Follow
zhenfei zhang
zhenfei zhang
Ethereum Foundation
Verified email at ethereum.org - Homepage
Title
Cited by
Cited by
Year
Falcon: Fast-fourier, lattice-based, compact signatures over ntru
PA Fouque, J Hoffstein, P Kirchner, V Lyubashevsky, T Pornin, T Prest, ...
Submission to NIST Post-Quantum Competition 17, 2017
618*2017
Choosing parameters for NTRUEncrypt
J Hoffstein, J Pipher, JM Schanck, JH Silverman, W Whyte, Z Zhang
Cryptographers’ Track at the RSA Conference, 3-18, 2017
1882017
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus⋆
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li
Cryptology ePrint Archive, Report 2018/1009, 2018. https://eprint. iacr. org …, 2018
151*2018
NIST PQ submission: pqNTRUSign-a modular lattice signature scheme
C Chen, J Hoffstein, W Whyte, Z Zhang
tech. rep., National Institute of Standards and Technology, 2017. https …, 2018
130*2018
Round5: Compact and Fast Post-quantum Public-Key Encryption
O Garcia-Morchon, T Laarhoven, R Rietman, MJO Saarinen, L Tolhuizen, ...
Post-Quantum Cryptography, 83, 0
117*
NTRU: algorithm specifications and supporting documentation (2019)
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
106*2019
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1042019
Pointproofs: aggregating proofs for multiple vector commitments
S Gorbunov, L Reyzin, H Wee, Z Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
962020
Hyperplonk: Plonk with linear-time prover and high-degree custom gates
B Chen, B Bünz, D Boneh, Z Zhang
Annual International Conference on the Theory and Applications of …, 2023
952023
Raptor: A practical lattice-based (linkable) ring signature
X Lu, MH Au, Z Zhang
International Conference on Applied Cryptography and Network Security, 110-130, 2019
852019
Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges
M Campagna, L Chen, O Dagdelen, J Ding, J Fernick, N Gisin, D Hayford, ...
European Telecommunications Standards Institute 8, 1-64, 2015
812015
Round2: KEM and PKE based on GLWR
H Baan, S Bhattacharya, O Garcia-Morchon, R Rietman, L Tolhuizen, ...
65*
ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences
B Feng, L Qin, Z Zhang, Y Ding, S Chu
Cryptology ePrint Archive, 2021
64*2021
NIST PQ Submission: NTRUEncrypt A lattice based encryption algorithm
Z Zhang, C Chen, J Hoffstein, W Whyte
NIST Post-Quantum Cryptography Standardization: Round 1 Submissions, 2017
64*2017
Fully homomorphic encryption using hidden ideal lattice
T Plantard, W Susilo, Z Zhang
IEEE transactions on information forensics and security 8 (12), 2127-2137, 2013
582013
Reaction attack on outsourced computing with fully homomorphic encryption schemes
Z Zhang, T Plantard, W Susilo
Information Security and Cryptology-ICISC 2011: 14th International …, 2012
372012
BLS signatures
D Boneh, S Gorbunov, RS Wahby, H Wee, Z Zhang
Internet-Draft draft-irtf-cfrg-bls-signature-04, Internet Engineering Task Force, 2020
302020
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world
JM Schanck, W Whyte, Z Zhang
Proceedings on Privacy Enhancing Technologies 2016 (4), 219-236, 2016
28*2016
Mobile ad-hoc network key management with certificateless cryptography
Z Zhang, W Susilo, R Raad
2008 2nd International Conference on Signal Processing and Communication …, 2008
272008
{VeriZexe}: Decentralized Private Computation with Universal Setup
AL Xiong, B Chen, Z Zhang, B Bünz, B Fisch, F Krell, P Camacho
32nd USENIX Security Symposium (USENIX Security 23), 4445-4462, 2023
262023
The system can't perform the operation now. Try again later.
Articles 1–20