Guizhen Zhu

Orcid: 0000-0003-4166-4316

According to our database1, Guizhen Zhu authored at least 13 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
Proceedings of the Information Security - 27th International Conference, 2024

2022
Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022

New Constructions of Paraunitary Matrices for Golay Sequences.
Proceedings of the 10th International Workshop on Signal Design and Its Applications in Communications, 2022

2021
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021

2016
On the error distance of extended Reed-Solomon codes.
Adv. Math. Commun., 2016

2014
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors.
IACR Cryptol. ePrint Arch., 2014

A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge.
IACR Cryptol. ePrint Arch., 2014

A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice Vectors.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2012
An asymptotic formula for counting subset sums over subgroups of finite fields.
Finite Fields Their Appl., 2012

Computing Error Distance of Reed-Solomon Codes.
Proceedings of the Theory and Applications of Models of Computation, 2012

2011
An Efficient Broadcast Attack against NTRU.
IACR Cryptol. ePrint Arch., 2011


  Loading...