| Traps to the BGJT-algorithm for discrete logarithms Q Cheng, D Wan, J Zhuang LMS Journal of Computation and Mathematics 17 (A), 218-229, 2014 | 24 | 2014 |
| On determining deep holes of generalized Reed–Solomon codes J Zhuang, Q Cheng, J Li IEEE Transactions on Information Theory 62 (1), 199-207, 2015 | 21 | 2015 |
| LWE from non-commutative group rings Q Cheng, J Zhang, J Zhuang Designs, Codes and Cryptography, 1-25, 2021 | 17 | 2021 |
| Vector Sum Range Decision for Verifiable Multi-User Fuzzy Keyword Search in Cloud-Assisted IoT J Han, L Qi, J Zhuang IEEE Internet of Things Journal, 2023 | 9 | 2023 |
| On determining deep holes of generalized Reed-Solomon codes Q Cheng, J Li, J Zhuang International Symposium on Algorithms and Computation, 100-110, 2013 | 8 | 2013 |
| DLP in semigroups: Algorithms and lower bounds J Han, J Zhuang Journal of Mathematical Cryptology 16 (1), 278-288, 2022 | 7 | 2022 |
| Refined analysis to the extended tower number field sieve Y Zhu, J Wen, J Zhuang, C Lv, D Lin Theoretical computer science 814, 49-68, 2020 | 5 | 2020 |
| A variant of the Galbraith–Ruprai algorithm for discrete logarithms with improved complexity Y Zhu, J Zhuang, H Yi, C Lv, D Lin Designs, Codes and Cryptography 87, 971-986, 2019 | 5 | 2019 |
| Improvements on the individual logarithm step in extended tower number field sieve Y Zhu, J Zhuang, C Lv, D Lin Cryptology ePrint Archive, Report 2016/727, 2016, http://eprint. iacr. org …, 2016 | 5 | 2016 |
| On certain computations of Pisot numbers Q Cheng, J Zhuang Information Processing Letters 113 (8), 271-275, 2013 | 5 | 2013 |
| Factor base discrete logarithms in Kummer Extensions D Xiao, J Zhuang, Q Cheng Finite Fields and Their Applications 53, 205-225, 2018 | 4 | 2018 |
| RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing L Qi, J Zhuang The Journal of Supercomputing, 1-32, 2023 | 3 | 2023 |
| On Generating Coset Representatives of in J Zhuang, Q Cheng Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016 | 3 | 2016 |
| Improving the Gaudry–Schost algorithm for multidimensional discrete logarithms H Wu, J Zhuang Designs, Codes and Cryptography 90 (1), 107-119, 2022 | 2 | 2022 |
| Hardness of Entropic Module-LWE H Lin, M Wang, J Zhuang, Y Wang Cryptology ePrint Archive, 2020 | 2 | 2020 |
| Classifying and generating exact coset representatives of PGL2 (Fq) in PGL2 (Fq2) Y Zhu, J Zhuang, C Lv, D Lin Finite Fields and Their Applications 42, 118-127, 2016 | 2 | 2016 |
| Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms H Wu, J Zhuang, Q Duan, Y Zhu Information Processing Letters 175, 106225, 2022 | 1 | 2022 |
| Solution counts and sums of roots of unity J Zhuang, Q Cheng, J Wen Journal of Number Theory 240, 551-561, 2022 | | 2022 |
| Determining deep hole trees of generalized Reed-Solomon codes and an application Z JinCheng, LIN DongDai, LV Chang SCIENTIA SINICA Mathematica 47 (11), 1615-1620, 2017 | | 2017 |
| Improvements on the Individual Logarithm Step in exTNFS. Y Zhu, J Zhuang, C Lv, D Lin IACR Cryptology ePrint Archive 2016, 727, 2016 | | 2016 |