Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren
J. Inf. Secur. Appl., vol. 55, 2020, p. 102565
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Zhanwen Chen, Jiageng Chen, Weizhi Meng
IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, IEEE, 2020, pp. 569--576
Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree
Kaiming Chen, Jiageng Chen
Lecture Notes in Computer Science, Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou, Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings, vol. 12282, Springer, 2020, pp. 588--605
Je Sen Teh, Weijian Teng, Azman Samsudin, Jiageng Chen
Frontiers Comput. Sci., vol. 14, 2020, p. 146405
Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models
Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen
{IACR} Cryptol. ePrint Arch., vol. 2020, 2020, p. 1235
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei{-}Zhu Yeoh, Je Sen Teh, Jiageng Chen
Lecture Notes in Computer Science, Joseph K. Liu, Hui Cui, Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, vol. 12248, Springer, 2020, pp. 160--179
Optimized GPU Framework for Block Cipher Differential Search
Wei Zhu Yeoh, Je Sen Teh, Jiageng Chen
IACR Cryptol. ePrint Arch., vol. 2020, 2020, p. 1056
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen
Int. J. Distributed Sens. Networks, vol. 16, 2020
AI-Driven Cyber Security Analytics and Privacy Protection
Jiageng Chen, Chunhua Su, Zheng Yan
Secur. Commun. Networks, vol. 2019, 2019, pp. 1859143:1--1859143:2
An efficient blind filter: Location privacy protection and the access control in FinTech
Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang
Future Gener. Comput. Syst., vol. 100, 2019, pp. 797--810
Cryptanalysis of Raindrop and FBC
Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang
Lecture Notes in Computer Science, Joseph K. Liu, Xinyi Huang, Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings, vol. 11928, Springer, 2019, pp. 536--551
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features
Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang
Communications in Computer and Information Science, Weizhi Meng, Steven Furnell, Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers, vol. 1095, Springer, 2019, pp. 57--73
Efficient implementation of lightweight block ciphers on volta and pascal architecture
Pei Li, Shihao Zhou, Bingqing Ren, Shuman Tang, Ting Li, Chang Xu, Jiageng Chen
J. Inf. Secur. Appl., vol. 47, 2019, pp. 235--245
GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers
Wei{-}Zhu Yeoh, Je Sen Teh, Jiageng Chen
{IACR} Cryptol. ePrint Arch., vol. 2019, 2019, p. 1216
Shixiong Yao, Jing Chen, Kun He, Ruiying Du, Tianqing Zhu, Xin Chen
IEEE Access, vol. 7, 2019, pp. 6117--6128
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation
Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen
Symmetry, vol. 11, 2019, p. 272
Security analysis and new models on the intelligent symmetric key encryption
Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James
Comput. Secur., vol. 80, 2019, pp. 14--24
Security, Privacy, and Trust on Internet of Things
Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen
Wirel. Commun. Mob. Comput., vol. 2019, 2019
Ju Xingzhong, Qingshui Xue, Haifeng Ma, Jiageng Chen, Zhu Haozhi
19th {IEEE} International Conference on Communication Technology, {ICCT} 2019, Xi'an, China, October 16-19, 2019, {IEEE}, 2019, pp. 312--316
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du
2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018, {IEEE}, 2018, pp. 2060--2068
Chatting Application Monitoring on Android System and its Detection based on the Correlation Test
Yafei Li, Jiageng Chen, Anthony T. S. Ho
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018, {IEEE}, 2018, pp. 1556--1563
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures
Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen
Sensors, vol. 18, 2018, p. 4056
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing
Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang
Lecture Notes in Computer Science, Willy Susilo, Guomin Yang, Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, vol. 10946, Springer, 2018, pp. 417--430
Special Issue on Advanced Persistent Threat
Jiageng Chen, Chunhua Su, Kuo{-}Hui Yeh, Moti Yung
Future Gener. Comput. Syst., vol. 79, 2018, pp. 243--246
Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
Lecture Notes in Computer Science, Joseph K. Liu, Pierangela Samarati, Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, vol. 10701, Springer, 2017, pp. 566--575
Checks and balances: A tripartite public key infrastructure for secure web-based connections
Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue
2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017, IEEE, 2017, pp. 1--9
Detection and classification of malicious patterns in network traffic using Benford's law
Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang
2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2017, Kuala Lumpur, Malaysia, December 12-15, 2017, {IEEE}, 2017, pp. 864--872
Special issue on Secure Computation on Encrypted Data
Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia
J. Inf. Secur. Appl., vol. 34, 2017, pp. 205--206
Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang
{IEEE} Trans. Computers, vol. 66, 2017, pp. 1763--1777
Variable message encryption through blockcipher compression function
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
Concurr. Comput. Pract. Exp., vol. 29, 2017
Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci., 99-A, 2016, pp. 14--21
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data
Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu
Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang, Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, {ACM}, 2016, pp. 83--94
Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang
Lecture Notes in Computer Science, Joseph K. Liu, Ron Steinfeld, Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}, vol. 9723, Springer, 2016, pp. 333--346
Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
Lecture Notes in Computer Science, 2016
Accurate Estimation of the Full Differential Distribution for General Feistel Structures
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh
Lecture Notes in Computer Science, Dongdai Lin, XiaoFeng Wang, Moti Yung, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers, vol. 9589, Springer, 2015, pp. 108--124
An efficient batch verification system and its effect in a real time VANET environment
Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji
Secur. Commun. Networks, vol. 8, 2015, pp. 298--310
A New Statistical Approach for Integral Attack
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao
Lecture Notes in Computer Science, Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang, Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings, vol. 9408, Springer, 2015, pp. 345--356
A Single Key Scheduling Based Compression Function
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji
Lecture Notes in Computer Science, Costas Lambrinoudakis, Alban Gabillon, Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, vol. 9572, Springer, 2015, pp. 207--222
Improved Differential Characteristic Searching Methods
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh
IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, IEEE Computer Society, 2015, pp. 500--508
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su
2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, {IEEE}, 2015, pp. 17--24
SKENO: Secret key encryption with non-interactive opening
Jiageng Chen, Keita Emura, Atsuko Miyaji
J. Math. Cryptol., vol. 9, 2015, pp. 63--74
Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
Lecture Notes in Computer Science, Jooyoung Lee, Jongsung Kim, Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers, vol. 8949, Springer, 2014, pp. 271--285
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
Jiageng Chen, Atsuko Miyaji, Chunhua Su
Lecture Notes in Computer Science, Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu{-}Ming Yiu, Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, vol. 8782, Springer, 2014, pp. 103--116
A Survey of Security Network Coding toward Various Attacks
Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, IEEE Computer Society, 2014, pp. 252--259
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database
Jiageng Chen, Atsuko Miyaji, Chunhua Su
Lecture Notes in Computer Science, Xinyi Huang, Jianying Zhou, Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings, vol. 8434, Springer, 2014, pp. 373--387
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
IACR Cryptol. ePrint Arch., vol. 2014, 2014, p. 272
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
Lecture Notes in Computer Science, Man Ho Au, Barbara Carminati, C.{-}C. Jay Kuo, Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings, vol. 8792, Springer, 2014, pp. 184--197
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu, Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings, vol. 8128, Springer, 2013, pp. 1--15
Novel strategies for searching RC4 key collisions
Jiageng Chen, Atsuko Miyaji
Comput. Math. Appl., vol. 66, 2013, pp. 81--90
Related-Key Boomerang Attacks on KATAN32/48/64
Takanori Isobe, Yu Sasaki, Jiageng Chen
Lecture Notes in Computer Science, Colin Boyd, Leonie Simpson, Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, vol. 7959, Springer, 2013, pp. 268--285
Secure Routing Based on Network Coding in Wireless Sensor Networks
Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, IEEE Computer Society, 2013, pp. 58--64
Jiageng Chen, Atsuko Miyaji
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A, 2012, pp. 2148--2159
Generalized Analysis on Key Collisions of Stream Cipher RC4
Jiageng Chen, Atsuko Miyaji
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A, 2011, pp. 2194--2206
How to Find Short RC4 Colliding Key Pairs
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Xuejia Lai, Jianying Zhou, Hui Li, Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, vol. 7001, Springer, 2011, pp. 32--46
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
Jiageng Chen, Keita Emura, Atsuko Miyaji
Lecture Notes in Computer Science, Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu, Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings, vol. 7043, Springer, 2011, pp. 57--68
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang, Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings, vol. 6047, Springer, 2010, pp. 30--44
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Xuejia Lai, Moti Yung, Dongdai Lin, Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, vol. 6584, Springer, 2010, pp. 62--76
Generalized RC4 Key Collisions and Hash Collisions
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science, Juan A. Garay, Roberto De Prisco, Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, vol. 6280, Springer, 2010, pp. 73--87