Full Publications

* denotes the corresponding author.

Published and Accepted Papers

  1. [Jour-TII2025] Lingjia Meng, Yu Fu, Fangyu Zheng *, Mingyu Wang, Ziqiang Ma, Jiankuo Dong, Jingqiang Lin, “HTM-PQC: Hardening Cryptography Keys under the Trend of Post-quantum Cryptography Migration on Industrial Internet”, IEEE Transactions on Industrial Informatics (TII), 2025, doi: 10.1109/TII.2025.3528582.
  2. [Conf-HPCA2025] Guang Fan, Mingzhe Zhang, Fangyu Zheng, Shengyu Fan, Tian Zhou, Xianglong Deng, Wenxu Tang, Liang Kong, Yixuan Song, Shoumeng Yan, “WarpDrive: GPU-Based Fully Homomorphic Encryption Acceleration Leveraging Tensor and CUDA Cores”, 31st IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2025, accepted to appear.
  3. [Conf-TC2024] Yi Bian,Fangyu Zheng *, Yuewu Wang, Lingguang Lei, Yuan Ma, Tian Zhou, Jiankuo Dong, Guang Fan, Jiwu Jing, “AsyncGBP+: Bridging SSL/TLS and Heterogeneous Computing Power with GPU-based Providers”, IEEE Transactions on Computers (TC), 2024, doi: 10.1109/TC.2024.3477987.
  4. [Conf-ICPADS2024] Yi Bian, Fangyu Zheng *, Jiwu Jing, “TensorPolyMul: Accelerating Polynomial Multiplication in NTT-unfriendly Lattice-based Cryptography Using Tensor Cores”, IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS), 2024, doi: 10.1109/ICPADS63350.2024.00100.
  5. [Conf-CCS2024] Wenxu Tang, Fangyu Zheng *, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing, “DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation”, 31st ACM Conference on Computer and Communications Security (CCS), 2024, doi: 10.1145/ 3658644.3690280.
  6. [Jour-TIFS2024] Mingyu Wang, Fangyu Zheng *, Jingqiang Lin, Fangjie Jiang, Yuan Ma, “ZeroShield: Transparently Mitigating Code Page Sharing Attacks with Zero-cost Stand-by”, IEEE Transactions on Information Forensics and Security (TIFS), 2024, doi: 10.1109/TIFS.2024.3435062.
  7. [Conf-CHES2024] Tian Zhou, Fangyu Zheng *, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin, “ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches”, 26th International Conference on Cryptographic Hardware and Embedded Systems (CHES), 2024, doi: 10.46586/tches.v2024.i2.25-63.
  8. [Conf-WCNC2024] Mingyu Wang, Shijie Jia *, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma, “TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer”, IEEE Wireless Communications and Network Conference (WCNC), 2024, doi: 10.1109/WCNC57260.2024.10571330.
  9. [Conf-ICC2024] Mingyu Wang, Lingjia Meng, Fangyu Zheng *, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan, “TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer”, 58th IEEE International Conference on Communications (ICC), 2024, doi: 10.1109/ICC51166.2024.10622283.
  10. [Jour-密码学报] Tuanjie Kong, Fangyu Zheng, Run Guo *, Jiwu Jing, Ziang Zhang, “Implementation of Low-power Software and Hardware Combination for SM2 Algorithm”, Journal of Cryptologic Research, 2024. doi: 10.13868/j.cnki.jcr.000741
  11. [Jour-密码学报] Tian Zhou, Fangyu Zheng, Jingqiang Lin *, Rong Wei, Wenxu Tang, “Research on Software Implementations of Post-Quantum Cryptography”, Journal of Cryptologic Research, 2024, doi: 10.13868/j.cnki.jcr.000681
  12. [Conf-Inscrypt2023] Qingguan Gao, Kaisheng Sun, Jiankuo Dong *, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu, “V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture”, 19th International Conference on Information Security and Cryptology (Inscrypt), 2023, doi: 10.1007/978-981-97-0945-8_8.
  13. [Conf-TrustCom2023] Haoling Fan, Fangyu Zheng *, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma, “A Hybrid Detection Approach for Cryptographic Algorithms of Closed Source Software”, 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), 2023, doi: 10.1109/TrustCom60117.2023.00116.
  14. [Conf-ISC2023] Lingjia Meng, Yu Fu, Fangyu Zheng *, Ziqiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin, “Protecting Private Keys of Dilithium using Hardware Transactional Memory”, 26th Information Security Conference (ISC), 2023, doi: 10.1007/978-3-031-49187-0_15.
  15. [Conf-ICPP2023] Yi Bian, Fangyu Zheng *, Yuewu Wang, Lingguang Lei, Yuan Ma, Jiankuo Dong, Jiwu Jing, “AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider”. 52nd ACM The International Conference on Parallel Processing (ICPP), 2023, doi: 10.1145/3605573.3605620.
  16. [Conf-ESORICS2023] Bowen Xu, Shijie Jia*, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu and Li Song. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. The 28th European Symposium on Research in Computer Security (ESORICS), doi: 10.1007/978-3-031-51479-1_14.
  17. [Jour-信息安全学报] Lingjia Meng, Jingqiang Lin, Fangyu Zheng *, Fan Lang, Mingyu Wang, “Research on Transient Execution Attacks and Their Impact on Security Enhanced Software Cryptographic Implementation Schemes”, Chinese Journal of Cyber Security, 2023, accepted to appear.
  18. [Conf-IPDPS2023] Guang Fan, Fangyu Zheng *, Lipeng Wan, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin, “Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs”. 37th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2023, doi: 10.1109/IPDPS54959.2023.00085.
  19. [Conf-ICPADS2022] Jiankuo Dong, Sheng Lu, Pinchang Zhang, Fangyu Zheng, Fu Xiao, “G-SM3: High-Performance Implementation of GPU-based SM3 Hash Function”, IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS) 2022, doi: 10.1109/ICPADS56603.2022.00034.
  20. [Conf-ACSAC2022] Wenqing Li, Shijie Jia*, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin, “CryptoGo: Automatic Detection of Go Cryptographic API Misuses”. 38th Annual Computer Security Applications Conf (ACSAC), 2022, doi: 10.1145/3564625.3567989.
  21. [Jour-TII2022] Jiankuo Dong, Pinchang Zhang, Kaisheng Sun, Fu Xiao*, Fangyu Zheng, Jingqiang Lin, “EG-FourQ: An Embedded GPU based Efficient ECC Cryptography Accelerator for Edge Computing”, IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2022.3205355.
  22. [Conf-ESORICS2022] Lipeng Wan, Fangyu Zheng *, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Yuewu Wang and Jingqiang Lin, “A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator”, 27th European Symposium on Research in Computer Security (ESORICS), 2022, doi: 10.1007/978-3-031-17143-7_25.
  23. [Conf-AC3-2022] Haoling Fan, Lingjia Meng, Fangyu Zheng *, Mingyu Wang, Bowen Xu, “Black-box Testing of Cryptographic Algorithms Based on Data Characteristics”, 2nd EAI International Conference on Applied Cryptography in Computer and Communications (AC3), doi: 10.1007/978-3-031-17081-2_10.
  24. [Conf-ICC2022] Mingshu Du, Yuan Ma, Na Lv, Tianyu Chen, Shijie Jia, Fangyu Zheng, “An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator”, 2022 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC45855.2022.9839285.
  25. [Jour-IOTJ2022] Jiankuo Dong, Guang Fan, Fangyu Zheng *, Tianyu Mao, Fu Xiao, Jingqiang Lin, “TEGRAS: An Efficient Tegra Embedded GPU based RSA Acceleration Server”, IEEE Internet of Things Journal, doi: 10.1109/JIOT.2022.3152203.
  26. [Jour-TECS2022] Jiankuo Dong, Fangyu Zheng *, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan, “EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2”, ACM Transactions on Embedded Computing Systems (TECS), doi: 10.1145/3492734.
  27. [Conf-ACSAC2021] Rong Wei, Fangyu Zheng *, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang, “Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and their Real-World Deployment”, 37th Annual Computer Security Applications Conf (ACSAC), 2021, doi: 10.1145/3485832.3485877.
