submissions, 2017
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
Submission to the NIST’s Post-quantum Cryptography Standardization Process, 2020
Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges
M Campagna, L Chen, O Dagdelen, J Ding, J Fernick, N Gisin, D Hayford, ...
European Telecommunications Standards Institute 8, 1-64, 2015
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Z Zhang, T Plantard, W Susilo
ICISC 11, 419-436, 2011
Quantum safe cryptography and security
M Campagna, L Chen, Ö Dagdelen, J Ding, JK Fernick, N Gisin, ...
ETSI White Paper 8, 2015
Mobile ad-hoc network key management with certificateless cryptography
Z Zhang, W Susilo, R Raad
2008 2nd International Conference on Signal Processing and Communication …, 2008
NTRU: algorithm specifications and supporting documentation (2019)
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
A signature scheme from learning with truncation
J Hoffstein, J Pipher, W Whyte, Z Zhang
Cryptology ePrint Archive, 2017
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
JM Schanck, W Whyte, Z Zhang
Proceedings on Privacy Enhancing Technologies 2016 (4), 219-236, 2016
The system can't perform the operation now. Try again later.
Articles 1–20