Traps to the BGJT-algorithm for discrete logarithms Q Cheng, D Wan, J Zhuang
LMS Journal of Computation and Mathematics 17 (A), 218-229, 2014
23 2014 On determining deep holes of generalized Reed–Solomon codes J Zhuang, Q Cheng, J Li
IEEE Transactions on Information Theory 62 (1), 199-207, 2015
14 2015 LWE from non-commutative group rings Q Cheng, J Zhang, J Zhuang
Designs, Codes and Cryptography, 1-25, 2021
11 2021 On determining deep holes of generalized Reed-Solomon codes Q Cheng, J Li, J Zhuang
International Symposium on Algorithms and Computation, 100-110, 2013
8 2013 Improvements on the individual logarithm step in extended tower number field sieve Y Zhu, J Zhuang, C Lv, D Lin
Cryptology ePrint Archive, Report 2016/727, 2016, http://eprint. iacr. org …, 2016
6 2016 On certain computations of Pisot numbers Q Cheng, J Zhuang
Information Processing Letters 113 (8), 271-275, 2013
5 2013 Refined analysis to the extended tower number field sieve Y Zhu, J Wen, J Zhuang, C Lv, D Lin
Theoretical computer science 814, 49-68, 2020
4 2020 A variant of the Galbraith–Ruprai algorithm for discrete logarithms with improved complexity Y Zhu, J Zhuang, H Yi, C Lv, D Lin
Designs, Codes and Cryptography 87, 971-986, 2019
4 2019 DLP in semigroups: Algorithms and lower bounds J Han, J Zhuang
Journal of Mathematical Cryptology 16 (1), 278-288, 2022
3 2022 Factor base discrete logarithms in Kummer Extensions D Xiao, J Zhuang, Q Cheng
Finite Fields and Their Applications 53, 205-225, 2018
3 2018 On Generating Coset Representatives of in J Zhuang, Q Cheng
Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016
3 2016 Improving the Gaudry–Schost algorithm for multidimensional discrete logarithms H Wu, J Zhuang
Designs, Codes and Cryptography 90 (1), 107-119, 2022
2 2022 Classifying and generating exact coset representatives of PGL2 (Fq) in PGL2 (Fq2) Y Zhu, J Zhuang, C Lv, D Lin
Finite Fields and Their Applications 42, 118-127, 2016
2 2016 Vector Sum Range Decision for Verifiable Multi-User Fuzzy Keyword Search in Cloud-Assisted IoT J Han, L Qi, J Zhuang
IEEE Internet of Things Journal, 2023
1 2023 Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms H Wu, J Zhuang, Q Duan, Y Zhu
Information Processing Letters 175, 106225, 2022
1 2022 Hardness of Entropic Module-LWE H Lin, M Wang, J Zhuang, Y Wang
Cryptology ePrint Archive, 2020
1 2020 RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing L Qi, J Zhuang
The Journal of Supercomputing, 1-32, 2023
2023 Solution counts and sums of roots of unity J Zhuang, Q Cheng, J Wen
Journal of Number Theory 240, 551-561, 2022
2022 Determining deep hole trees of generalized Reed-Solomon codes and an application Z JinCheng, LIN DongDai, LV Chang
SCIENTIA SINICA Mathematica 47 (11), 1615-1620, 2017
2017 Improvements on the Individual Logarithm Step in exTNFS. Y Zhu, J Zhuang, C Lv, D Lin
IACR Cryptology ePrint Archive 2016, 727, 2016
2016