Shihui Zheng
Orcid: 0000-0001-6360-5777
According to our database1,
Shihui Zheng
authored at least 42 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
IEEE Trans. Computers, May, 2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
A Persistent Fault-Based Collision Analysis Against the Advanced Encryption Standard.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021
Persistent Fault Analysis Against SM4 Implementations in Libraries Crypto++ and GMSSL.
IEEE Access, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
Entropy, 2020
Entropy, 2020
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud.
Cryptogr., 2020
IEEE Access, 2020
2019
J. Adv. Comput. Intell. Intell. Informatics, 2019
2018
Research on the Realization of Excitation Signal SPWM of Radar Synchronous Motor Based on DSP.
Proceedings of the Communications, Signal Processing, and Systems, 2018
Proceedings of the Advanced Hybrid Information Processing, 2018
Proceedings of the Advanced Hybrid Information Processing, 2018
Proceedings of the Advanced Hybrid Information Processing, 2018
2015
IEICE Trans. Inf. Syst., 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
J. Sensors, 2014
J. Commun. Networks, 2014
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography.
J. Appl. Math., 2014
A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014
2013
Inf. Syst. Frontiers, 2013
2012
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012
2010
2008
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
2007
Proceedings of the Progress in Cryptology, 2007
2005
ACM Trans. Internet Techn., 2005
2003
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003
2002
Proceedings of the Advances in Web-Age Information Management, 2002
Proceedings of 28th International Conference on Very Large Data Bases, 2002
DVQ: a DTD-driven Visual Query Interface for XML Database Systems.
Proceedings of the Visual and Multimedia Information Management, 2002
2001
Proceedings of the Advances in Web-Age Information Management, 2001
2000
Proceedings of the Web-Age Information Management, First International Conference, 2000