Shuai Han

From MaRDI portal
Person:1647555

Available identifiers

zbMath Open han.shuaiMaRDI QIDQ1647555

List of research outcomes





PublicationDate of PublicationType
Functional commitments for arbitrary circuits of bounded sizes2024-12-11Paper
Universal composable password authenticated key exchange for the post-quantum world2024-11-13Paper
More efficient public-key cryptography with leakage and tamper resilience2024-11-12Paper
Multi-hop fine-grained proxy re-encryption2024-11-12Paper
High accuracy AUV-aided underwater localization: far-field information fusion perspective2024-09-16Paper
Fine-grained proxy re-encryption: definitions and constructions from LWE2024-09-13Paper
Robustly reusable fuzzy extractor from isogeny2024-08-20Paper
Biometric-based two-factor authentication scheme under database leakage2024-05-02Paper
Entropy regularization methods for parameter space exploration2024-04-25Paper
Almost tight multi-user security under adaptive corruptions from LWE in the standard model2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model2023-12-12Paper
EKE meets tight security in the universally composable framework2023-11-24Paper
Fine-grained verifier NIZK and its applications2023-11-16Paper
Early detection of rotating stall in axial flow compressors via deterministic learning: detectability analysis2023-11-07Paper
Privacy-preserving authenticated key exchange in the standard model2023-08-25Paper
Anonymous public key encryption under corruptions2023-08-25Paper
Fuzzy authenticated key exchange with tight security2023-07-28Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness2023-05-12Paper
Simulatable verifiable random function from the LWE assumption2023-04-27Paper
Approaching epidemiological dynamics of COVID-19 with physics-informed neural networks2023-02-17Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
Tightly CCA-secure inner product functional encryption scheme2021-12-01Paper
Pseudorandom functions in NC class from the standard LWE assumption2021-11-11Paper
Multilinear maps from obfuscation2020-06-15Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system2020-03-09Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
QANIZK for adversary-dependent languages and their applications2019-06-06Paper
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption2018-10-10Paper
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system2018-06-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions2018-05-16Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness2018-04-06Paper
KDM-secure public-key encryption from constant-noise LPN2017-08-25Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks2017-05-05Paper
Efficient KDM-CCA secure public-key encryption for polynomial functions2017-01-06Paper
Improved bounds on negativity of superpositions2013-01-28Paper

Research outcomes over time

This page was built for person: Shuai Han