A practical privacy-preserving data aggregation (3PDA) scheme for smart grid Y Liu, W Guo, CI Fan, L Chang, C Cheng IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2019 | 264 | 2019 |
Securing the Internet of Things in a quantum world C Cheng, R Lu, A Petzoldt, T Takagi IEEE Communications Magazine 55 (2), 116-120, 2017 | 231 | 2017 |
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices Q Wang, D Wang, C Cheng, D He IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2021 | 120 | 2021 |
A Lightweight Authenticated Communication Scheme for Smart Grid Yining Liu, Chi Cheng*, Tianlong Gu, Tao Jiang IEEE Sensors Journal 16 (3), 836-842, 2016 | 106* | 2016 |
An improved authenticated group key transfer protocol based on secret sharing Y Liu, C Cheng, J Cao, T Jiang IEEE Transactions on Computers 62 (11), 2335-2336, 2013 | 61 | 2013 |
Security analysis and improvements on two homomorphic authentication schemes for network coding C Cheng, J Lee, T Jiang, T Takagi IEEE Transactions on Information Forensics and Security 11 (5), 993-1002, 2016 | 54 | 2016 |
Privacy-aware smart city: A case study in collaborative filtering recommender systems F Zhang, VE Lee, R Jin, S Garg, KKR Choo, M Maasberg, L Dong, ... Journal of Parallel and Distributed Computing 127, 145-159, 2019 | 49 | 2019 |
A secure data backup scheme using multi‐factor authentication Y Liu, Q Zhong, L Chang, Z Xia, D He, C Cheng IET Information security 11 (5), 250-255, 2017 | 44 | 2017 |
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope Y Qin, C Cheng, J Ding 24th European Symposium on Research in Computer Security (Esorics …, 2019 | 42 | 2019 |
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding C Cheng, T Jiang IEEE Transactions on Computers 62 (10), 2096-2100, 2013 | 42 | 2013 |
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding C Cheng, T Jiang, Q Zhang IEEE Journal on Selected Areas in Communications 31 (9), 291-298, 2013 | 40 | 2013 |
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Y Qin, C Cheng, X Zhang, Y Pan, L Hu, J Ding Asiacrypt 2021, 2021 | 38 | 2021 |
A privacy-preserving health data aggregation scheme Y Liu, G Liu, C Cheng, Z Xia, J Shen KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3852-3864, 2016 | 28 | 2016 |
Lighting the way to a smart world: Lattice-based cryptography for Internet of Things R Xu, C Cheng, Y Qin, T Jiang arXiv preprint arXiv:1805.04880, 2018 | 27 | 2018 |
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber Y Qin, C Cheng, J Ding Eprint, 2019 | 26 | 2019 |
Find the bad apples: An efficient method for perfect key recovery under imperfect sca oracles–a case study of kyber M Shen, C Cheng, X Zhang, Q Guo, T Jiang IACR Transactions on Cryptographic Hardware and Embedded Systems, 89-112, 2023 | 20 | 2023 |
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet M Hussain, C Cheng, R Xu, M Afzal Information Sciences 631, 328-345, 2023 | 18 | 2023 |
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era C Cheng, Y Qin, R Lu, T Jiang, T Takagi IEEE Transactions on Smart Grid 10 (6), 6386 - 6395, 2019 | 18 | 2019 |
A novel homomorphic MAC scheme for authentication in network coding C Cheng, T Jiang IEEE Communications Letters, 15 (11), 1228-1230, 2011 | 18 | 2011 |
Further analysis and improvements of a lattice-based anonymous PAKE scheme R Ding, C Cheng, Y Qin IEEE Systems Journal 16 (3), 5035-5043, 2022 | 16 | 2022 |