default search action
Jiageng Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j40]Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. Comput. J. 67(3): 864-874 (2024) - [j39]Zhifa Deng, Jiageng Chen, Shixiong Yao, Pei Li:
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting. Int. J. Appl. Cryptogr. 4(3/4): 176-194 (2024) - [j38]Jichao Xiong, Jiageng Chen, Junyu Lin, Dian Jiao, Hui Liu:
Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption. J. Inf. Secur. Appl. 86: 103887 (2024) - 2023
- [j37]Jixin Zhang, Jiageng Chen:
Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain. Comput. J. 66(4): 842-865 (2023) - [j36]Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng:
MLCT: A multi-level contact tracing scheme with strong privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j35]Pei Li, Wenqiang Zhu, Jiageng Chen, Shixiong Yao, Ching-Fang Hsu, Guangquan Xiong:
High-speed implementation of rainbow table method on heterogeneous multi-device architecture. Future Gener. Comput. Syst. 143: 293-304 (2023) - [j34]Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Editorial for special issue on security and trust on networked systems. Int. J. Netw. Manag. 33(3) (2023) - [j33]Shixiong Yao, Xingjian Tian, Jiageng Chen, Yi Xiong:
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard. Int. J. Netw. Manag. 33(3) (2023) - 2022
- [j32]Zhanwen Chen, Jiageng Chen, Weizhi Meng:
Threshold identity authentication signature: Impersonation prevention in social network services. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j31]Shixiong Yao, Pujie Jing, Pei Li, Jiageng Chen:
A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain. Connect. Sci. 34(1): 1654-1677 (2022) - [j30]Haoyang An, Jiageng Chen:
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain. IEICE Trans. Inf. Syst. 105-D(2): 235-247 (2022) - [j29]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework. J. Inf. Secur. Appl. 65: 103087 (2022) - [j28]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - 2021
- [j27]Ting Rong Lee, Je Sen Teh, Norziana Jamil, Jasy Liew Suet Yan, Jiageng Chen:
Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes. IEEE Access 9: 134052-134064 (2021) - [j26]Yan He, Jiageng Chen:
User location privacy protection mechanism for location-based services. Digit. Commun. Networks 7(2): 264-276 (2021) - [j25]Yidan Zhang, Jiageng Chen, Kaiming Chen, Ruoyan Xu, Jesen Teh, Shuai Zhang:
Network traffic identification of several open source secure proxy protocols. Int. J. Netw. Manag. 31(2) (2021) - [j24]Haoyang An, Jiageng Chen:
ElearnChain: A privacy-preserving consortium blockchain system for e-learning educational records. J. Inf. Secur. Appl. 63: 103013 (2021) - [j23]Kaiming Chen, Jiageng Chen, Jixin Zhang:
Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging. Sensors 21(4): 1058 (2021) - [j22]Pei Li, Shihao Zhou, Jiageng Chen:
A CPU-GPU-based parallel search algorithm for the best differential characteristics of block ciphers. J. Supercomput. 77(10): 11460-11480 (2021) - [j21]Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021) - 2020
- [j20]Je Sen Teh, Weijian Teng, Azman Samsudin, Jiageng Chen:
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators. Frontiers Comput. Sci. 14(6): 146405 (2020) - [j19]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j18]Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren:
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU. J. Inf. Secur. Appl. 55: 102565 (2020) - 2019
- [j17]Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. Comput. Secur. 80: 14-24 (2019) - [j16]Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang:
An efficient blind filter: Location privacy protection and the access control in FinTech. Future Gener. Comput. Syst. 100: 797-810 (2019) - [j15]Pei Li, Shihao Zhou, Bingqing Ren, Shuman Tang, Ting Li, Chang Xu, Jiageng Chen:
Efficient implementation of lightweight block ciphers on volta and pascal architecture. J. Inf. Secur. Appl. 47: 235-245 (2019) - [j14]Jiageng Chen, Chunhua Su, Zheng Yan:
AI-Driven Cyber Security Analytics and Privacy Protection. Secur. Commun. Networks 2019: 1859143:1-1859143:2 (2019) - [j13]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j12]Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen:
Security, Privacy, and Trust on Internet of Things. Wirel. Commun. Mob. Comput. 2019 (2019) - 2018
