陈嘉耕

华中师范大学


Curriculum vitae


[email protected]


QQ: 939288955


计算机学院

伍伦贡联合研究院

湖北省武汉市洪山区珞喻路152号华中师范大学


Publications


Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU


Zhanwen Chen, Jiageng Chen, Weizhi Meng, Je Sen Teh, Pei Li, Bingqing Ren

J. Inf. Secur. Appl., vol. 55, 2020, p. 102565


A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing


Zhanwen Chen, Jiageng Chen, Weizhi Meng

IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, IEEE, 2020, pp. 569--576


Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree


Kaiming Chen, Jiageng Chen

Lecture Notes in Computer Science, Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou, Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings, vol. 12282, Springer, 2020, pp. 588--605


A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators


Je Sen Teh, Weijian Teng, Azman Samsudin, Jiageng Chen

Frontiers Comput. Sci., vol. 14, 2020, p. 146405


Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models


Ting Rong Lee, Je Sen Teh, Jasy Suet Yan Liew, Norziana Jamil, Jiageng Chen

{IACR} Cryptol. ePrint Arch., vol. 2020, 2020, p. 1235


Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm


Wei{-}Zhu Yeoh, Je Sen Teh, Jiageng Chen

Lecture Notes in Computer Science, Joseph K. Liu, Hui Cui, Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, vol. 12248, Springer, 2020, pp. 160--179


Optimized GPU Framework for Block Cipher Differential Search


Wei Zhu Yeoh, Je Sen Teh, Jiageng Chen

IACR Cryptol. ePrint Arch., vol. 2020, 2020, p. 1056


Post quantum proxy signature scheme based on the multivariate public key cryptographic signature


Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

Int. J. Distributed Sens. Networks, vol. 16, 2020


AI-Driven Cyber Security Analytics and Privacy Protection


Jiageng Chen, Chunhua Su, Zheng Yan

Secur. Commun. Networks, vol. 2019, 2019, pp. 1859143:1--1859143:2


An efficient blind filter: Location privacy protection and the access control in FinTech


Zhidan Li, Wenmin Li, Qiaoyan Wen, Jiageng Chen, Wei Yin, Kaitai Liang

Future Gener. Comput. Syst., vol. 100, 2019, pp. 797--810


Cryptanalysis of Raindrop and FBC


Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang

Lecture Notes in Computer Science, Joseph K. Liu, Xinyi Huang, Network and System Security - 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings, vol. 11928, Springer, 2019, pp. 536--551


Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features


Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang

Communications in Computer and Information Science, Weizhi Meng, Steven Furnell, Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers, vol. 1095, Springer, 2019, pp. 57--73


Efficient implementation of lightweight block ciphers on volta and pascal architecture


Pei Li, Shihao Zhou, Bingqing Ren, Shuman Tang, Ting Li, Chang Xu, Jiageng Chen

J. Inf. Secur. Appl., vol. 47, 2019, pp. 235--245


GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers


Wei{-}Zhu Yeoh, Je Sen Teh, Jiageng Chen

{IACR} Cryptol. ePrint Arch., vol. 2019, 2019, p. 1216


PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management


Shixiong Yao, Jing Chen, Kun He, Ruiying Du, Tianqing Zhu, Xin Chen

IEEE Access, vol. 7, 2019, pp. 6117--6128


Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation


Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen

Symmetry, vol. 11, 2019, p. 272


Security analysis and new models on the intelligent symmetric key encryption


Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James

Comput. Secur., vol. 80, 2019, pp. 14--24


Security, Privacy, and Trust on Internet of Things


Constantinos Kolias, Weizhi Meng, Georgios Kambourakis, Jiageng Chen

Wirel. Commun. Mob. Comput., vol. 2019, 2019


The Research on Identity Authentication Scheme of Internet of Things Equipment in 5G Network Environment


Ju Xingzhong, Qingshui Xue, Haifeng Ma, Jiageng Chen, Zhu Haozhi

19th {IEEE} International Conference on Communication Technology, {ICCT} 2019, Xi'an, China, October 16-19, 2019, {IEEE}, 2019, pp. 312--316


CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections


Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du

2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018, {IEEE}, 2018, pp. 2060--2068


Chatting Application Monitoring on Android System and its Detection based on the Correlation Test


Yafei Li, Jiageng Chen, Anthony T. S. Ho

Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018, {IEEE}, 2018, pp. 1556--1563


Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures


Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen

Sensors, vol. 18, 2018, p. 4056


Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing


Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang

Lecture Notes in Computer Science, Willy Susilo, Guomin Yang, Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, vol. 10946, Springer, 2018, pp. 417--430


Special Issue on Advanced Persistent Threat


Jiageng Chen, Chunhua Su, Kuo{-}Hui Yeh, Moti Yung

Future Gener. Comput. Syst., vol. 79, 2018, pp. 243--246


Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)


Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han

Lecture Notes in Computer Science, Joseph K. Liu, Pierangela Samarati, Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings, vol. 10701, Springer, 2017, pp. 566--575


Checks and balances: A tripartite public key infrastructure for secure web-based connections


Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue

2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017, IEEE, 2017, pp. 1--9


Detection and classification of malicious patterns in network traffic using Benford's law


Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Xuzhe Huang, Yidan Zhang

2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2017, Kuala Lumpur, Malaysia, December 12-15, 2017, {IEEE}, 2017, pp. 864--872


