发表论文
[1] 田世新, 董智利, 王鲲鹏, 吕昌. Subfield Attack on NTRU by using symmetric function map. 2023 IEEE International Symposium on Information Theory. 2023, 第 3 作者[2] Lingyun Li, Xianhui Lu, Kunpeng Wang. Hash-based signature revisited. CYBERSECURITY[J]. 2022, 第 3 作者5(1): 1-26, https://doaj.org/article/314c4bec0ca044008757aae1424581fa.[3] Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang. Hybrid dual attack on LWE with arbitrary secrets. CYBERSECURITY[J]. 2022, 第 4 作者5(1): 1-27, https://doaj.org/article/b3006ab01b614ee4aef0e2bdb1ab8c78.[4] 刘钦菊, 路献辉, 李杰, 王鲲鹏. 全同态加密自举技术的研究现状及发展趋势. 密码学报[J]. 2021, 第 4 作者8(5): 795-807, http://lib.cqvip.com/Qikan/Article/Detail?id=7105920318.[5] Qinju Liu, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang. SecureBP from Homomorphic Encryption. SECURITY AND COMMUNICATION NETWORKS[J]. 2020, 第 6 作者2020: https://doaj.org/article/4775bf9024494f60a4800819d20be875.[6] Luo, Fucai, Wang, Fuqun, Wang, Kunpeng, Chen, Kefei. Fully homomorphic encryption based on the ring learning with rounding problem. IET INFORMATION SECURITY[J]. 2019, 第 3 作者13(6): 639-648, http://dx.doi.org/10.1049/iet-ifs.2018.5427.[7] Shen, Tongchen, Wang, Fuqun, Chen, Kefei, Wang, Kunpeng, Li, Bao. Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE ACCESS[J]. 2019, 第 4 作者7: 79299-79310, https://doaj.org/article/742daf6a93b04c9a9b20b97d94cdc6db.[8] Yu Wei, Wang Kunpeng, Li Bao, Tian Song. Montgomery Algorithm over a Prime Field. CHINESE JOURNAL OF ELECTRONICS[J]. 2019, 第 2 作者28(1): 39-44, http://lib.cqvip.com/Qikan/Article/Detail?id=6100201204.[9] Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian. Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I. 2019, 第 3 作者11921: 278-308, https://link.springer.com/chapter/10.1007/978-3-030-34578-5_11.[10] YU Wei, WANG Kunpeng, LI Bao, TIAN Song. Montgomery Algorithm over a Prime Field. 电子学报(英文)[J]. 2019, 第 2 作者39-44, http://lib.cqvip.com/Qikan/Article/Detail?id=6100201204.[11] Luo, Fucai, Wang, Fuqun, Wang, Kunpeng, Chen, Kefei. A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. INFORMATION SCIENCES[J]. 2019, 第 3 作者480: 70-89, http://dx.doi.org/10.1016/j.ins.2018.12.025.[12] Xu, Xiu, Leonardi, Chris, Teh, Anzo, Jao, David, Wang, Kunpeng, Yu, Wei, Azarderakhsh, Reza, Heng, SH, Lopez, J. Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019. 2019, 第 5 作者11879: 293-309, [13] Luo Fucai, Wang Kunpeng, Chen L, Manulis M, Schneider S. Verifiable Decryption for Fully Homomorphic Encryption. INFORMATION SECURITY (ISC 2018). 2018, 第 2 作者11060: 347-365, [14] Gao, Yuanyuan, Wang, Kunpeng, Mori, P, Furnell, S, Camp, O. Probability Preservation Property with Relative Error and Its Applications. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY. 2018, 第 2 作者461-468, [15] 何晓阳, 于伟, 王鲲鹏. 从有限域到椭圆曲线上的编码映射构造与应用综述. 密码学报[J]. 2018, 第 3 作者5(3): 301-314, http://lib.cqvip.com/Qikan/Article/Detail?id=675598193.[16] Song Tian, Bao Li, Kunpeng Wang, Wei Yu. Cover attacks for elliptic curves with cofactor two. Designs, Codes and Cryptography[J]. 2018, 第 3 作者86(11): 2451-2468, https://link.springer.com/article/10.1007/s10623-018-0457-6.[17] Luo, Fucai, Wang, Kunpeng, Lin, Changlu, Su, C, Kikuchi, H. Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018). 2018, 第 2 作者11125: 101-115, [18] Luo, Fucai, Wang, Fuqun, Wang, Kunpeng, Li, Jie, Chen, Kefei. LWR-Based Fully Homomorphic Encryption, Revisited. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 3 作者https://doaj.org/article/554037a976c340efb64e9b4755fa3a30.[19] Li Jie, Zhang Daode, Lu Xianhui, Wang Kunpeng, Qing S, Mitchell C, Chen L, Liu D. Compact (Targeted Homomorphic) Inner Product Encryption from LWE. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017. 2018, 第 4 作者10631: 132-140, [20] 徐秀, 李宝, 王鲲鹏, 薛海洋. 基于超奇异同源的认证密钥交换. 密码学报[J]. 2018, 第 3 作者5(6): 695-704, http://lib.cqvip.com/Qikan/Article/Detail?id=6100127306.[21] Kunpeng Wang. Hashing into twisted Jacobian intersection curves. Inscrypt 2017. 2017, 第 1 作者[22] 王鲲鹏. 特征2有限域上椭圆曲线的co-Z Montgomery算法. 计算机学报. 2017, 第 1 作者[23] 于伟, 李宝, 王鲲鹏, 李维晅, 田松. 特征3有限域上椭圆曲线的co-Z Montgomery算法. 计算机学报[J]. 2017, 第 3 作者40(5): 1121-1133, http://lib.cqvip.com/Qikan/Article/Detail?id=672066268.[24] He Xiaoyang, Yu Wei, Wang Kunpeng, Lin D, Wang XF, Yung M. Hashing into Generalized Huff Curves. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015. 2016, 第 3 作者9589: 22-44, [25] Kunpeng Wang. Constructing Isogenies on Extended Jacobi Quartic Curves. Inscrypt 2016. 2016, 第 1 作者[26] 曹鸿钰, 王鲲鹏. 扭曲雅可比相交曲线上的斜-Frobenius映射. 计算机工程[J]. 2015, 第 2 作者41(1): 270-274, http://lib.cqvip.com/Qikan/Article/Detail?id=663458397.[27] 田松, 李宝, 王鲲鹏. 椭圆曲线离散对数问题的研究进展. 密码学报[J]. 2015, 第 3 作者177-188, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849534850484856.[28] Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian. Hashing into Jacobi Quartic Curves. INFORMATION SECURITY, ISC 2015. 2015, 第 2 作者9290: 355-375, https://link.springer.com/chapter/10.1007/978-3-319-23318-5_20.[29] Chen Shan, Zhang Xushen, Wang Kunpeng, Lin Dongdai. Six Subfamilies of Implementation-Friendly Barreto-Naehrig Curves. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 3 作者23(1): 169-174, https://www.webofscience.com/wos/woscc/full-record/WOS:000330089800031.[30] 于伟, 王鲲鹏, 李宝. 构造从字符串到Huff曲线的散列函数. 中国科学技术大学学报[J]. 2014, 第 2 作者44(10): 835-838, http://just-cn.ustc.edu.cn/CN/10.3969/j.issn.0253-2778.2014.10.006.[31] Kunpeng Wang. Joint Triple Base Number System for Multi-Scalar Multiplications. The 9th International Conference on Information Security Practice and Experience. 2013, 第 1 作者 通讯作者 [32] Kunpeng Wang. About Hash into Montgomery Form Elliptic Curves. The 9th International Conference on Information Security Practice and Experience. 2013, 第 1 作者 通讯作者 [33] Zhang Lijun, Wang Kunpeng, Wang Hong. Unified and Complete Point Addition Formula for Elliptic Curves. CHINESE JOURNAL OF ELECTRONICS[J]. 2012, 第 2 作者21(2): 345-349, http://lib.cqvip.com/Qikan/Article/Detail?id=44611540.[34] 谢小容, 吕克伟, 王鲲鹏. ax+b mod p比特安全的列表译码证明. 