Bao Li

From MaRDI portal
(Redirected from Person:230256)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A flow-induced vibration energy harvester based on bioinspired shell surface bluff body
European Journal of Mechanics. B. Fluids
2025-10-29Paper
Buckling mode constraints for topology optimization using eigenvector aggregates
Computer Methods in Applied Mechanics and Engineering
2024-08-15Paper
Power of randomness recovery: tighter CCA-secure KEM in the QROM2024-07-19Paper
IND-CCA security of Kyber in the quantum random oracle model, revisited
Information Security and Cryptology
2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
Lecture Notes in Computer Science
2023-08-04Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations
Science China Information Sciences
2022-10-28Paper
Prediction of fractional flow reserve based on reduced-order cardiovascular model
Computer Methods in Applied Mechanics and Engineering
2022-10-10Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Impact of coronary bifurcated vessels flow-diameter scaling laws on fractional flow reserve based on computed tomography images (FFRCT)
Mathematical Biosciences and Engineering
2022-04-25Paper
CSURF-TWO: CSIDH for the ratio \((2:1)\)2021-12-08Paper
Group key exchange protocols from supersingular isogenies2021-12-08Paper
Double-base chains for scalar multiplications on elliptic curves2021-12-01Paper
Towards tightly secure deterministic public key encryption
Information and Communications Security
2020-07-20Paper
Compact hierarchical IBE from lattices in the standard model
Information and Communications Security
2020-07-20Paper
IBE with tight security against selective opening and chosen-ciphertext attacks
Designs, Codes and Cryptography
2020-07-15Paper
Constructing hyperelliptic covers for elliptic curves over quadratic extension fields2020-05-27Paper
Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates2020-05-27Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope2019-10-31Paper
A method to personalize the lumped parameter model of coronary artery
International Journal of Computational Methods
2019-03-27Paper
Numerical Simulation of Instantaneous Wave-Free Ratio of Stenosed Coronary Artery
International Journal of Computational Methods
2019-03-27Paper
Understanding and constructing AKE via double-key key encapsulation mechanism2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN2018-12-07Paper
Models of curves from GHS attack in odd characteristic2018-12-07Paper
Some elliptic subcovers of genus 3 hyperelliptic curves2018-12-07Paper
New framework of password-based authenticated key exchange from only-one lossy encryption2018-11-07Paper
Identity-based lossy encryption from learning with errors2018-10-24Paper
Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions2018-10-24Paper
LWE-based FHE with better parameters2018-10-24Paper
Improved efficiency of MP122018-10-24Paper
Deterministic identity-based encryption from lattices with more compact public parameters2018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)2018-10-24Paper
Leveled strongly-unforgeable identity-based fully homomorphic signatures2018-10-18Paper
Hashing into Jacobi quartic curves2018-10-18Paper
Cover attacks for elliptic curves with cofactor two
Designs, Codes and Cryptography
2018-10-10Paper
Lattice-based dual receiver encryption and more2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem2017-08-25Paper
Lossy key encapsulation mechanism and its applications
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
Information Security and Cryptology
2017-05-05Paper
Constructions secure against receiver selective opening and chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
PIT: a framework for effectively composing high-level loop transformations2017-04-03Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Approximate-deterministic public key encryption from hard learning problems
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Deterministic encoding into twisted Edwards curves
Information Security and Privacy
2016-09-02Paper
CCA secure public key encryption scheme based on LWE without Gaussian sampling
Information Security and Cryptology
2016-07-25Paper
Lossy Projective Hashing and Its Applications
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Cryptanalysis of three authenticated encryption schemes for wireless sensor networks
Information Security and Cryptology
2015-12-02Paper
RSA-OAEP is RKA secure
Information Security and Cryptology
2015-12-02Paper
A note on Diem's proof
Information Security and Cryptology
2015-11-25Paper
Related-key security for hybrid encryption
Lecture Notes in Computer Science
2015-11-03Paper
Cryptanalysis of reduced-round Whirlwind
Information Security and Privacy
2015-10-20Paper
First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\)
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
KDM-CCA Security from RKA Secure Authenticated Encryption
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation
Provable Security
2015-09-29Paper
Constructing a hash function from plaintext to Huff curves2015-06-29Paper
Related key secure PKE from hash proof systems
Advances in Information and Computer Security
2015-05-27Paper
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP
Cryptology and Network Security
2015-02-10Paper
Code isolation based iterative compilation optimization for large programs
Journal of Shanghai Jiaotong University (Chinese Edition)
2014-11-03Paper
Improved cryptanalysis on reduced-round GOST and Whirlpool hash function
Applied Cryptography and Network Security
2014-07-07Paper
RKA secure PKE based on the DDH and HR assumptions
Provable Security
2013-10-23Paper
How to Remove the Exponent GCD in HK09
Provable Security
2013-10-23Paper
Round-optimal zero-knowledge proofs of knowledge for NP
Science China Information Sciences
2013-08-20Paper
On the expansion length of triple-base number systems
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Triple-base number system for scalar multiplication
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Improved tradeoff between encapsulation and decapsulation of HK09
Information Security and Cryptology
2013-01-07Paper
Non-malleable instance-dependent commitment in the standard model
Information Security and Privacy
2012-09-07Paper
Improved efficiency of chosen ciphertext secure encryption from factoring
Information Security Practice and Experience
2012-06-29Paper
Key-dependent message security for division function: discouraging anonymous credential sharing
Provable Security
2011-09-16Paper
Efficient CCA-secure CDH based KEM balanced between ciphertext and key
Information Security and Privacy
2011-07-07Paper
Encryption Simulatability Reconsidered
Information Security Practice and Experience
2011-05-19Paper
Chosen ciphertext secure encryption under factoring assumption revisited
Public Key Cryptography – PKC 2011
2011-03-15Paper
scientific article; zbMATH DE number 5670193 (Why is no real title available?)2010-02-12Paper
Provable secure encrypted key exchange protocol under standard models2009-03-06Paper
Construction of elliptic curves over finite fields with a point of given order2009-03-06Paper
A GENERALIZED SUB-EQUATION EXPANSION METHOD AND ITS APPLICATION TO THE NONLINEAR SCHRÖDINGER EQUATION IN INHOMOGENEOUS OPTICAL FIBER MEDIA
International Journal of Modern Physics C
2008-06-03Paper
Existence of 3-round zero-knowledge proof systems for NP
Science in China. Series F
2008-05-07Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
On Coefficients of Binary Expression of Integer Sums
The International Series in Engineering and Computer Science
2005-11-02Paper
scientific article; zbMATH DE number 2204017 (Why is no real title available?)2005-09-09Paper
scientific article; zbMATH DE number 2165706 (Why is no real title available?)2005-05-06Paper
scientific article; zbMATH DE number 2112427 (Why is no real title available?)2004-10-28Paper
On the syndrome arrays of a class of algebraic-geometric codes
Journal of Lanzhou University. Natural Sciences
2002-08-14Paper
Syndrome series of one point algebraic-geometric codes and majority voting scheme
Chinese Science Bulletin
2002-02-18Paper
The permutation property of the bicyclic semigroups
Journal of Lanzhou University. Natural Sciences
2001-10-09Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. II
Science in China. Series E
2000-11-26Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I
Science in China. Series E
2000-11-26Paper
scientific article; zbMATH DE number 1424184 (Why is no real title available?)2000-06-07Paper
scientific article; zbMATH DE number 1195271 (Why is no real title available?)1999-02-04Paper
scientific article; zbMATH DE number 1094108 (Why is no real title available?)1998-03-10Paper
scientific article; zbMATH DE number 989168 (Why is no real title available?)1997-07-16Paper
scientific article; zbMATH DE number 989176 (Why is no real title available?)1997-07-16Paper


Research outcomes over time


This page was built for person: Bao Li