Follow
Chi Cheng
Title
Cited by
Cited by
Year
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
Y Liu, W Guo, CI Fan, L Chang, C Cheng
IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2019
2402019
Securing the Internet of Things in a quantum world
C Cheng, R Lu, A Petzoldt, T Takagi
IEEE Communications Magazine 55 (2), 116-120, 2017
2152017
A Lightweight Authenticated Communication Scheme for Smart Grid
Yining Liu, Chi Cheng*, Tianlong Gu, Tao Jiang
IEEE Sensors Journal 16 (3), 836-842, 2016
101*2016
Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices
Q Wang, D Wang, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing, 2021
912021
An improved authenticated group key transfer protocol based on secret sharing
Y Liu, C Cheng, J Cao, T Jiang
IEEE Transactions on Computers 62 (11), 2335-2336, 2013
602013
Security analysis and improvements on two homomorphic authentication schemes for network coding
C Cheng, J Lee, T Jiang, T Takagi
IEEE Transactions on Information Forensics and Security 11 (5), 993-1002, 2016
512016
Privacy-aware smart city: A case study in collaborative filtering recommender systems
F Zhang, VE Lee, R Jin, S Garg, KKR Choo, M Maasberg, L Dong, ...
Journal of Parallel and Distributed Computing 127, 145-159, 2019
462019
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding
C Cheng, T Jiang
IEEE Transactions on Computers 62 (10), 2096-2100, 2013
442013
A secure data backup scheme using multi‐factor authentication
Y Liu, Q Zhong, L Chang, Z Xia, D He, C Cheng
IET Information security 11 (5), 250-255, 2017
422017
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Y Qin, C Cheng, J Ding
24th European Symposium on Research in Computer Security (Esorics …, 2019
402019
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding
C Cheng, T Jiang, Q Zhang
IEEE Journal on Selected Areas in Communications 31 (9), 291-298, 2013
392013
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
Y Qin, C Cheng, X Zhang, Y Pan, L Hu, J Ding
Asiacrypt 2021, 2021
272021
A privacy-preserving health data aggregation scheme
Y Liu, G Liu, C Cheng, Z Xia, J Shen
KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3852-3864, 2016
272016
Lighting the way to a smart world: Lattice-based cryptography for Internet of Things
R Xu, C Cheng, Y Qin, T Jiang
arXiv preprint arXiv:1805.04880, 2018
242018
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber
Y Qin, C Cheng, J Ding
Eprint, 2019
222019
A novel homomorphic MAC scheme for authentication in network coding
C Cheng, T Jiang
IEEE Communications Letters, 15 (11), 1228-1230, 2011
182011
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles–A case study of Kyber
M Shen, C Cheng, X Zhang, Q Guo, T Jiang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-112, 2023
162023
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era
C Cheng, Y Qin, R Lu, T Jiang, T Takagi
IEEE Transactions on Smart Grid 10 (6), 6386 - 6395, 2019
162019
Security analysis of a homomorphic signature scheme for network coding
C Cheng, T Jiang, Y Liu, M Zhang
Security and Communication Networks 8 (18), 4053-4060, 2015
152015
A novel class of 2-D binary sequences with zero correlation zone
C Cheng, T Jiang, Y Liu
IEEE Signal Processing Letters 17 (3), 301-304, 2010
152010
The system can't perform the operation now. Try again later.
Articles 1–20