Bao Li

From MaRDI portal
Person:230256

Available identifiers

zbMath Open li.baoMaRDI QIDQ230256

List of research outcomes

PublicationDate of PublicationType
IND-CCA security of Kyber in the quantum random oracle model, revisited2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization2023-08-04Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations2022-10-28Paper
Prediction of fractional flow reserve based on reduced-order cardiovascular model2022-10-10Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Impact of coronary bifurcated vessels flow-diameter scaling laws on fractional flow reserve based on computed tomography images (FFRCT)2022-04-25Paper
CSURF-TWO: CSIDH for the ratio \((2:1)\)2021-12-08Paper
Group key exchange protocols from supersingular isogenies2021-12-08Paper
Double-base chains for scalar multiplications on elliptic curves2021-12-01Paper
Towards Tightly Secure Deterministic Public Key Encryption2020-07-20Paper
Compact Hierarchical IBE from Lattices in the Standard Model2020-07-20Paper
IBE with tight security against selective opening and chosen-ciphertext attacks2020-07-15Paper
Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates2020-05-27Paper
Constructing hyperelliptic covers for elliptic curves over quadratic extension fields2020-05-27Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope2019-10-31Paper
A Method to Personalize the Lumped Parameter Model of Coronary Artery2019-03-27Paper
Numerical Simulation of Instantaneous Wave-Free Ratio of Stenosed Coronary Artery2019-03-27Paper
Understanding and constructing AKE via double-key key encapsulation mechanism2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN2018-12-07Paper
Models of curves from GHS attack in odd characteristic2018-12-07Paper
Some elliptic subcovers of genus 3 hyperelliptic curves2018-12-07Paper
New framework of password-based authenticated key exchange from only-one lossy encryption2018-11-07Paper
Identity-based lossy encryption from learning with errors2018-10-24Paper
Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions2018-10-24Paper
LWE-based FHE with better parameters2018-10-24Paper
Improved efficiency of MP122018-10-24Paper
Deterministic identity-based encryption from lattices with more compact public parameters2018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)2018-10-24Paper
Leveled strongly-unforgeable identity-based fully homomorphic signatures2018-10-18Paper
Hashing into Jacobi quartic curves2018-10-18Paper
Cover attacks for elliptic curves with cofactor two2018-10-10Paper
Lattice-based dual receiver encryption and more2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem2017-08-25Paper
Lossy Key Encapsulation Mechanism and Its Applications2017-05-19Paper
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation2017-05-05Paper
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks2017-04-12Paper
https://portal.mardi4nfdi.de/entity/Q29734772017-04-03Paper
Approximate-Deterministic Public Key Encryption from Hard Learning Problems2016-12-21Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation2016-12-21Paper
Deterministic Encoding into Twisted Edwards Curves2016-09-02Paper
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling2016-07-25Paper
Lossy Projective Hashing and Its Applications2016-01-12Paper
RSA-OAEP is RKA Secure2015-12-02Paper
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks2015-12-02Paper
A Note on Diem’s Proof2015-11-25Paper
Related-Key Security for Hybrid Encryption2015-11-03Paper
Cryptanalysis of Reduced-Round Whirlwind2015-10-20Paper
First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$2015-10-16Paper
KDM-CCA Security from RKA Secure Authenticated Encryption2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation2015-09-29Paper
https://portal.mardi4nfdi.de/entity/Q52574512015-06-29Paper
Related Key Secure PKE from Hash Proof Systems2015-05-27Paper
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP2015-02-10Paper
https://portal.mardi4nfdi.de/entity/Q29235442014-11-03Paper
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function2014-07-07Paper
How to Remove the Exponent GCD in HK092013-10-23Paper
RKA Secure PKE Based on the DDH and HR Assumptions2013-10-23Paper
Round-optimal zero-knowledge proofs of knowledge for NP2013-08-20Paper
On the Expansion Length Of Triple-Base Number Systems2013-06-07Paper
Triple-Base Number System for Scalar Multiplication2013-06-07Paper
Improved Tradeoff between Encapsulation and Decapsulation of HK092013-01-07Paper
Non-malleable Instance-Dependent Commitment in the Standard Model2012-09-07Paper
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring2012-06-29Paper
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing2011-09-16Paper
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key2011-07-07Paper
Encryption Simulatability Reconsidered2011-05-19Paper
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited2011-03-15Paper
https://portal.mardi4nfdi.de/entity/Q34032492010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36109602009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110032009-03-06Paper
A GENERALIZED SUB-EQUATION EXPANSION METHOD AND ITS APPLICATION TO THE NONLINEAR SCHRÖDINGER EQUATION IN INHOMOGENEOUS OPTICAL FIBER MEDIA2008-06-03Paper
Existence of 3-round zero-knowledge proof systems for NP2008-05-07Paper
Information Security and Cryptology2006-11-14Paper
On Coefficients of Binary Expression of Integer Sums2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q53157312005-09-09Paper
https://portal.mardi4nfdi.de/entity/Q46756392005-05-06Paper
https://portal.mardi4nfdi.de/entity/Q48239292004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q27353412002-08-14Paper
Syndrome series of one point algebraic-geometric codes and majority voting scheme2002-02-18Paper
https://portal.mardi4nfdi.de/entity/Q27130762001-10-09Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. II2000-11-26Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I2000-11-26Paper
https://portal.mardi4nfdi.de/entity/Q49453822000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q42080261999-02-04Paper
https://portal.mardi4nfdi.de/entity/Q43681321998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q31238541997-07-16Paper
https://portal.mardi4nfdi.de/entity/Q31238651997-07-16Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Bao Li