  28. [Conf-Securecomm2021] Lipeng Wan, Fangyu Zheng *, Jingqiang Lin, “TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator”, 17th EAI International Conf on Security and Privacy in Communication Networks (SecureComm), 2021, doi: 10.1007/978-3-030-90019-9_13.
  29. [Conf-WASA2021] Guang Fan, Fangyu Zheng *, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan, “A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System”, 16th International Conf on Wireless Algorithms, Systems, and Application (WASA), 2021, doi: 10.1007/978-3-030-86130-8_9.
  30. [Conf-WASA2021] Jiankuo Dong, Guang Fan, Fangyu Zheng *, Jingqiang Lin, Zhe Liu, Fu Xiao, “TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2”, 16th International Conf on Wireless Algorithms, Systems, and Application (WASA), 2021, doi: 10.1007/978-3-030-86130-8_17.
  31. [Jour-TIFS2021] Lili Gao, Fangyu Zheng *, Rong Wei, Jiankuo Dong, Niall Emmart, Yuan Ma, Jingqiang Lin, Charles C. Weems, “DPF-ECC: A Framework for Efficient ECC with Double Precision Floating-Point Computing Power”, IEEE Transactions on Information Forensics and Security (TIFS), 2021, doi: 10.1109/TIFS.2021.3098987.
  32. [Book2021] Jingqiang Lin, Fangyu Zheng, Wei Wang, Zhe Liu, Qiongxiao Wang, “Cryptographic Software Implementation and Cryptographic Key Security”, China Machine Press, 2021. ISBN 9787111679578
  33. [Conf-IPDPS2020] Lili Gao, Fangyu Zheng *, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles Weems, “DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-point Computing Power of GPUs”, 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020. doi: 10.1109/IPDPS47924.2020.00058
  34. [Conf-IPCCC2020] Ziyang Wang, Fangyu Zheng *, Jingqiang Lin, Guang Fan, Jiankuo Dong, “SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment”, 39th IEEE International Performance Computing and Communications Conf (IPCCC), 2020. doi: 10.1109/IPCCC50635.2020.9391574
  35. [Jour-密码学报] Rong Wei, Fangyu Zheng *, Jingqiang Lin, “Implementation of a General-purpose Cryptography Library Supporting Domestic Algorithm with JavaScript”, Journal of Cryptologic Research, 2020. doi: 10.13868/j.cnki.jcr.000392
  36. [Jour-密码学报] Fangyu Zheng, Jingqiang Lin *, Rong Wei, Qiongxiao Wang,”Research Progresses on Security Applications of Cryptography and Discussions on Validation of Software Cryptographic Modules”, Jour of ryptologic Research, 2020. doi: 10.13868/j.cnki.jcr.000369
  37. [Jour-信息安全学报] Jiankuo Dong, Fangyu Zheng *, Jingqiang Lin, “Implementing High-performance X25519/448 Key Agreement Scheme in General Purpose GPUs”, Chinese Journal of Cyber Security, 2020. doi:10.19363/J.cnki.cn10-1380/tn.2020.11.06
  38. [Conf-信息安全研究] Jingqiang Lin, Fangyu Zheng , Yuewu Wang, “Advances in Cryptographic Key Protection”, Chinese Journal of Information Security Research, 2019. (http://www.sicris.cn/CN/Y2019/V5/I1/68)
  39. [Conf-信息安全研究] Fangyu Zheng *, Jiankuo Dong, Jingqiang Lin, Lili Gao, “High-performance Cryptographic Computations in GPUs”, Chinese Journal of Information Security Research, 2019. (http://www.sicris.cn/CN/Y2019/V5/I1/88)
  40. [Conf-IPDPS2018] Jiankuo Dong, Fangyu Zheng *, Niall Emmart, Jingqiang Lin, Charles C. Weems, “sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations”, 32nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2018. doi: 10.1109/IPDPS.2018.00069
  41. [Conf-CNS2018] Jiankuo Dong, Fangyu Zheng *, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang, “Towards High-performance X25519/448 Key Agreement in General Purpose GPUs”, 6th IEEE Conf on Communications and Network Security (CNS), 2018. doi: 10.1109/CNS.2018.8433161
