zhenfei zhang
zhenfei zhang
Ethereum Foundation
Verified email at - Homepage
Cited by
Cited by
Falcon: Fast-fourier, lattice-based, compact signatures over ntru
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to NIST Post-Quantum Competition 17, 2017
Choosing Parameters for NTRUEncrypt
J Hoffstein, J Pipher, JM Schanck, JH Silverman, W Whyte, Z Zhang
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus⋆
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li
Cryptology ePrint Archive, Report 2018/1009, 2018. https://eprint. iacr. org …, 2018
NIST PQ submission: pqNTRUSign-a modular lattice signature scheme
C Chen, J Hoffstein, W Whyte, Z Zhang
tech. rep., National Institute of Standards and Technology, 2017. https …, 2018
Round5: Compact and Fast Post-quantum Public-Key Encryption
O Garcia-Morchon, T Laarhoven, R Rietman, MJO Saarinen, L Tolhuizen, ...
Post-Quantum Cryptography, 83, 0
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
NTRU: algorithm specifications and supporting documentation (2019)
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
Pointproofs: aggregating proofs for multiple vector commitments
S Gorbunov, L Reyzin, H Wee, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Raptor: A practical lattice-based (linkable) ring signature
X Lu, MH Au, Z Zhang
International Conference on Applied Cryptography and Network Security, 110-130, 2019
Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges
M Campagna, L Chen, O Dagdelen, J Ding, J Fernick, N Gisin, D Hayford, ...
European Telecommunications Standards Institute 8, 1-64, 2015
Round2: KEM and PKE based on GLWR
H Baan, S Bhattacharya, O Garcia-Morchon, R Rietman, L Tolhuizen, ...
NIST PQ Submission: NTRUEncrypt A lattice based encryption algorithm
Z Zhang, C Chen, J Hoffstein, W Whyte
NIST Post-Quantum Cryptography Standardization: Round 1 Submissions, 2017
Fully homomorphic encryption using hidden ideal lattice
T Plantard, W Susilo, Z Zhang
IEEE transactions on information forensics and security 8 (12), 2127-2137, 2013
Hyperplonk: Plonk with linear-time prover and high-degree custom gates
B Chen, B Bünz, D Boneh, Z Zhang
Annual International Conference on the Theory and Applications of …, 2023
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
B Feng, L Qin, Z Zhang, Y Ding, S Chu
Cryptology ePrint Archive, 2021
Reaction attack on outsourced computing with fully homomorphic encryption schemes
Z Zhang, T Plantard, W Susilo
Information Security and Cryptology-ICISC 2011: 14th International …, 2012
Mobile ad-hoc network key management with certificateless cryptography
Z Zhang, W Susilo, R Raad
2008 2nd International Conference on Signal Processing and Communication …, 2008
BLS signatures
D Boneh, S Gorbunov, RS Wahby, H Wee, Z Zhang
Internet-Draft draft-irtf-cfrg-bls-signature-04, Internet Engineering Task Force, 2020
Shorter messages and faster post-quantum encryption with Round5 on Cortex M
MJO Saarinen, S Bhattacharya, O Garcia-Morchon, R Rietman, ...
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
Fully homomorphic encryption from the finite field isomorphism problem
Y Doröz, J Hoffstein, J Pipher, JH Silverman, B Sunar, W Whyte, Z Zhang
IACR International Workshop on Public Key Cryptography, 125-155, 2018
The system can't perform the operation now. Try again later.
Articles 1–20