| Publication | Date of Publication | Type |
|---|
A flow-induced vibration energy harvester based on bioinspired shell surface bluff body European Journal of Mechanics. B. Fluids | 2025-10-29 | Paper |
Buckling mode constraints for topology optimization using eigenvector aggregates Computer Methods in Applied Mechanics and Engineering | 2024-08-15 | Paper |
| Power of randomness recovery: tighter CCA-secure KEM in the QROM | 2024-07-19 | Paper |
IND-CCA security of Kyber in the quantum random oracle model, revisited Information Security and Cryptology | 2023-08-21 | Paper |
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization Lecture Notes in Computer Science | 2023-08-04 | Paper |
On constant-round zero-knowledge proofs of knowledge for NP-relations Science China Information Sciences | 2022-10-28 | Paper |
Prediction of fractional flow reserve based on reduced-order cardiovascular model Computer Methods in Applied Mechanics and Engineering | 2022-10-10 | Paper |
| Predicting the concrete security of LWE against the dual attack using binary search | 2022-06-08 | Paper |
Impact of coronary bifurcated vessels flow-diameter scaling laws on fractional flow reserve based on computed tomography images (FFRCT) Mathematical Biosciences and Engineering | 2022-04-25 | Paper |
| CSURF-TWO: CSIDH for the ratio \((2:1)\) | 2021-12-08 | Paper |
| Group key exchange protocols from supersingular isogenies | 2021-12-08 | Paper |
| Double-base chains for scalar multiplications on elliptic curves | 2021-12-01 | Paper |
Towards tightly secure deterministic public key encryption Information and Communications Security | 2020-07-20 | Paper |
Compact hierarchical IBE from lattices in the standard model Information and Communications Security | 2020-07-20 | Paper |
IBE with tight security against selective opening and chosen-ciphertext attacks Designs, Codes and Cryptography | 2020-07-15 | Paper |
| Constructing hyperelliptic covers for elliptic curves over quadratic extension fields | 2020-05-27 | Paper |
| Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates | 2020-05-27 | Paper |
| Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
A method to personalize the lumped parameter model of coronary artery International Journal of Computational Methods | 2019-03-27 | Paper |
Numerical Simulation of Instantaneous Wave-Free Ratio of Stenosed Coronary Artery International Journal of Computational Methods | 2019-03-27 | Paper |
| Understanding and constructing AKE via double-key key encapsulation mechanism | 2019-01-23 | Paper |
| Cramer-Shoup like chosen ciphertext security from LPN | 2018-12-07 | Paper |
| Models of curves from GHS attack in odd characteristic | 2018-12-07 | Paper |
| Some elliptic subcovers of genus 3 hyperelliptic curves | 2018-12-07 | Paper |
| New framework of password-based authenticated key exchange from only-one lossy encryption | 2018-11-07 | Paper |
| Identity-based lossy encryption from learning with errors | 2018-10-24 | Paper |
| Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions | 2018-10-24 | Paper |
| LWE-based FHE with better parameters | 2018-10-24 | Paper |
| Improved efficiency of MP12 | 2018-10-24 | Paper |
| Deterministic identity-based encryption from lattices with more compact public parameters | 2018-10-24 | Paper |
| IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) | 2018-10-24 | Paper |
| Leveled strongly-unforgeable identity-based fully homomorphic signatures | 2018-10-18 | Paper |
| Hashing into Jacobi quartic curves | 2018-10-18 | Paper |
Cover attacks for elliptic curves with cofactor two Designs, Codes and Cryptography | 2018-10-10 | Paper |
| Lattice-based dual receiver encryption and more | 2018-09-26 | Paper |
| Dual-mode cryptosystem based on the learning with errors problem | 2017-08-25 | Paper |
Lossy key encapsulation mechanism and its applications Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation Information Security and Cryptology | 2017-05-05 | Paper |
Constructions secure against receiver selective opening and chosen ciphertext attacks Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
| PIT: a framework for effectively composing high-level loop transformations | 2017-04-03 | Paper |
Receiver Selective Opening Security from Indistinguishability Obfuscation Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Approximate-deterministic public key encryption from hard learning problems Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Deterministic encoding into twisted Edwards curves Information Security and Privacy | 2016-09-02 | Paper |
CCA secure public key encryption scheme based on LWE without Gaussian sampling Information Security and Cryptology | 2016-07-25 | Paper |
Lossy Projective Hashing and Its Applications Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Cryptanalysis of three authenticated encryption schemes for wireless sensor networks Information Security and Cryptology | 2015-12-02 | Paper |