- [j11]Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. Future Gener. Comput. Syst. 79: 243-246 (2018) - [j10]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - 2017
- [j9]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Variable message encryption through blockcipher compression function. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j8]Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. J. Inf. Secur. Appl. 34: 205-206 (2017) - [j7]Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - 2016
- [j6]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 14-21 (2016) - 2015
- [j5]Jiageng Chen, Keita Emura, Atsuko Miyaji:
SKENO: Secret key encryption with non-interactive opening. J. Math. Cryptol. 9(2): 63-74 (2015) - [j4]Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An efficient batch verification system and its effect in a real time VANET environment. Secur. Commun. Networks 8(2): 298-310 (2015) - 2013
- [j3]Jiageng Chen, Atsuko Miyaji:
Novel strategies for searching RC4 key collisions. Comput. Math. Appl. 66(1): 81-90 (2013) - 2012
- [j2]Jiageng Chen, Atsuko Miyaji:
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(12): 2148-2159 (2012) - 2011
- [j1]Jiageng Chen, Atsuko Miyaji:
Generalized Analysis on Key Collisions of Stream Cipher RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(11): 2194-2206 (2011)
Conference and Workshop Papers
- 2024
- [c47]Xianlong Zhou, Pei Li, Jiageng Chen, Shixiong Yao:
Accelerating Stencil Computation with Fully Homomorphic Encryption Using GPU. Euro-Par (3) 2024: 212-224 - [c46]Kaiming Chen, Atsuko Miyaji, Jiageng Chen:
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption. ISPEC 2024: 168-185 - [c45]Mengsi Wu, Pei Li, Jiageng Chen, Shixiong Yao:
Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures. ISPEC 2024: 258-272 - [c44]Qiaosheng Chen, Jiageng Chen, Xiao Zhou, Gong Cheng:
Enhancing Dataset Search with Compact Data Snippets. SIGIR 2024: 1093-1103 - 2023
- [c43]Errui He, Tianyu Xu, Mengsi Wu, Jiageng Chen, Shixiong Yao, Pei Li:
A Survey of Algorithms for Addressing the Shortest Vector Problem (SVP). BlockTEA 2023: 57-76 - [c42]Zheng Chen, Zejun Lu, Jiageng Chen:
Cross-Chain Trusted Information Match Scheme with Privacy-Preserving and Auditability. BlockTEA 2023: 94-114 - [c41]Ke Zhang, Jiageng Chen, Zixian Huang, Gong Cheng:
Weight Matters: An Empirical Investigation of Distance Oracles on Knowledge Graphs. CIKM 2023: 4440-4444 - [c40]Yueyue He, Jiageng Chen, Koji Inoue:
CFChain: A Crowdfunding Platform that Supports Identity Authentication, Privacy Protection, and Efficient Audit. ICA3PP (7) 2023: 146-167 - [c39]Simin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen:
Constant-Size Group Signatures with Message-Dependent Opening from Lattices. ProvSec 2023: 166-185 - 2022
- [c38]Zhifa Deng, Jiageng Chen:
An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit. BlockTEA 2022: 69-88 - [c37]Zejun Lu, Jiageng Chen:
A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain. BlockTEA 2022: 89-105 - [c36]Pei Li, Liliu Tan, Shixiong Yao, Jiageng Chen:
Parallel Validity Analysis of the Boomerang Attack Model. EISA 2022: 68-86 - [c35]Jiaxin Deng, Simin Chen, Jiageng Chen, Weizhi Meng:
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography. EISA 2022: 87-107 - [c34]Zhexuan Hong, Jiageng Chen:
A Solution for the Offline Double-Spending Issue of Digital Currencies. SciSec 2022: 455-471 - 2021
- [c33]Haoyang An, Jiageng Chen:
ExamChain: A Privacy-Preserving Onscreen Marking System based on Consortium Blockchain. DSC 2021: 1-8 - [c32]Jixin Zhang, Jiageng Chen:
Practical and Provable Secure Vehicular Component Protection Scheme. EISA 2021: 1-20 - [c31]Yueyue He, Jiageng Chen:
AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger. EISA 2021: 50-67 - [c30]Jixin Zhang, Jiageng Chen, Weizhi Meng:
Efficient Attribute-Based Signature for Monotone Predicates. ProvSec 2021: 346-362 - 2020
- [c29]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm. ACISP 2020: 160-179 - [c28]Zhanwen Chen, Jiageng Chen, Weizhi Meng:
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing. DASC/PiCom/CBDCom/CyberSciTech 2020: 569-576 - [c27]Kaiming Chen, Jiageng Chen:
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree. ICICS 2020: 588-605 - [c26]Ruili Yang, Jiageng Chen, Shangle Li:
