What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lu Zhou
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
VeloFHE: GPU Acceleration for FHEW and TFHE Bootstrapping.
Shiyu Shen
Hao Yang
Zhe Liu
Ying Liu
Xianhui Lu
Wangchen Dai
Lu Zhou
Yunlei Zhao
Ray C. C. Cheung
2025
journals/tifs
Efficient and Privacy-Preserving Feature Selection Based on Multiparty Computation.
Luyao Wang
Hao Guo
Weibin Wu
Lu Zhou
2025
conf/acisp
FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory.
Haocheng Ye
Lu Zhou
Hao Wang
Chunpeng Ge
2025
conf/icics
No Place to Hide: An Efficient and Accurate Backdoor Detection Tool for Ethereum ERC-20 Smart Contracts.
Shouchen Zhou
Lu Zhou
Yu Tao
2024
journals/tifs
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
Hao Wang
Yichen Cai
Jun Wang
Chuan Ma
Chunpeng Ge
Xiangmou Qu
Lu Zhou
2024
journals/tifs
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
Zhusen Liu
Weizheng Wang
Yutong Ye
Nan Min
Zhenfu Cao
Lu Zhou
Zhe Liu
2024
journals/tifs
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices.
Junhao Huang
Haosong Zhao
Jipeng Zhang
Wangchen Dai
Lu Zhou
Ray C. C. Cheung
Çetin Kaya Koç
Donglong Chen
2023
journals/tifs
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
Weibin Wu
Jun Wang
Yangpan Zhang
Zhe Liu
Lu Zhou
Xiaodong Lin
2023
conf/icics
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV.
Jiacheng Luo
Xuhao Li
Hao Wang
Dongwan Lan
Xiaofei Wu
Lu Zhou
Liming Fang
2022
conf/acisp
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Xiaofei Wu
Hao Wang
Chunpeng Ge
Lu Zhou
Qiong Huang
Lanju Kong
Lizhen Cui
Zhe Liu
2021
conf/provsec
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Zhongming Wang
Biwen Chen
Tao Xiang
Lu Zhou
Yan-Hong Liu
Jin Li
2020
journals/compsec
DO-RA: Data-oriented runtime attestation for IoT devices.
Boyu Kuang
Anmin Fu
Lu Zhou
Willy Susilo
Yuqing Zhang
2020
journals/istr
CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
Cong Peng
Jianhua Chen
Lu Zhou
Kim-Kwang Raymond Choo
Debiao He
2019
journals/compsec
Security analysis and new models on the intelligent symmetric key encryption.
Lu Zhou
Jiageng Chen
Yidan Zhang
Chunhua Su
Marino Anthony James
2016
conf/wisa
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Hwajeong Seo
Taehwan Park
Shinwook Heo
Gyuwon Seo
Bongjin Bae
Lu Zhou
Howon Kim
2016
conf/wisa
Parallel Implementations of LEA, Revisited.
Hwajeong Seo
Taehwan Park
Shinwook Heo
Gyuwon Seo
Bongjin Bae
Zhi Hu
Lu Zhou
Yasuyuki Nogami
Youwen Zhu
Howon Kim
2015
conf/icisc
Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Hwajeong Seo
Zhe Liu
Yasuyuki Nogami
Taehwan Park
Jongseok Choi
Lu Zhou
Howon Kim
Coauthors
Anmin Fu
(1)
Biwen Chen
(1)
Bongjin Bae
(2)
Boyu Kuang
(1)
Çetin Kaya Koç
(1)
Chuan Ma
(1)
Chunhua Su
(1)
Chunpeng Ge
(3)
Cong Peng
(1)
Debiao He
(1)
Donglong Chen
(1)
Dongwan Lan
(1)
Gyuwon Seo
(2)
Hao Guo
(1)
Hao Wang
(1)
Hao Wang
(2)
Hao Wang
(1)
Hao Yang
(1)
Haocheng Ye
(1)
Haosong Zhao
(1)
Howon Kim
(3)
Hwajeong Seo
(3)
Jiacheng Luo
(1)
Jiageng Chen
(1)
Jianhua Chen
(1)
Jin Li
(1)
Jipeng Zhang
(1)
Jongseok Choi
(1)
Jun Wang
(2)
Junhao Huang
(1)
Kim-Kwang Raymond Choo
(1)
Lanju Kong
(1)
Liming Fang
(1)
Lizhen Cui
(1)
Lu Zhou
(17)
Luyao Wang
(1)
Marino Anthony James
(1)
Nan Min
(1)
Qiong Huang
(1)
Ray C. C. Cheung
(2)
Shinwook Heo
(2)
Shiyu Shen
(1)
Shouchen Zhou
(1)
Taehwan Park
(3)
Tao Xiang
(1)
Wangchen Dai
(2)
Weibin Wu
(2)
Weizheng Wang
(1)
Willy Susilo
(1)
Xiangmou Qu
(1)
Xianhui Lu
(1)
Xiaodong Lin
(1)
Xiaofei Wu
(2)
Xuhao Li
(1)
Yan-Hong Liu
(1)
Yangpan Zhang
(1)
Yasuyuki Nogami
(2)
Yichen Cai
(1)
Yidan Zhang
(1)
Ying Liu
(1)
Youwen Zhu
(1)
Yu Tao
(1)
Yunlei Zhao
(1)
Yuqing Zhang
(1)
Yutong Ye
(1)
Zhe Liu
(5)
Zhenfu Cao
(1)
Zhi Hu
(1)
Zhongming Wang
(1)
Zhusen Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to