系统科学与数学[J]. 2012, 第 3 作者1366-1376, [35] 于伟, 王鲲鹏, 李宝, 田松. 构造从字符串到C34曲线的散列函数. 计算机学报[J]. 2012, 第 2 作者35(9): 1868-1873, http://lib.cqvip.com/Qikan/Article/Detail?id=43376007.[36] 谢小容, 王鲲鹏. 基于椭圆曲线的KDM安全公钥加密方案. 计算机工程[J]. 2012, 第 2 作者38(23): 19-23, http://lib.cqvip.com/Qikan/Article/Detail?id=44299675.[37] 张李军, 王鲲鹏. 环Z_n上椭圆曲线的群法则及其在Paillier系统中的应用. 电子学报[J]. 2011, 第 2 作者39(8): 1733-1738, http://lib.cqvip.com/Qikan/Article/Detail?id=39160752.[38] 王鲲鹏. 环Z/nZ上椭圆曲线的群法则及其在Paillier系统中的应用. 电子学报. 2011, 第 1 作者[39] Wang Hong, Wang Kunpeng, Zhang Lijun, Li Bao. Pairing Computation on Elliptic Curves of Jacobi Quartic Form. CHINESE JOURNAL OF ELECTRONICS[J]. 2011, 第 2 作者20(4): 655-661, http://lib.cqvip.com/Qikan/Article/Detail?id=40347026.[40] Zhang Yazhe, Wang Kunpeng, Li Bao, Kwak J, Deng RH, Won Y, Wang G. A Deniable Group Key Establishment Protocol in the Standard Model. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS. 2010, 第 2 作者6047: 308-323, [41] 李明, 王鲲鹏. 求解双基链的改进型贪心算法. 微电子学与计算机[J]. 2010, 第 2 作者177-180,184, http://lib.cqvip.com/Qikan/Article/Detail?id=33108812.[42] Li Ming, Wang Kunpeng, Pan JS, Guo BL, Abraham A. New Greedy Algorithm for Computing Double-Base Chains. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS. 2009, 第 2 作者445-450, http://dx.doi.org/10.1109/IAS.2009.207.[43] 局部环Z/pnZ上椭圆曲线密码系统. 中国科学院研究生院学报. 2009, [44] 李明, 王鲲鹏. 局部环Z/p^nZ上的椭圆曲线密码系统. 中国科学院研究生院学报[J]. 2009, 第 2 作者695-702, http://lib.cqvip.com/Qikan/Article/Detail?id=31752411.[45] 王鲲鹏, 李宝. 构造有限域上具有给定阶点的椭圆曲线. 软件学报[J]. 2007, 第 1 作者18(7): 1774-1777, http://lib.cqvip.com/Qikan/Article/Detail?id=24884685.[46] Wang, Quanlong, Wang, Kunpeng, Dai, Zongduo. On optimal simultaneous rational approximation to (omega, omega(2))(tau) with omega being some kind of cubic algebraic function. JOURNALOFAPPROXIMATIONTHEORY[J]. 2007, 第 2 作者148(2): 194-210, http://www.corc.org.cn/handle/1471x/2380199.[47] Dai, Zongduo, Wang, Kunpeng, Ye, Dingfeng. Multi-continued fraction algorithm on multi-formal Laurent series. ACTA ARITHMETICA[J]. 2006, 第 2 作者122(1): 1-16, http://www.corc.org.cn/handle/1471x/2379094.[48] 王鲲鹏, 张贤科. 实二次代数函数域的单位群. 中国科学院研究生院学报[J]. 2003, 第 1 作者20(2): 139-145, http://lib.cqvip.com/Qikan/Article/Detail?id=12102976.[49] Wang Kunpeng, Zhang Xianke. 实二次代数函数域的单位群. 中国科学院研究生院学报[J]. 2003, 第 1 作者20(2): 139-145, http://lib.cqvip.com/Qikan/Article/Detail?id=12102976.[50] 王鲲鹏, 张贤科. 实二次代数函数域理想类群的子群. 中国科学:A辑[J]. 2002, 第 1 作者32(9): 858-864, http://lib.cqvip.com/Qikan/Article/Detail?id=6867260.[51] 王鲲鹏, 张贤科. 实二次代数函数域理想类群的子群. 中国科学:A辑[J]. 2002, 第 1 作者32(9): 858-864, http://lib.cqvip.com/Qikan/Article/Detail?id=6867260.[52] 张贤科, 王鲲鹏. Continued Fractions of Functions Connected With Real Quadratic Function Fields. 数学进展. 2000, 第 2 作者29(4): 375, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=756119&detailType=1.[53] Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang. Hybrid dual attack on LWE with arbitrary secrets. CYBERSECURITY. 第 4 作者5(1): http://dx.doi.org/10.1186/s42400-022-00115-y.