Secure and Traceable Attribute-Based Sequential Aggregate Signature. SpaCCS 2020: 367-381 - 2019
- [c25]Ju Xingzhong, Qingshui Xue, Haifeng Ma, Jiageng Chen, Zhu Haozhi:
The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment. ICCT 2019: 312-316 - [c24]Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang:
Cryptanalysis of Raindrop and FBC. NSS 2019: 536-551 - [c23]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. SocialSec 2019: 57-73 - 2018
- [c22]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c21]Yafei Li, Jiageng Chen, Anthony T. S. Ho:
Chatting Application Monitoring on Android System and its Detection based on the Correlation Test. APSIPA 2018: 1556-1563 - 2017
- [c20]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang:
Detection and classification of malicious patterns in network traffic using Benford's law. APSIPA 2017: 864-872 - [c19]Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han:
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). ISPEC 2017: 566-575 - 2016
- [c18]Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - [c17]Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - 2015
- [c16]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Inscrypt 2015: 108-124 - [c15]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji:
A Single Key Scheduling Based Compression Function. CRiSIS 2015: 207-222 - [c14]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. CSCloud 2015: 500-508 - [c13]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. NSS 2015: 345-356 - [c12]Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su:
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 17-24 - 2014
- [c11]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. ICISC 2014: 271-285 - [c10]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. ISPEC 2014: 373-387 - [c9]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. NSS 2014: 184-197 - [c8]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ProvSec 2014: 103-116 - 2013
- [c7]Jiageng Chen, Atsuko Miyaji:
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. CD-ARES Workshops 2013: 1-15 - [c6]Takanori Isobe, Yu Sasaki, Jiageng Chen:
Related-Key Boomerang Attacks on KATAN32/48/64. ACISP 2013: 268-285 - 2011
- [c5]Jiageng Chen, Keita Emura, Atsuko Miyaji:
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys. ICICS 2011: 57-68 - [c4]Jiageng Chen, Atsuko Miyaji:
How to Find Short RC4 Colliding Key Pairs. ISC 2011: 32-46 - 2010
- [c3]Jiageng Chen, Atsuko Miyaji:
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. Inscrypt 2010: 62-76 - [c2]Jiageng Chen, Atsuko Miyaji:
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. ISPEC 2010: 30-44 - [c1]Jiageng Chen, Atsuko Miyaji:
Generalized RC4 Key Collisions and Hash Collisions. SCN 2010: 73-87
Editorship
- 2025
- [e4]Zhe Xia, Jiageng Chen:
Information Security Practice and Experience - 19th International Conference, ISPEC 2024, Wuhan, China, October 25-27, 2024, Proceedings. Lecture Notes in Computer Science 15053, Springer 2025, ISBN 978-981-97-9052-4 [contents] - 2024
- [e3]Jiageng Chen, Zhe Xia:
Blockchain Technology and Emerging Applications - Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 577, Springer 2024, ISBN 978-3-031-60036-4 [contents] - 2022
- [e2]Jiageng Chen, Debiao He, Rongxing Lu:
Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings. Communications in Computer and Information Science 1641, Springer 2022, ISBN 978-3-031-23097-4 [contents] - 2016
- [e1]Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung:
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. Lecture Notes in Computer Science 9955, Springer 2016, ISBN 978-3-319-46297-4 [contents]
Informal and Other Publications
- 2020
- [i4]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
Optimized GPU Framework for Block Cipher Differential Search. IACR Cryptol. ePrint Arch. 2020: 1056 (2020) - [i3]Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen:
Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models. IACR Cryptol. ePrint Arch. 2020: 1235 (2020) - 2019
- [i2]Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen:
GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 1216 (2019) - 2014
- [i1]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm. IACR Cryptol. ePrint Arch. 2014: 272 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint