default search action
Jincheng Zhuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Haoxuan Wu, Jincheng Zhuang:
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method. Inf. Process. Lett. 188: 106535 (2025) - 2024
- [j16]Jiao Han, Lijun Qi, Jincheng Zhuang:
Vector Sum Range Decision for Verifiable Multiuser Fuzzy Keyword Search in Cloud-Assisted IoT. IEEE Internet Things J. 11(1): 931-943 (2024) - [j15]Zhe Sun, Jincheng Zhuang, Zimeng Zhou, Fang-Wei Fu:
A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes. Theor. Comput. Sci. 994: 114480 (2024) - [j14]Hao Lin, Mingqiang Wang, Jincheng Zhuang, Yang Wang:
Hardness of Entropic Module-LWE. Theor. Comput. Sci. 999: 114553 (2024) - [j13]Lijun Qi, Jincheng Zhuang:
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing. J. Supercomput. 80(2): 2767-2798 (2024) - 2022
- [j12]Haoxuan Wu, Jincheng Zhuang:
Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms. Des. Codes Cryptogr. 90(1): 107-119 (2022) - [j11]Qi Cheng, Jun Zhang, Jincheng Zhuang:
LWE from non-commutative group rings. Des. Codes Cryptogr. 90(1): 239-263 (2022) - [j10]Haoxuan Wu, Jincheng Zhuang, Qianheng Duan, Yuqing Zhu:
Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms. Inf. Process. Lett. 175: 106225 (2022) - [j9]Jiao Han, Jincheng Zhuang:
DLP in semigroups: Algorithms and lower bounds. J. Math. Cryptol. 16(1): 278-288 (2022) - [i10]Haoxuan Wu, Jincheng Zhuang:
Syndrome decoding meets multiple instances. CoRR abs/2209.06656 (2022) - [i9]Lijun Qi, Jincheng Zhuang:
Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing. IACR Cryptol. ePrint Arch. 2022: 1374 (2022) - 2020
- [j8]Yuqing Zhu, Jiejing Wen, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Refined analysis to the extended tower number field sieve. Theor. Comput. Sci. 814: 49-68 (2020)
2010 – 2019
- 2019
- [j7]Wei Wu, Jincheng Zhuang, Wennai Wang, Bin Wang:
Geometry-Based Statistical Channel Models of Reflected-Path Self-Interference in Full-Duplex Wireless. IEEE Access 7: 48778-48791 (2019) - [j6]Yuqing Zhu, Jincheng Zhuang, Hairong Yi, Chang Lv, Dongdai Lin:
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity. Des. Codes Cryptogr. 87(5): 971-986 (2019) - 2018
- [j5]Dianyan Xiao, Jincheng Zhuang, Qi Cheng:
Factor base discrete logarithms in Kummer extensions. Finite Fields Their Appl. 53: 205-225 (2018) - 2016
- [j4]Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Classifying and generating exact coset representatives of PGL2(Fq) in PGL2(Fq2). Finite Fields Their Appl. 42: 118-127 (2016) - [j3]Jincheng Zhuang, Qi Cheng, Jiyou Li:
On Determining Deep Holes of Generalized Reed-Solomon Codes. IEEE Trans. Inf. Theory 62(1): 199-207 (2016) - [i8]Qi Cheng, Jincheng Zhuang:
LWE from Non-commutative Group Rings. CoRR abs/1612.06670 (2016) - [i7]Yuqing Zhu, Jincheng Zhuang, Chang Lv, Dongdai Lin:
Improvements on the Individual Logarithm Step in exTNFS. IACR Cryptol. ePrint Arch. 2016: 727 (2016) - [i6]Qi Cheng, Jincheng Zhuang:
LWE from Non-commutative Group Rings. IACR Cryptol. ePrint Arch. 2016: 1169 (2016) - 2015
- [c2]Jincheng Zhuang, Qi Cheng:
On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). Inscrypt 2015: 167-177 - [i5]Jincheng Zhuang, Qi Cheng:
On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). IACR Cryptol. ePrint Arch. 2015: 764 (2015) - [i4]Dianyan Xiao, Jincheng Zhuang, Qi Cheng:
Factor Base Discrete Logarithms in Kummer Extensions. IACR Cryptol. ePrint Arch. 2015: 859 (2015) - 2014
- [j2]Qi Cheng, Daqing Wan, Jincheng Zhuang:
Traps to the BGJT-algorithm for discrete logarithms. LMS J. Comput. Math. 17(Theory): 218-229 (2014) - 2013
- [j1]Qi Cheng, Jincheng Zhuang:
On certain computations of Pisot numbers. Inf. Process. Lett. 113(8): 271-275 (2013) - [c1]Qi Cheng, Jiyou Li, Jincheng Zhuang:
On Determining Deep Holes of Generalized Reed-Solomon Codes. ISAAC 2013: 100-110 - [i3]Qi Cheng, Jiyou Li, Jincheng Zhuang:
On Determining Deep Holes of Generalized Reed-Solomon Codes. CoRR abs/1309.3546 (2013) - [i2]Qi Cheng, Daqing Wan, Jincheng Zhuang:
Traps to the BGJT-Algorithm for Discrete Logarithms. CoRR abs/1310.5124 (2013) - [i1]Qi Cheng, Daqing Wan, Jincheng Zhuang:
Traps to the BGJT-Algorithm for Discrete Logarithms. IACR Cryptol. ePrint Arch. 2013: 673 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint