What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Haibin Zhang
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Sensor attack online classification for UAVs using machine learning.
Xiaomin Wei
Yizhen Xu
Haibin Zhang
Cong Sun
Xinghua Li
Fenghua Huang
Jianfeng Ma
2025
journals/tifs
Efficient Byzantine Broadcast From Succinct Erasure Coding Proof System.
Nicolas Alhaddad
Sisi Duan
Mayank Varia
Haochen Wang
Haibin Zhang
2025
journals/tifs
Controllable Access Control in Permissioned Blockchains via Controllable Threshold Proxy Re-Encryption.
Wenzhong Li
Zhaoyang Xie
Shengli Liu
Yunxiao Zhou
Haibin Zhang
2025
conf/uss
Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus.
Rujia Li
Jingyuan Ding
Qin Wang
Keting Jia
Haibin Zhang
Sisi Duan
2024
journals/tifs
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT Replication.
Xiao Sui
Sisi Duan
Haibin Zhang
2024
conf/ccs
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Chenglu Jin
Chao Yin
Marten van Dijk
Sisi Duan
Fabio Massacci
Michael K. Reiter
Haibin Zhang
2024
conf/acisp
Enhancing Permissioned Blockchains with Controlled Data Authorization.
Qichang Liu
Xufeng Zhang
Sisi Duan
Haibin Zhang
2023
journals/tifs
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
Lefeng Zhang
Tianqing Zhu
Haibin Zhang
Ping Xiong
Wanlei Zhou
2023
conf/ccs
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time.
Sisi Duan
Xin Wang
Haibin Zhang
2023
conf/uss
WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Haibin Zhang
Sisi Duan
Boxin Zhao
Liehuang Zhu
2023
conf/dsn
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
Haibin Zhang
Sisi Duan
Chao Liu
Boxin Zhao
Xuanji Meng
Shengli Liu
Yong Yu
Fangguo Zhang
Liehuang Zhu
2023
conf/asiacrypt
Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE.
Yunxiao Zhou
Shengli Liu
Shuai Han
Haibin Zhang
2022
journals/tifs
Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System.
Guohou Shan
Boxin Zhao
James R. Clavin
Haibin Zhang
Sisi Duan
2022
conf/ccs
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement.
Haibin Zhang
Sisi Duan
2022
conf/sp
Foundations of Dynamic BFT.
Sisi Duan
Haibin Zhang
2022
conf/ccsw-ws
Byzantine Fault Tolerance in the Age of Blockchains and Cloud Computing.
Haibin Zhang
2022
conf/dsn
Marlin: Two-Phase BFT with Linearity.
Xiao Sui
Sisi Duan
Haibin Zhang
2021
conf/fc
High-Threshold AVSS with Optimal Communication Complexity.
Nicolas Alhaddad
Mayank Varia
Haibin Zhang
2020
conf/dsn
EPIC: Efficient Asynchronous BFT with Adaptive Security.
Chao Liu
Sisi Duan
Haibin Zhang
2018
conf/ccs
BEAT: Asynchronous BFT Made Practical.
Sisi Duan
Michael K. Reiter
Haibin Zhang
2017
conf/fc
Real Hidden Identity-Based Signatures.
Sherman S. M. Chow
Haibin Zhang
Tao Zhang
2017
conf/dsn
Secure Causal Atomic Broadcast, Revisited.
Sisi Duan
Michael K. Reiter
Haibin Zhang
2015
conf/sacrypt
Bit Security of the CDH Problems over Finite Fields.
Mingqiang Wang
Tao Zhan
Haibin Zhang
2014
conf/ctrsa
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications.
Sherman S. M. Chow
Matthew K. Franklin
Haibin Zhang
2013
conf/fc
Unique Ring Signatures: A Practical Construction.
Matthew K. Franklin
Haibin Zhang
2012
conf/fse
The Security of Ciphertext Stealing.
Phillip Rogaway
Mark Wooding
Haibin Zhang
2012
conf/acns
Length-Doubling Ciphers and Tweakable Ciphers.
Haibin Zhang
2012
conf/esorics
Unique Group Signatures.
Matthew K. Franklin
Haibin Zhang
2011
conf/ctrsa
Online Ciphers from Tweakable Blockciphers.
Phillip Rogaway
Haibin Zhang
Coauthors
Boxin Zhao
(3)
Chao Liu
(2)
Chao Yin
(1)
Chenglu Jin
(1)
Cong Sun
(1)
Fabio Massacci
(1)
Fangguo Zhang
(1)
Fenghua Huang
(1)
Guohou Shan
(1)
Haibin Zhang
(29)
Haochen Wang
(1)
James R. Clavin
(1)
Jianfeng Ma
(1)
Jingyuan Ding
(1)
Keting Jia
(1)
Lefeng Zhang
(1)
Liehuang Zhu
(2)
Mark Wooding
(1)
Marten van Dijk
(1)
Matthew K. Franklin
(3)
Mayank Varia
(2)
Michael K. Reiter
(3)
Mingqiang Wang
(1)
Nicolas Alhaddad
(2)
Phillip Rogaway
(2)
Ping Xiong
(1)
Qichang Liu
(1)
Qin Wang
(1)
Rujia Li
(1)
Shengli Liu
(3)
Sherman S. M. Chow
(2)
Shuai Han
(1)
Sisi Duan
(15)
Tao Zhan
(1)
Tao Zhang
(1)
Tianqing Zhu
(1)
Wanlei Zhou
(1)
Wenzhong Li
(1)
Xiao Sui
(2)
Xiaomin Wei
(1)
Xin Wang
(1)
Xinghua Li
(1)
Xuanji Meng
(1)
Xufeng Zhang
(1)
Yizhen Xu
(1)
Yong Yu
(1)
Yunxiao Zhou
(2)
Zhaoyang Xie
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to