Shihui Zheng

Orcid: 0000-0001-6360-5777

According to our database1, Shihui Zheng authored at least 42 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Concise RingCT Protocol Based on Linkable Threshold Ring Signature.
IEEE Trans. Dependable Secur. Comput., 2024

2023
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Breaking Fault Attack Countermeasures With Side-Channel Information.
IEEE Trans. Computers, May, 2023

DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

2022
Snowball: Another View on Side-Channel Key Recovery Tools.
IACR Cryptol. ePrint Arch., 2022

How to Launch a Powerful Side-Channel Collision Attack?
IACR Cryptol. ePrint Arch., 2022

2021
A Persistent Fault-Based Collision Analysis Against the Advanced Encryption Standard.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021

Persistent Fault Analysis Against SM4 Implementations in Libraries Crypto++ and GMSSL.
IEEE Access, 2021

Effective Deep Learning-based Side-Channel Analyses Against ASCAD.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service.
Entropy, 2020

Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters.
Entropy, 2020

CBOL: Cross-Bank Over-Loan Prevention, Revisited.
Entropy, 2020

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud.
Cryptogr., 2020

ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain.
IEEE Access, 2020

2019
Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling.
J. Adv. Comput. Intell. Intell. Informatics, 2019

2018
Research on the Realization of Excitation Signal SPWM of Radar Synchronous Motor Based on DSP.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Source Encryption Scheme in SDN Southbound.
Proceedings of the Advanced Hybrid Information Processing, 2018

A Fine-Grained Detection Mechanism for SDN Rule Collision.
Proceedings of the Advanced Hybrid Information Processing, 2018

SDN Dynamic Access Control Scheme Based on Prediction.
Proceedings of the Advanced Hybrid Information Processing, 2018

2015
Efficient Data Possession Auditing for Real-World Cloud Storage Environments.
IEICE Trans. Inf. Syst., 2015

An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A Portable Random Key Predistribution Scheme for Distributed Sensor Network.
J. Sensors, 2014

Hierarchical identity-based broadcast encryption scheme from LWE.
J. Commun. Networks, 2014

Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography.
J. Appl. Math., 2014

A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
Comment on Lee et al.'s group signature and e-auction scheme.
Inf. Syst. Frontiers, 2013

2012
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012

2010
A new impossible differential attack on SAFER ciphers.
Comput. Electr. Eng., 2010

2008
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG.
Proceedings of the Advances in Computer Science and Engineering, 2008

2007
Transitive Signatures from Braid Groups.
Proceedings of the Progress in Cryptology, 2007

2005
What makes the differences: benchmarking XML database implementations.
ACM Trans. Internet Techn., 2005

2003
DVQ: Towards Visual Query Processing of XML Database Systems.
World Wide Web, 2003

TREX: DTD-Conforming XML to XML Transformations.
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003

Cost-Driven Storage Schema Selection for XML.
Proceedings of the Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), 2003

2002
Structural Map: A New Index for Efficient XML Path Expression Processing.
Proceedings of the Advances in Web-Age Information Management, 2002

DTD-Directed Publishing with Attribute Translation Grammars.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

DVQ: a DTD-driven Visual Query Interface for XML Database Systems.
Proceedings of the Visual and Multimedia Information Management, 2002

2001
Enhancing XML Data Processing in Relational System with Indices.
Proceedings of the Advances in Web-Age Information Management, 2001

VXMLR: A Visual XML-Relational Database System.
Proceedings of the VLDB 2001, 2001

2000
Inferring DTD to Facilitate User-Oriented XML Document Query.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...