Jiageng Chen
Orcid: 0000-0001-9033-2575
According to our database1,
Jiageng Chen
authored at least 90 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption.
J. Inf. Secur. Appl., 2024
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting.
Int. J. Appl. Cryptogr., 2024
Comput. J., 2024
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024
Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures.
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Euro-Par 2024: Parallel Processing, 2024
2023
High-speed implementation of rainbow table method on heterogeneous multi-device architecture.
Future Gener. Comput. Syst., June, 2023
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain.
Comput. J., April, 2023
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard.
Int. J. Netw. Manag., 2023
Int. J. Netw. Manag., 2023
Concurr. Comput. Pract. Exp., 2023
Proceedings of the Provable and Practical Security, 2023
CFChain: A Crowdfunding Platform that Supports Identity Authentication, Privacy Protection, and Efficient Audit.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Blockchain Technology and Emerging Applications, 2023
Cross-Chain Trusted Information Match Scheme with Privacy-Preserving and Auditability.
Proceedings of the Blockchain Technology and Emerging Applications, 2023
2022
IEEE Trans. Serv. Comput., 2022
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework.
J. Inf. Secur. Appl., 2022
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain.
IEICE Trans. Inf. Syst., 2022
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain.
Connect. Sci., 2022
Threshold identity authentication signature: Impersonation prevention in social network services.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Emerging Information Security and Applications, 2022
Proceedings of the Emerging Information Security and Applications, 2022
A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022
2021
IEEE Trans. Serv. Comput., 2021
A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers.
J. Supercomput., 2021
ElearnChain: A privacy-preserving consortium blockchain system for e-learning educational records.
J. Inf. Secur. Appl., 2021
Int. J. Netw. Manag., 2021
Digit. Commun. Networks, 2021
Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes.
IEEE Access, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Emerging Information Security and Applications, 2021
AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger.
Proceedings of the Emerging Information Security and Applications, 2021
2020
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU.
J. Inf. Secur. Appl., 2020
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators.
Frontiers Comput. Sci., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing.
Proceedings of the IEEE Intl Conf on Dependable, 2020
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation.
Symmetry, 2019
Secur. Commun. Networks, 2019
Efficient implementation of lightweight block ciphers on volta and pascal architecture.
J. Inf. Secur. Appl., 2019
GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers.
IACR Cryptol. ePrint Arch., 2019
An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018
Chatting Application Monitoring on Android System and its Detection based on the Correlation Test.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks.
IEEE Trans. Computers, 2017
Concurr. Comput. Pract. Exp., 2017
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Detection and classification of malicious patterns in network traffic using Benford's law.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
An efficient batch verification system and its effect in a real time VANET environment.
Secur. Commun. Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Information Security, 2010
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010