Xianhui Lu

From MaRDI portal
Revision as of 08:46, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:989582

Available identifiers

zbMath Open lu.xianhuiMaRDI QIDQ989582

List of research outcomes





PublicationDate of PublicationType
Circuit bootstrapping: faster and smaller2024-11-12Paper
Improved homomorphic evaluation for hash function based on TFHE2024-07-19Paper
Power of randomness recovery: tighter CCA-secure KEM in the QROM2024-07-19Paper
Full domain functional bootstrapping with least significant bit encoding2024-07-17Paper
Revisiting key switching techniques with applications to light-key FHE2024-05-31Paper
IND-CCA security of Kyber in the quantum random oracle model, revisited2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization2023-08-04Paper
Hybrid dual and meet-LWE attack2023-07-26Paper
Attacking ECDSA leaking discrete bits with a more efficient lattice2022-07-01Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Compact (Targeted Homomorphic) Inner Product Encryption from LWE2020-07-20Paper
Towards Tightly Secure Deterministic Public Key Encryption2020-07-20Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope2019-10-31Paper
Understanding and constructing AKE via double-key key encapsulation mechanism2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN2018-12-07Paper
Identity-based lossy encryption from learning with errors2018-10-24Paper
Improved efficiency of MP122018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)2018-10-24Paper
Lattice-based dual receiver encryption and more2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem2017-08-25Paper
Lossy Key Encapsulation Mechanism and Its Applications2017-05-19Paper
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation2017-05-05Paper
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks2017-04-12Paper
Approximate-Deterministic Public Key Encryption from Hard Learning Problems2016-12-21Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation2016-12-21Paper
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling2016-07-25Paper
Lossy Projective Hashing and Its Applications2016-01-12Paper
RSA-OAEP is RKA Secure2015-12-02Paper
Related-Key Security for Hybrid Encryption2015-11-03Paper
KDM-CCA Security from RKA Secure Authenticated Encryption2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation2015-09-29Paper
Related Key Secure PKE from Hash Proof Systems2015-05-27Paper
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP2015-02-10Paper
How to Remove the Exponent GCD in HK092013-10-23Paper
RKA Secure PKE Based on the DDH and HR Assumptions2013-10-23Paper
Improved Tradeoff between Encapsulation and Decapsulation of HK092013-01-07Paper
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring2012-06-29Paper
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing2011-09-16Paper
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key2011-07-07Paper
Encryption Simulatability Reconsidered2011-05-19Paper
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited2011-03-15Paper
Improved efficiency of Kiltz07-KEM2010-08-20Paper
https://portal.mardi4nfdi.de/entity/Q36100502009-03-06Paper

Research outcomes over time

This page was built for person: Xianhui Lu