


default search action
Guoyan Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Zhihao Xu
, Chengliang Tian
, Guoyan Zhang, Weizhong Tian
, Lidong Han:
Forward-Secure multi-user and verifiable dynamic searchable encryption scheme within a zero-trust environment. Future Gener. Comput. Syst. 166: 107701 (2025) - [j18]Jiarui Li, Guoyan Zhang, Duan Liu, Fei Zhou, Leibo Li, Weixiao Meng:
DynaNet: A dynamic BFT consensus framework. J. Syst. Archit. 162: 103386 (2025) - [c25]Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. CT-RSA 2025: 51-74 - [i8]Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. IACR Cryptol. ePrint Arch. 2025: 82 (2025) - 2024
- [j17]Chengliang Tian, Jia Yu, Panpan Meng, Guoyan Zhang, Weizhong Tian, Yan Zhang:
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud. IEEE Trans. Cloud Comput. 12(3): 913-927 (2024) - [j16]Qiuhua Wang
, Chengyu Li, Tianyu Xia
, Yizhi Ren
, Dong Wang, Guoyan Zhang
, Kim-Kwang Raymond Choo
:
Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024) - [j15]Zhenzhen Guo
, Gaoli Wang
, Yingxin Li
, Jianqiang Ni
, Guoyan Zhang
:
Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs. IEEE Trans. Mob. Comput. 23(4): 3343-3360 (2024) - [c24]Hongjian Zhao, Yunting Tao, Fanyu Kong, Guoyan Zhang, Hanlin Zhang, Jia Yu:
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems. ISPA 2024: 2260-2263 - 2023
- [j14]Congming Wei
, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang:
Improved attacks against reduced-round Whirlwind. Des. Codes Cryptogr. 91(11): 3581-3602 (2023) - [j13]Zhenzhen Guo
, Gaoli Wang
, Guoyan Zhang
, Yingxin Li
, Jianqiang Ni
:
A Multifactor Combined Data Sharing Scheme for Vehicular Fog Computing Using Blockchain. IEEE Internet Things J. 10(22): 20049-20064 (2023) - [j12]Yongze Kang
, Qingyuan Yu
, Lingyue Qin, Guoyan Zhang
:
Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher. Symmetry 15(6): 1196 (2023) - [j11]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023) - [c23]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. ASIACRYPT (3) 2023: 3-33 - [c22]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404 - [i7]Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. IACR Cryptol. ePrint Arch. 2023: 1286 (2023) - [i6]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. IACR Cryptol. ePrint Arch. 2023: 1359 (2023) - 2022
- [c21]Qingyuan Yu
, Keting Jia
, Guangnan Zou, Guoyan Zhang:
Differential Cryptanalysis of Round-Reduced SPEEDY Family. Inscrypt 2022: 272-291 - 2021
- [j10]Chun Guo
, Guoyan Zhang:
Beyond-birthday security for permutation-based Feistel networks. Des. Codes Cryptogr. 89(3): 407-440 (2021) - 2020
- [c20]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack Against GCM-RUP. CT-RSA 2020: 15-34
2010 – 2019
- 2019
- [j9]Lele Chen, Gaoli Wang, Guoyan Zhang:
MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. Comput. J. 62(12): 1805-1821 (2019) - [i5]Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu:
Universal Forgery Attack against GCM-RUP. IACR Cryptol. ePrint Arch. 2019: 1359 (2019) - 2017
- [j8]Yanbin Li, Guoyan Zhang, Wei Wang, Meiqin Wang:
Cryptanalysis of round-reduced ASCON. Sci. China Inf. Sci. 60(3): 38102 (2017) - [j7]Guoyan Zhang, Meicheng Liu:
A distinguisher on PRESENT-like permutations with application to SPONGENT. Sci. China Inf. Sci. 60(7): 72101 (2017) - 2016
- [c19]Lei Wang, Jian Guo
, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - [i4]Guoyan Zhang, Meicheng Liu:
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT. IACR Cryptol. ePrint Arch. 2016: 236 (2016) - [i3]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - 2015
- [j6]Guoyan Zhang, Jing Qin
