Zhangjie Huang

According to our database1, Zhangjie Huang authored at least 16 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference.
IACR Cryptol. ePrint Arch., 2024

2018
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

2017
Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

2016
Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014


  Loading...