Special issue on Secure Computation on Encrypted Data


Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia

J. Inf. Secur. Appl., vol. 34, 2017, pp. 205--206


Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks


Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang

{IEEE} Trans. Computers, vol. 66, 2017, pp. 1763--1777


Variable message encryption through blockcipher compression function


Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su

Concurr. Comput. Pract. Exp., vol. 29, 2017


A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256


Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji

{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci., 99-A, 2016, pp. 14--21


Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data


Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu

Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang, Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, {ACM}, 2016, pp. 83--94


Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework


Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang

Lecture Notes in Computer Science, Joseph K. Liu, Ron Steinfeld, Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}, vol. 9723, Springer, 2016, pp. 333--346


Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings


Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung

Lecture Notes in Computer Science, 2016


Accurate Estimation of the Full Differential Distribution for General Feistel Structures


Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh

Lecture Notes in Computer Science, Dongdai Lin, XiaoFeng Wang, Moti Yung, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers, vol. 9589, Springer, 2015, pp. 108--124


An efficient batch verification system and its effect in a real time VANET environment


Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji

Secur. Commun. Networks, vol. 8, 2015, pp. 298--310


A New Statistical Approach for Integral Attack


Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao

Lecture Notes in Computer Science, Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang, Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings, vol. 9408, Springer, 2015, pp. 345--356


A Single Key Scheduling Based Compression Function


Jiageng Chen, Rashed Mazumder, Atsuko Miyaji

Lecture Notes in Computer Science, Costas Lambrinoudakis, Alban Gabillon, Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers, vol. 9572, Springer, 2015, pp. 207--222


Improved Differential Characteristic Searching Methods


Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh

IEEE 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015, IEEE Computer Society, 2015, pp. 500--508


Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags


Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su

2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, {IEEE}, 2015, pp. 17--24


SKENO: Secret key encryption with non-interactive opening


Jiageng Chen, Keita Emura, Atsuko Miyaji

J. Math. Cryptol., vol. 9, 2015, pp. 63--74


A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256


Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji

Lecture Notes in Computer Science, Jooyoung Lee, Jongsung Kim, Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers, vol. 8949, Springer, 2014, pp. 271--285


A Provable Secure Batch Authentication Scheme for EPCGen2 Tags


Jiageng Chen, Atsuko Miyaji, Chunhua Su

Lecture Notes in Computer Science, Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu{-}Ming Yiu, Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, vol. 8782, Springer, 2014, pp. 103--116


A Survey of Security Network Coding toward Various Attacks


Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang

13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, IEEE Computer Society, 2014, pp. 252--259


Distributed Pseudo-Random Number Generation and Its Application to Cloud Database


Jiageng Chen, Atsuko Miyaji, Chunhua Su

Lecture Notes in Computer Science, Xinyi Huang, Jianying Zhou, Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings, vol. 8434, Springer, 2014, pp. 373--387


Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm


Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su

IACR Cryptol. ePrint Arch., vol. 2014, 2014, p. 272


Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock


Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su

Lecture Notes in Computer Science, Man Ho Au, Barbara Carminati, C.{-}C. Jay Kuo, Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings, vol. 8792, Springer, 2014, pp. 184--197


Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock


Jiageng Chen, Atsuko Miyaji

Lecture Notes in Computer Science, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu, Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings, vol. 8128, Springer, 2013, pp. 1--15


Novel strategies for searching RC4 key collisions


Jiageng Chen, Atsuko Miyaji

Comput. Math. Appl., vol. 66, 2013, pp. 81--90


Related-Key Boomerang Attacks on KATAN32/48/64


Takanori Isobe, Yu Sasaki, Jiageng Chen

Lecture Notes in Computer Science, Colin Boyd, Leonie Simpson, Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, vol. 7959, Springer, 2013, pp. 268--285


Secure Routing Based on Network Coding in Wireless Sensor Networks


Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao

12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, IEEE Computer Society, 2013, pp. 58--64


Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack


Jiageng Chen, Atsuko Miyaji

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A, 2012, pp. 2148--2159


Generalized Analysis on Key Collisions of Stream Cipher RC4


Jiageng Chen, Atsuko Miyaji

IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A, 2011, pp. 2194--2206


How to Find Short RC4 Colliding Key Pairs


Jiageng Chen, Atsuko Miyaji

Lecture Notes in Computer Science, Xuejia Lai, Jianying Zhou, Hui Li, Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, vol. 7001, Springer, 2011, pp. 32--46


Non-interactive Opening for Ciphertexts Encrypted by Shared Keys


Jiageng Chen, Keita Emura, Atsuko Miyaji

Lecture Notes in Computer Science, Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu, Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings, vol. 7043, Springer, 2011, pp. 57--68


A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance


Jiageng Chen, Atsuko Miyaji

Lecture Notes in Computer Science, Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang, Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings, vol. 6047, Springer, 2010, pp. 30--44


A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model


Jiageng Chen, Atsuko Miyaji

Lecture Notes in Computer Science, Xuejia Lai, Moti Yung, Dongdai Lin, Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, vol. 6584, Springer, 2010, pp. 62--76


Generalized RC4 Key Collisions and Hash Collisions


Jiageng Chen, Atsuko Miyaji

Lecture Notes in Computer Science, Juan A. Garay, Roberto De Prisco, Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, vol. 6280, Springer, 2010, pp. 73--87

Share

Tools
Translate to