What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rongmao Chen
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs.
Rui Jiang
Cong Peng
Min Luo
Rongmao Chen
Debiao He
2025
journals/tifs
TLARDA: Threshold Label-Aggregating Remote Data Auditing in Decentralized Environment.
Kuan Liu
Jianting Ning
Pengfei Wu
Shengmin Xu
Rongmao Chen
2025
conf/sp
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning.
Zhen Sun
Tianshuo Cong
Yule Liu
Chenhao Lin
Xinlei He
Rongmao Chen
Xingshuo Han
Xinyi Huang
2025
conf/crypto
Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter.
Yijia Chang
Rongmao Chen
Chao Lin
Songze Li
Xinyi Huang
2025
conf/icics
Certificate-Based Quasi-linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing.
Jintao Cai
Futai Zhang
Wenjie Yang
Shao-Jun Yang
Yichi Huang
Rongmao Chen
Willy Susilo
2024
journals/istr
Post-quantum identity-based traitor tracing.
Zhichao Yang
Debiao He
Rongmao Chen
Shixiong Wang
Jianqiao Xu
2024
conf/acisp
An Efficient Hardware Implementation of Crystal-Dilithium on FPGA.
Zixuan Wu
Rongmao Chen
Yi Wang
Qiong Wang
Wei Peng
2024
conf/acisp
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Jialiu Cheng
Yi Wang
Rongmao Chen
Xinyi Huang
2024
conf/acns
Subversion-Resilient Signatures Without Random Oracles.
Pascal Bemmann
Sebastian Berndt
Rongmao Chen
2024
conf/provsec
Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.
Jiahao Liu
Rongmao Chen
Yi Wang
Xincheng Tang
Jinshu Su
2024
conf/esorics
Speedy Privacy-Preserving Skyline Queries on Outsourced Data.
Yu Chen
Lin Liu
Rongmao Chen
Shaojing Fu
Yuexiang Yang
Jiangyong Shi
Liangzhong He
2024
conf/pkc
Parameter-Hiding Order-Revealing Encryption Without Pairings.
Cong Peng
Rongmao Chen
Yi Wang
Debiao He
Xinyi Huang
2024
conf/asiacrypt
Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model.
Jinrong Chen
Yi Wang
Rongmao Chen
Xinyi Huang
Wei Peng
2023
conf/esorics
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing.
Shang Song
Lin Liu
Rongmao Chen
Wei Peng
Yi Wang
2023
conf/asiacrypt
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
Yi Wang
Rongmao Chen
Xinyi Huang
Moti Yung
2021
journals/compsec
Balancing anonymity and resilience in anonymous communication networks.
Yusheng Xia
Rongmao Chen
Jinshu Su
Hongcheng Zou
2021
journals/tifs
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
Yusheng Xia
Jinshu Su
Rongmao Chen
Xinyi Huang
2021
conf/crypto
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
Yi Wang
Rongmao Chen
Guomin Yang
Xinyi Huang
Baosheng Wang
Moti Yung
2021
conf/pkc
Subversion-Resilient Public Key Encryption with Practical Watchdogs.
Pascal Bemmann
Rongmao Chen
Tibor Jager
2021
conf/asiacrypt
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
Yi Wang
Rongmao Chen
Xinyi Huang
Jianting Ning
Baosheng Wang
Moti Yung
2020
journals/tifs
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
Lin Liu
Rongmao Chen
Ximeng Liu
Jinshu Su
Linbo Qiao
2020
conf/acisp
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition.
Jinrong Chen
Lin Liu
Rongmao Chen
Wei Peng
2020
conf/asiacrypt
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
Rongmao Chen
Xinyi Huang
Moti Yung
2018
conf/acisp
Asymmetric Subversion Attacks on Signature Schemes.
