What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Long Chen
Google Scholar
ORCID:
0000-0003-3183-158X
12
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Proofs of Retrievability With Public Verifiability From Lattices.
Miaomiao Tian
Chuang Gao
Long Chen
Hong Zhong
Jie Chen
2023
journals/tifs
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability.
Guofeng Tang
Bo Pang
Long Chen
Zhenfeng Zhang
2023
conf/pkc
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Giuseppe Ateniese
Long Chen
Danilo Francati
Dimitrios Papadopoulos
Qiang Tang
2023
conf/asiacrypt
Efficient Secure Storage with Version Control and Key Rotation.
Long Chen
Hui Guo
Ya-Nan Li
Qiang Tang
2022
conf/uss
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Long Chen
Ya-Nan Li
Qiang Tang
Moti Yung
2020
conf/acisp
Multi-input Laconic Function Evaluation.
Bo Pang
Long Chen
Xiong Fan
Qiang Tang
2020
conf/ndss
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Giuseppe Ateniese
Long Chen
Mohammad Etemad
Qiang Tang
2020
conf/asiacrypt
CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Long Chen
Yanan Li
Qiang Tang
2018
conf/crypto
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Haodong Jiang
Zhenfeng Zhang
Long Chen
Hong Wang
Zhi Ma
2018
conf/asiacrypt
On the Hardness of the Computational Ring-LWR Problem and Its Applications.
Long Chen
Zhenfeng Zhang
Zhenfei Zhang
2017
conf/provsec
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Long Chen
Zhenfeng Zhang
2017
conf/tcc
Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension.
Long Chen
Zhenfeng Zhang
Xueqing Wang
Coauthors
Bo Pang
(2)
Chuang Gao
(1)
Danilo Francati
(1)
Dimitrios Papadopoulos
(1)
Giuseppe Ateniese
(2)
Guofeng Tang
(1)
Haodong Jiang
(1)
Hong Wang
(1)
Hong Zhong
(1)
Hui Guo
(1)
Jie Chen
(1)
Long Chen
(12)
Miaomiao Tian
(1)
Mohammad Etemad
(1)
Moti Yung
(1)
Qiang Tang
(6)
Xiong Fan
(1)
Xueqing Wang
(1)
Ya-Nan Li
(2)
Yanan Li
(1)
Zhenfei Zhang
(1)
Zhenfeng Zhang
(5)
Zhi Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to