:
Lattice-based threshold cryptography and its applications in distributed cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 176-185 (2015) - [j5]Guoyan Zhang, Jing Qin, Shams Qazi:
Multi-Authority Attribute-Based Encryption Scheme from Lattices. J. Univers. Comput. Sci. 21(3): 483-501 (2015) - [c18]Thomas Peyrin
, Siang Meng Sim
, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. FSE 2015: 264-281 - 2014
- [j4]Guoyan Zhang:
Attribute-Based Certificateless Cryptographic System. J. Comput. 9(1): 72-77 (2014) - [j3]Guoyan Zhang, Feng Wang:
Improvement on a Fuzzy Identity-based Encryption Scheme. J. Comput. 9(11): 2727-2732 (2014) - [j2]Decheng Hong
, Jiaqi Xiao, Guoyan Zhang, Shande Yang:
Characteristics of the Sum of Cross-Components of Triaxial Induction Logging Tool in Layered Anisotropic Formation. IEEE Trans. Geosci. Remote. Sens. 52(6): 3107-3115 (2014) - [i2]Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. IACR Cryptol. ePrint Arch. 2014: 931 (2014) - 2013
- [c17]Kerui Wang, Qiuliang Xu, Guoyan Zhang:
A Secure Threshold Signature Scheme from Lattices. CIS 2013: 469-473 - [c16]Guoyan Zhang, Yonghua Li:
Cooperative multicast transmission strategy for energy-efficient dynamic network coding. ICC Workshops 2013: 479-483 - [c15]Guoyan Zhang, Yonghua Li, Jiaru Lin:
Optimal energy consumption for dynamic network coding in cooperative multicast system. ICT 2013: 1-5 - 2012
- [c14]Guoyan Zhang:
A General Construction for Multi-authority Attribute-Based Encryption. AICI 2012: 333-340 - [c13]Yonghua Li, Fengming Cui, Guoyan Zhang, Jiaru Lin:
On the capacity outage probability for cooperative networking coding system with mulitple relays. IC-NIDC 2012: 558-561 - [c12]Guoyan Zhang, Lei Liu, Yang Liu:
An Attribute-Based Encryption Scheme Secure against Malicious KGC. TrustCom 2012: 1376-1380 - [i1]Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang:
Efficient identity-based threshold decryption scheme from bilinear pairings. IACR Cryptol. ePrint Arch. 2012: 75 (2012) - 2011
- [c11]Guoyan Zhang:
A Generic Construction for Proxy Signature Scheme. AICI (2) 2011: 93-100 - [c10]Guoyan Zhang:
A Generic Construction for Proxy Cryptography. CSEE (1) 2011: 284-289 - [c9]Guoyan Zhang, Qiuliang Xu:
Secret Key Awareness Security Public Key Encryption Scheme. ISA 2011: 53-61 - 2010
- [c8]Guoyan Zhang:
Practical Threshold One-Time Proxy Signature Scheme. AINA Workshops 2010: 275-279
2000 – 2009
- 2009
- [j1]Tong Zhang, Rino Micheloni, Guoyan Zhang, Zhaoran Rena Huang, James Jian-Qiang Lu:
3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives. Proc. IEEE 97(1): 161-174 (2009) - [c7]Chengyu Hu
, Pengtao Liu, Guoyan Zhang:
Nominative Proxy Ring Signature. SNPD 2009: 225-228 - 2008
- [c6]Guoyan Zhang, Shaohui Wang:
A Certificateless Signature and Group Signature Schemes against Malicious PKG. AINA 2008: 334-341 - [c5]Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network. AINA Workshops 2008: 428-433 - 2007
- [c4]Peter C. Hung, Seán F. McLoone, Magdalena Sánchez, Ronan Farrell, Guoyan Zhang:
Direct and indirect classification of high-frequency LNA performance using machine learning techniques. ANNIIP 2007: 66-75 - 2006
- [c3]Guoyan Zhang, Ronan Farrell
:
Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits. DDECS 2006: 89-90 - [c2]Guoyan Zhang, Ronan Farrell
:
An Embedded Rectifier-Based Built-In-Test Circuit for CMOS RF Circuits. ICECS 2006: 612-615 - 2005
- [c1]Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:
The Second-Preimage Attack on MD4. CANS 2005: 1-12
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-08 03:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint