The following pages link to Yunlei Zhao (Q271591):
Displayed 39 items.
- Concurrent knowledge extraction in public-key models (Q271592) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- A note on the Dwork-Naor timed deniable authentication (Q845814) (← links)
- A note on universal composable zero-knowledge in the common reference string model (Q1007253) (← links)
- Present random computations in a uniform way (Q1425327) (← links)
- Some variants of SAT and their properties (Q1425331) (← links)
- Efficient 4-round zero-knowledge proof system for NP (Q1425336) (← links)
- Efficient tag path authentication protocol with less tag memory (Q1631853) (← links)
- Cryptanalysis of RLWE-based one-pass authenticated key exchange (Q1673602) (← links)
- SKCN: practical and flexible digital signature from module lattice (Q2030865) (← links)
- Number theoretic transform: generalization, optimization, concrete analysis and applications (Q2057175) (← links)
- Identity-based authenticated encryption with identity confidentiality (Q2067611) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Generic and practical key establishment from lattice (Q2291394) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Computationally-Fair Group and Identity-Based Key-Exchange (Q2898034) (← links)
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 (Q3084354) (← links)
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage (Q3092372) (← links)
- Designated Confirmer Signatures with Unified Verification (Q3104715) (← links)
- Security Model and Analysis of FHMQV, Revisited (Q3454157) (← links)
- Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model (Q3464414) (← links)
- Deniable Internet Key Exchange (Q3575056) (← links)
- Concurrent Knowledge Extraction in the Public-Key Model (Q3587420) (← links)
- A New Framework for RFID Privacy (Q3589832) (← links)
- (Q3616142) (← links)
- A note on the feasibility of generalised universal composability (Q3616225) (← links)
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks (Q4910227) (← links)
- Accountable Authority Identity-Based Encryption with Public Traceability (Q4910248) (← links)
- Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC (Q5040411) (← links)
- Compact Lossy and All-but-One Trapdoor Functions from Lattice (Q5056023) (← links)
- Compact and Flexible KEM From Ideal Lattice (Q5088511) (← links)
- All-but-One Dual Projective Hashing and Its Applications (Q5168541) (← links)
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack (Q5418690) (← links)
- A Note on Universal Composable Zero Knowledge in Common Reference String Model (Q5425457) (← links)
- A Note on the Feasibility of Generalized Universal Composability (Q5425458) (← links)
- Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model (Q5429387) (← links)
- Theory of Cryptography (Q5898640) (← links)
- Half-aggregation of Schnorr signatures with tight reductions (Q6109444) (← links)
- Fully anonymous identity-based broadcast signcryption with public verification (Q6190008) (← links)