  42. [Conf-CNS2018] Shiran Pan, Fangyu Zheng, Wen-Tao Zhu, Qiongxiao Wang, “Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization”, 6th IEEE Conf on Communications and Network Security (CNS), 2018. doi: 10.1109/CNS.2018.8433195
  43. [Conf-ARITH2018] Niall Emmart, Fangyu Zheng, Charles Weems, “A New Variant of the Barrett Algorithm Applied to Quotient Selection”, IEEE 25th Symposium on Computer Arithmetic (ARITH), 2018. doi: 10.1109/ARITH.2018.8464771
  44. [Conf-ARITH2018] Niall Emmart, Fangyu Zheng, Charles Weems, “Faster Modular Exponentiation Using Double Precision Floating Point Arithmetic on the GPU”, IEEE 25th Symposium on Computer Arithmetic (ARITH), 2018. doi: 10.1109/ARITH.2018.8464792
  45. [Conf-WASA2018] Shiran Pan, Qiongxiao Wang, Fangyu Zheng *, Jiankuo Dong, “Secure and Efficient Outsourcing of Large-scale Matrix Inverse Computation”, 13th International Conf on Wireless Algorithms, Systems, and Applications (WASA), 2018. doi: 10.1007/978-3-319-94268-1_31
  46. [Conf-Securecomm2018] Wangzhao Cheng, Fangyu Zheng *, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li, “Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs”, 14th International Conf on Security and Privacy in Communication Networks (SecureComm), 2018. doi: 10.1007/978-3-030-01701-9_28
  47. [Conf-ICICS2018] Ziyang Wang, Fangyu Zheng *, Jingqiang Lin, Jiankuo Dong, “Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation”, 20th International Conf on Information and Communications Security (ICICS), 2018. doi: 10.1007/978-3-030-01950-1_9
  48. [Jour-TIFS2017] Wuqiong Pan, Fangyu Zheng , Yuan Zhao, Wen-Tao Zhu *, Jiwu Jing, “An Efficient Elliptic Curve Cryptography Signature Server with GPU Acceleration”, IEEE Transactions on Information Forensics and Security (TIFS), 2017. doi: 10.1109/TIFS.2016.2603974
  49. [Conf-ICICS2017] Wangzhao Cheng, Fangyu Zheng *, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li, “High-Performance Symmetric Cryptography Server with GPU Acceleration”, 18th International Conf on Information and Communications Security (ICICS), 2017. doi: 10.1007/978-3-319-89500-0_46
  50. [Jour-SCN2017] Jiankuo Dong, Fangyu Zheng *, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Utilizing the Double-precision Floating-point Computing Power of GPUs for RSA Acceleration”, Security and Communication Networks (SCN), 2017. doi: 10.1155/2017/3508786
  51. [Conf-SAC2016] Yuan Zhao, Wuqiong Pan *, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng, “PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA”, 23rd Conf on Selected Areas in Cryptography (SAC), 2016. doi: 10.1007/978-3-319-69453-5_26
  52. [Conf-SEC2016] Yuan Zhao, Jingqiang Lin, Wuqiong Pan *, Cong Xue, Fangyu Zheng, Ziqiang Ma, “RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks”, 31st International Conf on Systems Security and Privacy Protection (IFIP SEC), 2016. doi: 10.1007/978-3-319-33630-5_20
  53. [Conf-ISC2014] Fangyu Zheng, Wuqiong Pan *, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Exploiting the Floating-Point Computing Power of GPUs for RSA”, 17th Information Security Conf (ISC), Best Student Paper Award, 2014. doi: 10.1007/978-3-319-13257-0_12
  54. [Conf-WISA2014] Fangyu Zheng, Wuqiong Pan *, Jingqiang Lin, Jiwu Jing, Yuan Zhao, “Exploiting the Potential of GPUs for Modular Multiplication in ECC”, 15th International Workshop on Information Security Applications (WISA), 2014. doi: 10.1007/978-3-319-15087-1_23