Yunlei Zhao

From MaRDI portal
(Redirected from Person:271591)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
FPTRU: optimization of NTRU-prime and TLS performance assessment2026-01-08Paper
CPA-secure KEMS are also sufficient for post-quantum TLS 1.32025-07-03Paper
Sign-then-encrypt with security enhancement and compressed ciphertext
Theoretical Computer Science
2025-01-08Paper
Fully anonymous identity-based broadcast signcryption with public verification
Theoretical Computer Science
2024-03-05Paper
Half-aggregation of Schnorr signatures with tight reductions
Computer Security – ESORICS 2022
2023-07-28Paper
Tight Analysis of Decryption Failure Probability of Kyber in Reality2022-12-09Paper
Compact Lossy and All-but-One Trapdoor Functions from Lattice
Information Security Practice and Experience
2022-12-09Paper
Certificateless identity-concealed authenticated encryption under multi-KGC
Information Security and Cryptology
2022-10-14Paper
Compact and Flexible KEM From Ideal Lattice
IEEE Transactions on Information Theory
2022-07-13Paper
Identity-based authenticated encryption with identity confidentiality
Theoretical Computer Science
2022-01-18Paper
Number theoretic transform: generalization, optimization, concrete analysis and applications2021-12-08Paper
SKCN: practical and flexible digital signature from module lattice2021-06-08Paper
Functional broadcast encryption with applications to data sharing for cloud storage
Information Sciences
2021-02-04Paper
Generic and practical key establishment from lattice2020-01-30Paper
Efficient tag path authentication protocol with less tag memory2018-12-07Paper
Cryptanalysis of RLWE-based one-pass authenticated key exchange2018-09-12Paper
Concurrent knowledge extraction in public-key models
Journal of Cryptology
2016-04-07Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model
Provable Security
2016-01-27Paper
Security model and analysis of FHMQV, revisited
Information Security and Cryptology
2015-12-02Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
All-but-one dual projective hashing and its applications
Applied Cryptography and Network Security
2014-07-07Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Accountable Authority Identity-Based Encryption with Public Traceability
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Computationally-fair group and identity-based key-exchange
Lecture Notes in Computer Science
2012-07-16Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
Designated confirmer signatures with unified verification
Cryptography and Coding
2011-12-16Paper
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
Provable Security
2011-09-16Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
Public Key Cryptography – PKC 2011
2011-03-15Paper
A new framework for RFID privacy
Computer Security – ESORICS 2010
2010-09-20Paper
Concurrent knowledge extraction in the public-key model
Automata, Languages and Programming
2010-09-07Paper
Deniable internet key exchange
Applied Cryptography and Network Security
2010-07-06Paper
A note on the Dwork-Naor timed deniable authentication
Information Processing Letters
2010-01-29Paper
A note on the Cramer-Damgård identification scheme2009-03-24Paper
A note on the feasibility of generalised universal composability
Mathematical Structures in Computer Science
2009-03-24Paper
A note on universal composable zero-knowledge in the common reference string model
Theoretical Computer Science
2009-03-20Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
A Note on the Feasibility of Generalized Universal Composability
Lecture Notes in Computer Science
2007-11-13Paper
A Note on Universal Composable Zero Knowledge in Common Reference String Model
Lecture Notes in Computer Science
2007-11-13Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Some variants of SAT and their properties
Progress in Natural Science
2004-03-16Paper
Present random computations in a uniform way
Progress in Natural Science
2004-03-16Paper
Efficient 4-round zero-knowledge proof system for NP
Progress in Natural Science
2004-03-16Paper


Research outcomes over time


This page was built for person: Yunlei Zhao