科研成果 by Year: 2025

2025
Li C, Jiao X, Hu A, Shen Q, Wu Z. Identity-Based Chameleon Hashes in the Standard Model for Mobile Devices. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Li C, Shen Q, Wu Z. Redactable Blockchain From Decentralized Chameleon Hash Functions, Revisited. IEEE Transactions on Computers (TC). 2025.
Zhang X, Zou J, Zhang Z, Shen Q, Gao Y, Cui J, Feng Y, Wu Z, Abbott D. MUXLeak: Exploiting Multiplexers as A Power Side Channel against Multi-tenant FPGAs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(TCAD). 2025.
Dong J, Shen Q, Liang J, Li C, Feng X, Fang Y. A lattice-based privacy-preserving decentralized multi-party payment scheme. Computer Networks. 2025;262:111-129.
董佶圣, 李聪, 沈子楠, 胡达齐, 沈晴霓, 吴中海. 基于国密SM9 的区块链匿名交易方案. 中国科学:信息科学. 2025;55(6):1428 - 1446.
Zhang X, Shen Q, Zhang Z, Gao Y, Zou J, Yang Y, Wu Z. Fantastic Interrupts and Where to Find Them: Exploiting Non-movable Interrupts on x86. IEEE Transactions on Information Forensics & Security (TIFS). 2025.
Luo Y, Shen Q, Wu Z. PERM: Streamlining Cloud Authorization with Flexible and Scalable Policy Enforcement. IEEE Transactions on Information Forensics & Security (TIFS). 2025.