Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Bingsheng Zhang's Homepage
[go: Go Back, main page]

Publication List

1. Lipmaa, H., Zhang, B.: Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. Inscrypt'09. LNCS, vol. 6151, pp. 154-163. PDF

2. Lipmaa, H., Zhang, B.: Two New Efficient PIR-Writing Protocols. ACNS'10. LNCS, vol. 6123, pp. 438-455. PDF

3. Zhang, B.: Generic Constant-Round Oblivious Sorting Algorithm for MPC. ProvSec'11. LNCS, vol. 6980, pp. 240-256. PDF

4. Zhang, B.: Simulatable Adaptive Oblivious Transfer With Statistical Receiver’s Privacy. ProvSec'11. LNCS, vol. 6980, pp. 52-67. PDF

5. Laur, S., Willemson, J., Zhang, B.: Round-efficient Oblivious Database Manipulation. ISC'11. LNCS, vol. 7001, pp. 262-277. PDF

6. Nakahara, J., Sepehrdad, P., Zhang, B., Wang, M.: Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. CANS'09. LNCS, vol. 5888, pp. 58-75. PDF

7. Bard, G. V., Courtois, N., Nakahara, J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. INDOCRYPT'10. LNCS, vol. 6498, pp. 176-196. PDF

Education

Ph.D in Cryptography

University of Tartu (UT), Estonia

M.sc in Information Security

University College London (UCL), UK

B.eng in Computer Science

Zhejiang University of Technology (ZJUT), China

B.L in Law (Second Degree)

Zhejiang University of Technology (ZJUT), China

New Publications

Laur, S., Willemson, J., Zhang, B.: Round-efficient Oblivious Database Manipulation. ISC ’11. LNCS, vol. 7001, Springer, pp. 262–277. PDF

Zhang, B.: Generic Constant-Round Oblivious Sorting Algorithm for MPC. ProvSec ’11. LNCS, vol. 6980, Springer, pp. 240–256. PDF

Lipmaa, H., Zhang, B.: Two New Efficient PIR-Writing Protocols. ACNS ’10. LNCS, vol. 6123, Springer, pp. 438–455. PDF

News