Bao Li

From MaRDI portal
Person:230256

Available identifiers

zbMath Open li.baoMaRDI QIDQ230256

List of research outcomes





PublicationDate of PublicationType
Buckling mode constraints for topology optimization using eigenvector aggregates2024-08-15Paper
Power of randomness recovery: tighter CCA-secure KEM in the QROM2024-07-19Paper
IND-CCA security of Kyber in the quantum random oracle model, revisited2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization2023-08-04Paper
On constant-round zero-knowledge proofs of knowledge for NP-relations2022-10-28Paper
Prediction of fractional flow reserve based on reduced-order cardiovascular model2022-10-10Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Impact of coronary bifurcated vessels flow-diameter scaling laws on fractional flow reserve based on computed tomography images (FFRCT)2022-04-25Paper
CSURF-TWO: CSIDH for the ratio \((2:1)\)2021-12-08Paper
Group key exchange protocols from supersingular isogenies2021-12-08Paper
Double-base chains for scalar multiplications on elliptic curves2021-12-01Paper
Towards Tightly Secure Deterministic Public Key Encryption2020-07-20Paper
Compact Hierarchical IBE from Lattices in the Standard Model2020-07-20Paper
IBE with tight security against selective opening and chosen-ciphertext attacks2020-07-15Paper
Constructing hyperelliptic covers for elliptic curves over quadratic extension fields2020-05-27Paper
Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates2020-05-27Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope2019-10-31Paper
A Method to Personalize the Lumped Parameter Model of Coronary Artery2019-03-27Paper
Numerical Simulation of Instantaneous Wave-Free Ratio of Stenosed Coronary Artery2019-03-27Paper
Understanding and constructing AKE via double-key key encapsulation mechanism2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN2018-12-07Paper
Models of curves from GHS attack in odd characteristic2018-12-07Paper
Some elliptic subcovers of genus 3 hyperelliptic curves2018-12-07Paper
New framework of password-based authenticated key exchange from only-one lossy encryption2018-11-07Paper
Identity-based lossy encryption from learning with errors2018-10-24Paper
Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions2018-10-24Paper
LWE-based FHE with better parameters2018-10-24Paper
Improved efficiency of MP122018-10-24Paper
Deterministic identity-based encryption from lattices with more compact public parameters2018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)2018-10-24Paper
Leveled strongly-unforgeable identity-based fully homomorphic signatures2018-10-18Paper
Hashing into Jacobi quartic curves2018-10-18Paper
Cover attacks for elliptic curves with cofactor two2018-10-10Paper
Lattice-based dual receiver encryption and more2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem2017-08-25Paper
Lossy Key Encapsulation Mechanism and Its Applications2017-05-19Paper
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation2017-05-05Paper
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks2017-04-12Paper
https://portal.mardi4nfdi.de/entity/Q29734772017-04-03Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation2016-12-21Paper
Approximate-Deterministic Public Key Encryption from Hard Learning Problems2016-12-21Paper
Deterministic Encoding into Twisted Edwards Curves2016-09-02Paper
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling2016-07-25Paper
Lossy Projective Hashing and Its Applications2016-01-12Paper
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks2015-12-02Paper
RSA-OAEP is RKA Secure2015-12-02Paper
A Note on Diem’s Proof2015-11-25Paper
Related-Key Security for Hybrid Encryption2015-11-03Paper
Cryptanalysis of Reduced-Round Whirlwind2015-10-20Paper
First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$2015-10-16Paper
KDM-CCA Security from RKA Secure Authenticated Encryption2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation2015-09-29Paper
https://portal.mardi4nfdi.de/entity/Q52574512015-06-29Paper
Related Key Secure PKE from Hash Proof Systems2015-05-27Paper
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP2015-02-10Paper
Code isolation based iterative compilation optimization for large programs2014-11-03Paper
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function2014-07-07Paper
RKA Secure PKE Based on the DDH and HR Assumptions2013-10-23Paper
How to Remove the Exponent GCD in HK092013-10-23Paper
Round-optimal zero-knowledge proofs of knowledge for NP2013-08-20Paper
On the Expansion Length Of Triple-Base Number Systems2013-06-07Paper
Triple-Base Number System for Scalar Multiplication2013-06-07Paper
Improved Tradeoff between Encapsulation and Decapsulation of HK092013-01-07Paper
Non-malleable Instance-Dependent Commitment in the Standard Model2012-09-07Paper
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring2012-06-29Paper
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing2011-09-16Paper
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key2011-07-07Paper
Encryption Simulatability Reconsidered2011-05-19Paper
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited2011-03-15Paper
https://portal.mardi4nfdi.de/entity/Q34032492010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36109602009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36110032009-03-06Paper
A GENERALIZED SUB-EQUATION EXPANSION METHOD AND ITS APPLICATION TO THE NONLINEAR SCHRÖDINGER EQUATION IN INHOMOGENEOUS OPTICAL FIBER MEDIA2008-06-03Paper
Existence of 3-round zero-knowledge proof systems for NP2008-05-07Paper
Information Security and Cryptology2006-11-14Paper
On Coefficients of Binary Expression of Integer Sums2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q53157312005-09-09Paper
https://portal.mardi4nfdi.de/entity/Q46756392005-05-06Paper
https://portal.mardi4nfdi.de/entity/Q48239292004-10-28Paper
On the syndrome arrays of a class of algebraic-geometric codes2002-08-14Paper
Syndrome series of one point algebraic-geometric codes and majority voting scheme2002-02-18Paper
The permutation property of the bicyclic semigroups2001-10-09Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. II2000-11-26Paper
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I2000-11-26Paper
https://portal.mardi4nfdi.de/entity/Q49453822000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q42080261999-02-04Paper
https://portal.mardi4nfdi.de/entity/Q43681321998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q31238541997-07-16Paper
https://portal.mardi4nfdi.de/entity/Q31238651997-07-16Paper

Research outcomes over time

This page was built for person: Bao Li