Chi Liu
Rongmao Chen
Yi Wang
Yongjun Wang
2018
conf/acisp
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Lin Liu
Jinshu Su
Rongmao Chen
Ximeng Liu
Xiaofeng Wang
Shuhui Chen
Ho-fung Leung
2017
conf/acisp
PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Hao Sun
Jinshu Su
Xiaofeng Wang
Rongmao Chen
Yujing Liu
Qiaolin Hu
2017
conf/crypto
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Fuchun Guo
Rongmao Chen
Willy Susilo
Jianchang Lai
Guomin Yang
Yi Mu
2016
journals/tifs
Server-Aided Public Key Encryption With Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xinyi Huang
Xiaofen Wang
Yongjun Wang
2016
journals/tifs
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
2016
journals/tifs
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
Xiaofen Wang
Yi Mu
Rongmao Chen
2016
conf/ccs
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Willy Susilo
Rongmao Chen
Fuchun Guo
Guomin Yang
Yi Mu
Yang-Wai Chow
2016
conf/acisp
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
Rongmao Chen
2016
conf/acisp
One-Round Strong Oblivious Signature-Based Envelope.
Rongmao Chen
Yi Mu
Willy Susilo
Guomin Yang
Fuchun Guo
Mingwu Zhang
2016
conf/provsec
Oblivious Keyword Search with Authorization.
Peng Jiang
Xiaofen Wang
Jianchang Lai
Fuchun Guo
Rongmao Chen
2016
conf/ctrsa
Strongly Leakage-Resilient Authenticated Key Exchange.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
2016
conf/asiacrypt
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Mingwu Zhang
2016
conf/asiacrypt
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Fuchun Guo
Willy Susilo
Yi Mu
Rongmao Chen
Jianchang Lai
Guomin Yang
2015
journals/tifs
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
2015
conf/acisp
A New General Framework for Secure Public Key Encryption with Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
Coauthors
Baosheng Wang
(2)
Chao Lin
(1)
Chenhao Lin
(1)
Chi Liu
(1)
Cong Peng
(2)
Debiao He
(3)
Fuchun Guo
(12)
Futai Zhang
(1)
Guomin Yang
(11)
Hao Sun
(1)
Ho-fung Leung
(1)
Hongcheng Zou
(1)
Jiahao Liu
(1)
Jialiu Cheng
(1)
Jianchang Lai
(4)
Jiangyong Shi
(1)
Jianqiao Xu
(1)
Jianting Ning
(2)
Jinrong Chen
(2)
Jinshu Su
(6)
Jintao Cai
(1)
Kuan Liu
(1)
Liangzhong He
(1)
Lin Liu
(5)
Linbo Qiao
(1)
Min Luo
(1)
Mingwu Zhang
(2)
Moti Yung
(4)
Pascal Bemmann
(2)
Peng Jiang
(1)
Pengfei Wu
(1)
Qiaolin Hu
(1)
Qiong Wang
(1)
Rongmao Chen
(39)
Rui Jiang
(1)
Sebastian Berndt
(1)
Shang Song
(1)
Shao-Jun Yang
(1)
Shaojing Fu
(1)
Shengmin Xu
(1)
Shixiong Wang
(1)
Shuhui Chen
(1)
Songze Li
(1)
Tianshuo Cong
(1)
Tibor Jager
(1)
Wei Peng
(1)
Wei Peng
(3)
Wenjie Yang
(1)
Willy Susilo
(8)
Xiaofen Wang
(5)
Xiaofeng Wang
(2)
Ximeng Liu
(2)
Xincheng Tang
(1)
Xingshuo Han
(1)
Xinlei He
(1)
Xinyi Huang
(1)
Xinyi Huang
(10)
Yang-Wai Chow
(1)
Yi Mu
(12)
Yi Wang
(9)
Yi Wang
(1)
Yichi Huang
(1)
Yijia Chang
(1)
Yongjun Wang
(2)
Yu Chen
(1)
Yuexiang Yang
(1)
Yujing Liu
(1)
Yule Liu
(1)
Yusheng Xia
(2)
Zhen Sun
(1)
Zhichao Yang
(1)
Zixuan Wu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to