default search action
Donald Donglong Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç:
MLFormer: a high performance MPC linear inference framework for transformers. J. Cryptogr. Eng. 15(1): 2 (2025) - 2024
- [j13]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian elimination hardware for cryptographic purposes. J. Cryptogr. Eng. 14(2): 383-397 (2024) - [j12]Junhao Huang, Alexandre Adomnicai, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 1-24 (2024) - [j11]Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang:
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 130-153 (2024) - [j10]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices. IEEE Trans. Inf. Forensics Secur. 19: 3800-3813 (2024) - [j9]Guangyan Li, Zewen Ye, Donglong Chen, Wangchen Dai, Gaoyu Mao, Kejie Huang, Ray C. C. Cheung:
ProgramGalois: A Programmable Generator of Radix-4 Discrete Galois Transformation Architecture for Lattice-Based Cryptography. ACM Trans. Reconfigurable Technol. Syst. 17(4): 53:1-53:32 (2024) - [c9]Zhishuo Huang, Jia Tao, Haosong Zhao, Donglong Chen, Shuyan Zhu, Yinjin Fu, Nong Xiao, Yao Liu:
Unified Lossless-Throughput Architecture for AES and SM4 Encryption with Changeable Keys. ISCAS 2024: 1-5 - [c8]Xuan Yu, Jipeng Zhang, Junhao Huang, Donglong Chen, Lu Zhou:
Multi-way High-Throughput Implementation of Kyber. ISC (2) 2024: 41-60 - [c7]Jipeng Zhang, Junhao Huang, Lirui Zhao, Donglong Chen, Çetin Kaya Koç:
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519. USENIX Security Symposium 2024 - [i8]Shutong Jin, Zhen Gu, Guangyan Li, Donglong Chen, Çetin Kaya Koç, Ray C. C. Cheung, Wangchen Dai:
Efficient Key-Switching for Word-Type FHE and GPU Acceleration. IACR Cryptol. ePrint Arch. 2024: 1629 (2024) - [i7]Zewen Ye, Junhao Huang, Tianshun Huang, Yudan Bai, Jinze Li, Hao Zhang, Guangyan Li, Donglong Chen, Ray C. C. Cheung, Kejie Huang:
PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor. IACR Cryptol. ePrint Arch. 2024: 1754 (2024) - 2023
- [j8]Guangyan Li, Donglong Chen, Gaoyu Mao, Wangchen Dai, Abdurrashid Ibrahim Sanka, Ray C. C. Cheung:
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM. IEEE Trans. Emerg. Top. Comput. 11(4): 824-838 (2023) - [j7]Gaoyu Mao, Donglong Chen, Guangyan Li, Wangchen Dai, Abdurrashid Ibrahim Sanka, Çetin Kaya Koç, Ray C. C. Cheung:
High-performance and Configurable SW/HW Co-design of Post-quantum Signature CRYSTALS-Dilithium. ACM Trans. Reconfigurable Technol. Syst. 16(3): 44:1-44:28 (2023) - [c6]Haosong Zhao, Rui Su, Rui Lin, Jiankuo Dong, Donglong Chen:
Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform. ACNS Workshops 2023: 439-458 - [c5]Jiachen Zhang, Huantong Hou, Jingjing Chen, Donglong Chen:
GC-GAN: Photo Cartoonization Using Guided Cartoon Generative Adversarial Network. ICANN (5) 2023: 65-77 - [i6]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. CoRR abs/2306.11351 (2023) - [i5]Junhao Huang, Haosong Zhao, Jipeng Zhang, Wangchen Dai, Lu Zhou, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices. CoRR abs/2309.00440 (2023) - 2022
- [j6]Yao Xin, Donald Donglong Chen, Chongyang Zeng, Weichen Zhang, Yi Wang, Ray C. C. Cheung:
High Throughput Hardware/Software Heterogeneous System for RRPN-Based Scene Text Detection. IEEE Trans. Computers 71(7): 1507-1521 (2022) - [j5]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 614-636 (2022) - [c4]Zhen Luo, Yingfang Zhang, Peihao Zhong, Jingjing Chen, Donglong Chen:
DiGAN: Directional Generative Adversarial Network for Object Transfiguration. ICMR 2022: 471-479 - [c3]Yao Xin, Guoming Tang, Donglong Chen, Rumin Zhang, Teng Liang, Ray C. C. Cheung, Çetin Kaya Koç:
A Versatility-Performance Balanced Hardware Architecture for Scene Text Detection. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 540-549 - [i4]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian Elimination Hardware for Cryptographic Purposes. IACR Cryptol. ePrint Arch. 2022: 928 (2022) - [i3]Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. IACR Cryptol. ePrint Arch. 2022: 956 (2022)
2010 – 2019
- 2018
- [j4]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
FFT-Based McLaughlin's Montgomery Exponentiation without Conditional Selections. IEEE Trans. Computers 67(9): 1301-1314 (2018) - 2017
- [j3]Wangchen Dai, Donald Donglong Chen, Ray C. C. Cheung, Çetin Kaya Koç:
Area-Time Efficient Architecture of FFT-Based Montgomery Multiplication. IEEE Trans. Computers 66(3): 375-388 (2017) - 2016
- [j2]Donald Donglong Chen, Gavin Xiaoxu Yao, Ray C. C. Cheung, Derek Chi-Wai Pao, Çetin Kaya Koç:
Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication. IEEE Trans. Computers 65(1): 147-160 (2016) - 2015
- [j1]Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Chi-Wai Pao, Ingrid Verbauwhede:
High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems. IEEE Trans. Circuits Syst. I Regul. Pap. 62-I(1): 157-166 (2015) - 2014
- [c2]Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede:
Compact Ring-LWE Cryptoprocessor. CHES 2014: 371-391 - [i2]Donald Donglong Chen, Nele Mentens, Frederik Vercauteren, Sujoy Sinha Roy, Ray C. C. Cheung, Derek Chi-Wai Pao, Ingrid Verbauwhede:
High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 646 (2014) - 2013
- [i1]Sujoy Sinha Roy, Frederik Vercauteren, Nele Mentens, Donald Donglong Chen, Ingrid Verbauwhede:
Compact Hardware Implementation of Ring-LWE Cryptosystems. IACR Cryptol. ePrint Arch. 2013: 866 (2013) - 2012
- [c1]Donald Donglong Chen, Gavin Xiaoxu Yao, Çetin Kaya Koç, Ray C. C. Cheung:
Low complexity and hardware-friendly spectral modular multiplication. FPT 2012: 368-375
Coauthor Index
aka: Ray Chak-Chung Cheung
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-09 22:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint