| Publication | Date of Publication | Type |
|---|
| Efficient KZG-based univariate sum-check and lookup argument | 2024-11-12 | Paper |
| A refined hardness estimation of LWE in two-step mode | 2024-11-12 | Paper |
| More efficient public-key cryptography with leakage and tamper resilience | 2024-11-12 | Paper |
| FaBFT: flexible asynchronous BFT protocol using DAG | 2024-07-19 | Paper |
| Polynomial IOPs for memory consistency checks in zero-knowledge virtual machines | 2024-06-26 | Paper |
Biometric-based two-factor authentication scheme under database leakage Theoretical Computer Science | 2024-05-02 | Paper |
| Ciphertext policy attribute-based encryption for circuits from LWE assumption | 2024-04-19 | Paper |
Almost tight multi-user security under adaptive corruptions from LWE in the standard model Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
EKE meets tight security in the universally composable framework Lecture Notes in Computer Science | 2023-11-24 | Paper |
Fine-grained verifier NIZK and its applications Lecture Notes in Computer Science | 2023-11-16 | Paper |
Functional encryption against probabilistic queries: definition, construction and applications Lecture Notes in Computer Science | 2023-11-16 | Paper |
Privacy-preserving authenticated key exchange in the standard model Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
A universally composable non-interactive aggregate cash system Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion Information Security and Cryptology | 2023-08-21 | Paper |
Further cryptanalysis of a type of RSA variants Lecture Notes in Computer Science | 2023-08-04 | Paper |
Fuzzy authenticated key exchange with tight security Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
More efficient verifiable functional encryption Provable and Practical Security | 2023-07-21 | Paper |
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness Lecture Notes in Computer Science | 2023-05-12 | Paper |
Simulatable verifiable random function from the LWE assumption Theoretical Computer Science | 2023-04-27 | Paper |
| Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
A New General Method of Searching for Cubes in Cube Attacks 1515.94063 | 2022-12-21 | Paper |
Precise bounded-concurrent zero-knowledge proofs for NP Science China Information Sciences | 2022-10-28 | Paper |
SymSem: Symbolic Execution with Time Stamps for Deobfuscation Information Security and Cryptology | 2022-10-14 | Paper |
Public-key puncturable encryption: modular and compact constructions Lecture Notes in Computer Science | 2022-10-13 | Paper |
| Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
Tightly CCA-secure inner product functional encryption scheme Theoretical Computer Science | 2021-12-01 | Paper |
New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries Information and Computation | 2021-11-25 | Paper |
Pseudorandom functions in NC class from the standard LWE assumption Designs, Codes and Cryptography | 2021-11-11 | Paper |
| Tightly secure chameleon hash functions in the multi-user setting and their applications | 2021-06-08 | Paper |
Robustly reusable fuzzy extractor with imperfect randomness Designs, Codes and Cryptography | 2021-05-10 | Paper |
| RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
| Pseudorandom functions from LWE: RKA security and application | 2020-05-27 | Paper |
| Tight leakage-resilient CCA-security from quasi-adaptive hash proof system | 2020-03-09 | Paper |
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman Information Sciences | 2020-02-07 | Paper |
| Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
| Generic constructions of robustly reusable fuzzy extractor | 2020-01-28 | Paper |
Structure-preserving public-key encryption with leakage-resilient CCA security Theoretical Computer Science | 2019-10-18 | Paper |
Tightly secure signature schemes from the LWE and subset sum assumptions Theoretical Computer Science | 2019-10-18 | Paper |
A generic construction of tightly secure signatures in the multi-user setting Theoretical Computer Science | 2019-05-29 | Paper |
Beyond-birthday secure domain-preserving PRFs from a single permutation Designs, Codes and Cryptography | 2019-05-24 | Paper |
| PAC learning depth-3 \(\mathrm{AC}^0\) circuits of bounded top fanin | 2019-01-10 | Paper |
| On the robustness of learning parity with noise | 2018-10-26 | Paper |
| Tightly SIM-SO-CCA secure public key encryption from standard assumptions | 2018-05-16 | Paper |
| A modified fuzzy fingerprint vault based on pair-polar minutiae structures | 2018-04-20 | Paper |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness Designs, Codes and Cryptography | 2018-04-06 | Paper |
| Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
| Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
| Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
Public key encryption resilient to leakage and tampering attacks Journal of Computer and System Sciences | 2017-09-07 | Paper |
| Tightly-secure signatures from the decisional composite residuosity assumption | 2017-08-25 | Paper |
Learning \(\mathrm{AC}^0\) under \(k\)-dependent distributions Lecture Notes in Computer Science | 2017-05-19 | Paper |
Ridge-based profiled differential power analysis Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
How to build fully secure tweakable blockciphers from classical blockciphers Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Efficient completely non-malleable and RKA secure public key encryptions Information Security and Privacy | 2016-09-02 | Paper |
Four-round zero-knowledge arguments of knowledge with strict polynomial-time simulation from differing-input obfuscation for circuits Lecture Notes in Computer Science | 2016-09-02 | Paper |
Differential power analysis of stream ciphers with LFSRs Computers & Mathematics with Applications | 2016-07-06 | Paper |
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond Lecture Notes in Computer Science | 2015-12-10 | Paper |
Automatic detection and analysis of encrypted messages in malware Information Security and Cryptology | 2015-12-02 | Paper |
| scientific article; zbMATH DE number 6499818 (Why is no real title available?) | 2015-10-28 | Paper |
| scientific article; zbMATH DE number 6499819 (Why is no real title available?) | 2015-10-28 | Paper |
Secure lightweight entity authentication with strong PUFs: Mission impossible? Advanced Information Systems Engineering | 2015-07-21 | Paper |
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions Theory of Cryptography | 2015-07-06 | Paper |
Efficient leakage-resilient identity-based encryption with CCA security Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Improved impossible differential attacks on large-block Rijndael Lecture Notes in Computer Science | 2013-06-04 | Paper |
New observations on impossible differential cryptanalysis of reduced-round Camellia Fast Software Encryption | 2013-01-08 | Paper |
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming Information Security and Cryptology | 2013-01-07 | Paper |
On weaknesses of the HDCP authentication and key exchange protocol and its repair Mathematical and Computer Modelling | 2012-08-24 | Paper |
Impossible differential attacks on reduced-round LBlock Information Security Practice and Experience | 2012-06-29 | Paper |
Provably secure three-party password-based authenticated key exchange protocol Information Sciences | 2012-06-08 | Paper |
Efficient pairing computation on elliptic curves in Hessian form Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Precise time and space simulatable zero-knowledge Provable Security | 2011-09-16 | Paper |
On obfuscating programs with tamper-proof hardware Information Security and Cryptology | 2011-07-29 | Paper |
A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption Lecture Notes in Computer Science | 2011-07-01 | Paper |
A general and efficient obfuscation for programs with tamper-proof hardware Information Security Practice and Experience | 2011-05-19 | Paper |
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES International Journal of Foundations of Computer Science | 2011-01-19 | Paper |
Precise zero-knowledge arguments with poly-logarithmic efficiency Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
On sequential composition of precise zero-knowledge Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
| New fuzzy identity-based encryption in the standard model | 2010-12-22 | Paper |
Differential-multiple linear cryptanalysis Information Security and Cryptology | 2010-11-23 | Paper |
Fully CCA2 secure identity based broadcast encryption without random oracles Information Processing Letters | 2010-08-16 | Paper |
A program understanding approach for stripped binary code Journal of Computer Applications | 2010-03-06 | Paper |
Efficient scalar multiplication for elliptic curves over binary fields Wuhan University Journal of Natural Sciences | 2010-02-12 | Paper |
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗ Cryptologia | 2009-11-16 | Paper |
| Further sharpening of Euclid's argument on the infinitude of primes | 2009-11-11 | Paper |
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor Information Security and Cryptology | 2009-02-10 | Paper |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
| Efficient hierarchical identity based encryption scheme in the standard model | 2008-09-12 | Paper |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security Provable Security | 2008-06-10 | Paper |
Ono invariants of imaginary quadratic fields with class number three Journal of Number Theory | 2008-02-04 | Paper |
Further analysis of block ciphers against timing attacks Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Formalization of fault analysis and a new approach of fault detection Journal of Shanghai Jiaotong University (Science) | 2007-05-09 | Paper |
| Authenticated key agreement in group settings | 2007-01-02 | Paper |
| The performance research of group rekey algorithm | 2006-05-26 | Paper |
| scientific article; zbMATH DE number 2222199 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2215870 (Why is no real title available?) | 2005-10-18 | Paper |
| scientific article; zbMATH DE number 2112463 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 1941237 (Why is no real title available?) | 2003-06-29 | Paper |