Haibin Zhang
Cited by
Cited by
BEAT: Asynchronous BFT made practical
S Duan, MK Reiter, H Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Online ciphers from tweakable blockciphers
P Rogaway, H Zhang
Topics in Cryptology–CT-RSA 2011, 237-249, 2011
BChain: Byzantine replication with high throughput and embedded reconfiguration
S Duan, H Meling, S Peisert, H Zhang
Principles of Distributed Systems, 91-106, 2014
Unique Ring Signatures: A Practical Construction
M Franklin, H Zhang
Financial Cryptography 2013, 162-170, 2013
Unique group signatures
M Franklin, H Zhang
European Symposium on Research in Computer Security, 643-660, 2012
On the origins and variations of blockchain technologies
AT Sherman, F Javani, H Zhang, E Golaszewski
IEEE Security & Privacy 17 (1), 72-77, 2019
Systems and methods for searching shared encrypted files on third-party storage systems
S Schneider, W Bogorad, H Zhang, S Sundaram
US Patent 9,342,705, 2016
The security of ciphertext stealing
P Rogaway, M Wooding, H Zhang
FSE 2012, 180-195, 2012
Practical dual-receiver encryption
SSM Chow, M Franklin, H Zhang
Cryptographers’ Track at the RSA Conference, 85-105, 2014
A Framework for Unique Ring Signatures
MK Franklin, H Zhang
IACR Cryptology ePrint Archive 2012, 577, 2012
Secure causal atomic broadcast, revisited
S Duan, MK Reiter, H Zhang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Systems and methods for maintaining encrypted search indexes on third-party storage systems
H Zhang, S Schneider, W Bogorad, S Sundaram
US Patent 9,679,160, 2017
P2S: a fault-tolerant publish/subscribe infrastructure
T Chang, S Duan, H Meling, S Peisert, H Zhang
Proceedings of the 8th ACM International Conference on Distributed Event …, 2014
ByzID: Byzantine fault tolerance from intrusion detection
S Duan, K Levitt, H Meling, S Peisert, H Zhang
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 253-264, 2014
On the universally composable security of openstack
K Hogan, H Maleki, R Rahaeimehr, R Canetti, M Van Dijk, J Hennessey, ...
2019 IEEE Cybersecurity Development (SecDev), 20-33, 2019
Length-doubling ciphers and tweakable ciphers
H Zhang
International Conference on Applied Cryptography and Network Security, 100-116, 2012
Systems and methods for securing data at third-party storage services
H Zhang, S Schneider, W Bogorad, S Sundaram
US Patent 9,258,122, 2016
Bit Security of the CDH Problems over Finite Fields
M Wang, T Zhan, H Zhang
Selected Areas in Cryptography - SAC 2015, 441-461, 2014
Real hidden identity-based signatures
SSM Chow, H Zhang, T Zhang
International Conference on Financial Cryptography and Data Security, 21-38, 2017
Byzantine reliable broadcast in sparse networks
S Duan, L Nicely, H Zhang
2016 IEEE 15th International Symposium on Network Computing and Applications …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20