RSA-OAEP is RKA secure Information Security and Cryptology | 2015-12-02 | Paper |
A note on Diem's proof Information Security and Cryptology | 2015-11-25 | Paper |
Related-key security for hybrid encryption Lecture Notes in Computer Science | 2015-11-03 | Paper |
Cryptanalysis of reduced-round Whirlwind Information Security and Privacy | 2015-10-20 | Paper |
First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\) Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
KDM-CCA Security from RKA Secure Authenticated Encryption Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation Provable Security | 2015-09-29 | Paper |
| Constructing a hash function from plaintext to Huff curves | 2015-06-29 | Paper |
Related key secure PKE from hash proof systems Advances in Information and Computer Security | 2015-05-27 | Paper |
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP Cryptology and Network Security | 2015-02-10 | Paper |
Code isolation based iterative compilation optimization for large programs Journal of Shanghai Jiaotong University (Chinese Edition) | 2014-11-03 | Paper |
Improved cryptanalysis on reduced-round GOST and Whirlpool hash function Applied Cryptography and Network Security | 2014-07-07 | Paper |
RKA secure PKE based on the DDH and HR assumptions Provable Security | 2013-10-23 | Paper |
How to Remove the Exponent GCD in HK09 Provable Security | 2013-10-23 | Paper |
Round-optimal zero-knowledge proofs of knowledge for NP Science China Information Sciences | 2013-08-20 | Paper |
On the expansion length of triple-base number systems Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Triple-base number system for scalar multiplication Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Improved tradeoff between encapsulation and decapsulation of HK09 Information Security and Cryptology | 2013-01-07 | Paper |
Non-malleable instance-dependent commitment in the standard model Information Security and Privacy | 2012-09-07 | Paper |
Improved efficiency of chosen ciphertext secure encryption from factoring Information Security Practice and Experience | 2012-06-29 | Paper |
Key-dependent message security for division function: discouraging anonymous credential sharing Provable Security | 2011-09-16 | Paper |
Efficient CCA-secure CDH based KEM balanced between ciphertext and key Information Security and Privacy | 2011-07-07 | Paper |
Encryption Simulatability Reconsidered Information Security Practice and Experience | 2011-05-19 | Paper |
Chosen ciphertext secure encryption under factoring assumption revisited Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
| scientific article; zbMATH DE number 5670193 (Why is no real title available?) | 2010-02-12 | Paper |
| Provable secure encrypted key exchange protocol under standard models | 2009-03-06 | Paper |
| Construction of elliptic curves over finite fields with a point of given order | 2009-03-06 | Paper |
A GENERALIZED SUB-EQUATION EXPANSION METHOD AND ITS APPLICATION TO THE NONLINEAR SCHRÖDINGER EQUATION IN INHOMOGENEOUS OPTICAL FIBER MEDIA International Journal of Modern Physics C | 2008-06-03 | Paper |
Existence of 3-round zero-knowledge proof systems for NP Science in China. Series F | 2008-05-07 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
On Coefficients of Binary Expression of Integer Sums The International Series in Engineering and Computer Science | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2204017 (Why is no real title available?) | 2005-09-09 | Paper |
| scientific article; zbMATH DE number 2165706 (Why is no real title available?) | 2005-05-06 | Paper |
| scientific article; zbMATH DE number 2112427 (Why is no real title available?) | 2004-10-28 | Paper |
On the syndrome arrays of a class of algebraic-geometric codes Journal of Lanzhou University. Natural Sciences | 2002-08-14 | Paper |
Syndrome series of one point algebraic-geometric codes and majority voting scheme Chinese Science Bulletin | 2002-02-18 | Paper |
The permutation property of the bicyclic semigroups Journal of Lanzhou University. Natural Sciences | 2001-10-09 | Paper |
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. II Science in China. Series E | 2000-11-26 | Paper |
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I Science in China. Series E | 2000-11-26 | Paper |
| scientific article; zbMATH DE number 1424184 (Why is no real title available?) | 2000-06-07 | Paper |
| scientific article; zbMATH DE number 1195271 (Why is no real title available?) | 1999-02-04 | Paper |
| scientific article; zbMATH DE number 1094108 (Why is no real title available?) | 1998-03-10 | Paper |
| scientific article; zbMATH DE number 989168 (Why is no real title available?) | 1997-07-16 | Paper |
| scientific article; zbMATH DE number 989176 (Why is no real title available?) | 1997-07-16 | Paper |