default search action
Cong Zhang 0001
Person information
- affiliation: Rutgers University, USA
Other persons with the same name
- Cong Zhang — disambiguation page
- Cong Zhang 0002 — University of Science and Technology of China, Hefei, China (and 1 more)
- Cong Zhang 0003 — Beijing University of Posts and Telecommunications, Beijing, China
- Cong Zhang 0004 — Hunan University, Changsha, China (and 1 more)
- Cong Zhang 0005 — Shanghai Jiao Tong University, Shanghai, China
- Cong Zhang 0006 — Changzhou University, School of Information Science and Engineering, China
- Cong Zhang 0007 — Wuhan Polytechnic University, School of Mathematics and Computer Science, Wuhan, China
- Cong Zhang 0008 — University of Macau, Taipa, Macao
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Commun. Cryptol. 1(3): 48 (2024) - 2023
- [c15]Cong Zhang, Mark Zhandry:
The Relationship Between Idealized Models Under Computationally Bounded Adversaries. ASIACRYPT (6) 2023: 390-419 - 2022
- [c14]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - 2021
- [i7]Mark Zhandry, Cong Zhang:
The Relationship Between Idealized Models Under Computationally Bounded Adversaries. IACR Cryptol. ePrint Arch. 2021: 240 (2021) - 2020
- [c13]Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. CRYPTO (1) 2020: 63-93
2010 – 2019
- 2019
- [i6]Mark Zhandry, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2019: 370 (2019) - 2018
- [c12]David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. ASIACRYPT (1) 2018: 181-210 - [c11]Mark Zhandry, Cong Zhang:
Impossibility of Order-Revealing Encryption in Idealized Models. TCC (2) 2018: 129-158 - [c10]David Cash, Cong Zhang:
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage. TCC (2) 2018: 159-176 - [i5]David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. IACR Cryptol. ePrint Arch. 2018: 698 (2018) - 2017
- [i4]Mark Zhandry, Cong Zhang:
Impossibility of Order-Revealing Encryption in Idealized Models. IACR Cryptol. ePrint Arch. 2017: 1001 (2017) - [i3]David Cash, Cong Zhang:
A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage. IACR Cryptol. ePrint Arch. 2017: 1120 (2017) - 2016
- [c9]Cong Zhang, David Cash, Xiuhua Wang, Xiaoqi Yu, Sherman S. M. Chow:
Combiners for Chosen-Ciphertext Security. COCOON 2016: 257-268 - [i2]David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang:
Reducing the Leakage in Practical Order-Revealing Encryption. IACR Cryptol. ePrint Arch. 2016: 661 (2016) - 2015
- [c8]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - 2014
- [i1]Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu-Ming Yiu:
Exponent-inversion Signatures and IBE under Static Assumptions. IACR Cryptol. ePrint Arch. 2014: 311 (2014) - 2013
- [c7]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Siu-Ming Yiu, Yi Jun He:
Leakage-resilient certificateless public key encryption. AsiaPKC@AsiaCCS 2013: 13-22 - [c6]Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 - [c5]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu:
Attribute Specified Identity-Based Encryption. ISPEC 2013: 60-74 - [c4]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. ProvSec 2013: 139-153 - 2012
- [c3]Yangwei Li, Qingni Shen, Cong Zhang, Pengfei Sun, Ying Chen, Sihan Qing:
A Covert Channel Using Core Alternation. AINA Workshops 2012: 324-328 - [c2]Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing:
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. ICICS 2012: 119-130 - 2011
- [c1]Pengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu:
Poster: LBMS: load balancing based on multilateral security in cloud. CCS 2011: 861-864
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint