What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kefei Chen
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage.
Changsong Jiang
Chunxiang Xu
Xinfeng Dong
Kefei Chen
Guomin Yang
2024
journals/tifs
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates.
Changsong Jiang
Chunxiang Xu
Yunxia Han
Zhao Zhang
Kefei Chen
2023
journals/istr
GAIN: Decentralized Privacy-Preserving Federated Learning.
Changsong Jiang
Chunxiang Xu
Chenchen Cao
Kefei Chen
2023
journals/istr
ttPAKE: Typo tolerance password-authenticated key exchange.
Yunxia Han
Chunxiang Xu
Shanshan Li
Changsong Jiang
Kefei Chen
2022
journals/istr
A sanitizable signcryption scheme with public verifiability via chameleon hash function.
Shuang Hu
Renjun Zhang
Fuqun Wang
Kefei Chen
Bin Lian
Gongliang Chen
2021
journals/tifs
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
Shiyu Li
Yuan Zhang
Chunxiang Xu
Kefei Chen
2021
journals/tifs
Security Analysis of a Path Validation Scheme With Constant-Size Proof.
Yangyang Wu
Changsong Jiang
Chunxiang Xu
Kefei Chen
2020
journals/tifs
On the Security of a Key Agreement and Key Protection Scheme.
Yunxia Han
Chunxiang Xu
Debiao He
Kefei Chen
2019
journals/istr
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy.
Jining Zhao
Chunxiang Xu
Kefei Chen
2018
conf/acisp
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Ziyuan Hu
Shengli Liu
Kefei Chen
Joseph K. Liu
2017
journals/tifs
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
Qi Xie
Duncan S. Wong
Guilin Wang
Xiao Tan
Kefei Chen
Liming Fang
2016
conf/ccs
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Shuai Han
Shengli Liu
Fangguo Zhang
Kefei Chen
2015
conf/acns
Non-malleability Under Selective Opening Attacks: Implication and Separation.
Zhengan Huang
Shengli Liu
Xianping Mao
Kefei Chen
2015
conf/pkc
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Baodong Qin
Shengli Liu
Tsz Hon Yuen
Robert H. Deng
Kefei Chen
2013
conf/ccs
Expressive search on encrypted data.
Junzuo Lai
Xuhua Zhou
Robert Huijie Deng
Yingjiu Li
Kefei Chen
2013
conf/ccs
Leakage-resilient lossy trapdoor functions and public-key encryption.
Baodong Qin
Shengli Liu
Kefei Chen
Manuel Charlemagne
2012
conf/acisp
A Generic Construction of Accountable Decryption and Its Applications.
Xuhua Zhou
Xuhua Ding
Kefei Chen
2012
conf/iwsec
Annihilators of Fast Discrete Fourier Spectra Attacks.
Jingjing Wang
Kefei Chen
Shixiong Zhu
2012
conf/africacrypt
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Jingjing Wang
Xiangxue Li
Kefei Chen
Wenzheng Zhang
2008
conf/provsec
A Tamper-Evident Voting Machine Resistant to Covert Channels.
Wei Han
Tao Hao
Dong Zheng
Kefei Chen
Xiaofeng Chen
2008
conf/ctrsa
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Jian Weng
Shengli Liu
Kefei Chen
Dong Zheng
Weidong Qiu
2008
conf/cans
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Robert H. Deng
Jian Weng
Shengli Liu
Kefei Chen
2005
journals/compsec
Improvements on the WTLS protocol to avoid denial of service attacks.
Ruishan Zhang
Kefei Chen
2005
conf/icics
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Wei Wei
Xuhua Ding
Kefei Chen
2005
conf/cans
Efficient Identity-Based Signatures and Blind Signatures.
Zhenjie Huang
Kefei Chen
Yumin Wang
2003
journals/compsec
Attacks on the (enhanced) Yang-Shieh authentication.
Kefei Chen
Sheng Zhong
2003
conf/acisp
A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Libin Wang
Kefei Chen
Coauthors
Baodong Qin
(2)
Bin Lian
(1)
Changsong Jiang
(5)
Chenchen Cao
(1)
Chunxiang Xu
(8)
Debiao He
(1)
Dong Zheng
(2)
Duncan S. Wong
(1)
Fangguo Zhang
(1)
Fuqun Wang
(1)
Gongliang Chen
(1)
Guilin Wang
(1)
Guomin Yang
(1)
Jian Weng
(2)
Jingjing Wang
(2)
Jining Zhao
(1)
Joseph K. Liu
(1)
Junzuo Lai
(1)
Kefei Chen
(27)
Libin Wang
(1)
Liming Fang
(1)
Manuel Charlemagne
(1)
Qi Xie
(1)
Renjun Zhang
(1)
Robert H. Deng
(2)
Robert Huijie Deng
(1)
Ruishan Zhang
(1)
Shanshan Li
(1)
Sheng Zhong
(1)
Shengli Liu
(7)
Shixiong Zhu
(1)
Shiyu Li
(1)
Shuai Han
(1)
Shuang Hu
(1)
Tao Hao
(1)
Tsz Hon Yuen
(1)
Wei Han
(1)
Wei Wei
(1)
Weidong Qiu
(1)
Wenzheng Zhang
(1)
Xiangxue Li
(1)
Xianping Mao
(1)
Xiao Tan
(1)
Xiaofeng Chen
(1)
Xinfeng Dong
(1)
Xuhua Ding
(2)
Xuhua Zhou
(2)
Yangyang Wu
(1)
Yingjiu Li
(1)
Yuan Zhang
(1)
Yumin Wang
(1)
Yunxia Han
(3)
Zhao Zhang
(1)
Zhengan Huang
(1)
Zhenjie Huang
(1)
Ziyuan Hu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to