| Publication | Date of Publication | Type |
|---|
Full domain functional bootstrapping using the prime cyclotomic ring Theoretical Computer Science | 2025-08-01 | Paper |
| Memory-efficient BKW algorithm for solving the LWE problem | 2025-07-29 | Paper |
| Circuit bootstrapping: faster and smaller | 2024-11-12 | Paper |
| Full domain functional bootstrapping with least significant bit encoding | 2024-07-17 | Paper |
| Revisiting key switching techniques with applications to light-key FHE | 2024-05-31 | Paper |
Subfield attacks on HSVP in ideal lattices Information Security and Cryptology | 2023-08-21 | Paper |
Efficient scalar multiplication on Koblitz curves with pre-computation Lecture Notes in Computer Science | 2023-08-04 | Paper |
| Bowley's Law Revisited Again | 2023-08-04 | Paper |
Hybrid dual and meet-LWE attack Information Security and Privacy | 2023-07-26 | Paper |
Verifiable Decryption for Fully Homomorphic Encryption Developments in Language Theory | 2023-06-30 | Paper |
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding Information Security Practice and Experience | 2023-06-30 | Paper |
Cubic surface fitting to image by combination Science China Information Sciences | 2022-10-28 | Paper |
| Improved digital signatures based on elliptic curve endomorphism rings | 2022-08-30 | Paper |
Strong convergence properties for partial sums of asymptotically negatively associated random vectors in Hilbert spaces Communications in Statistics: Theory and Methods | 2022-05-20 | Paper |
Leader-following consensus of nonlinear multi-agent systems with hybrid delays: distributed impulsive pinning strategy Applied Mathematics and Computation | 2022-05-19 | Paper |
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme Information Sciences | 2020-10-07 | Paper |
Compact (targeted homomorphic) inner product encryption from LWE Information and Communications Security | 2020-07-20 | Paper |
| Strongly secure authenticated key exchange from supersingular isogenies | 2020-05-20 | Paper |
| Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
| The Cobb-Douglas production function revisited | 2019-10-11 | Paper |
| The Hamiltonian approach to the problem of derivation of production functions in economic growth theory | 2019-06-26 | Paper |
| Pulse signal recovery method based on sparse representation | 2019-02-22 | Paper |
| Analysis of fractional \(\omega\)mbNAF for scalar multiplication | 2018-12-07 | Paper |
| Models of curves from GHS attack in odd characteristic | 2018-12-07 | Paper |
| Some elliptic subcovers of genus 3 hyperelliptic curves | 2018-12-07 | Paper |
| LWE-based FHE with better parameters | 2018-10-24 | Paper |
| Leveled strongly-unforgeable identity-based fully homomorphic signatures | 2018-10-18 | Paper |
| Hashing into Jacobi quartic curves | 2018-10-18 | Paper |
Cover attacks for elliptic curves with cofactor two Designs, Codes and Cryptography | 2018-10-10 | Paper |
| Hashing into twisted Jacobi intersection curves | 2018-04-20 | Paper |
Generation of a family of fractional order hyper-chaotic multi-scroll attractors Chaos, Solitons and Fractals | 2018-02-02 | Paper |
| Optimization of lattice sandwich structure with sequential quadratic programming algorithm | 2017-07-14 | Paper |
Constructing isogenies on extended Jacobi quartic curves Information Security and Cryptology | 2017-05-05 | Paper |
Generation and circuit implementation of fractional-order multi-scroll attractors Chaos, Solitons and Fractals | 2017-02-09 | Paper |
Scheduling a single vehicle in the just-in-time part supply for a mixed-model assembly line Computers & Operations Research | 2016-11-10 | Paper |
Deterministic encoding into twisted Edwards curves Information Security and Privacy | 2016-09-02 | Paper |
Hashing into generalized Huff curves Information Security and Cryptology | 2016-07-25 | Paper |
Improved Tripling on Elliptic Curves Information Security and Cryptology | 2016-07-25 | Paper |
Omega pairing on hyperelliptic curves Information Security and Cryptology | 2015-12-02 | Paper |
A note on Diem's proof Information Security and Cryptology | 2015-11-25 | Paper |
Fully homomorphic encryption with auxiliary inputs Information Security and Cryptology | 2015-11-25 | Paper |
| Constructing a hash function from plaintext to Huff curves | 2015-06-29 | Paper |
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP Cryptology and Network Security | 2015-02-10 | Paper |
Improved magnetotelluric Zohdy-Oldenburg direct inversion Mathematical Problems in Engineering | 2014-10-13 | Paper |
Fast symmetric pairing revisited Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Proving the security of all bits of \(ax+b \mod p\) using list decoding Journal of Systems Science and Mathematical Sciences | 2013-11-19 | Paper |
On the expansion length of triple-base number systems Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Triple-base number system for scalar multiplication Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
On efficient pairings on elliptic curves over extension fields Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
An improved twisted Ate pairing over KSS curves with \(k = 18\) Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Subgroups of ideal class groups of real quadratic algebraic function fields Science in China. Series A | 2011-07-21 | Paper |
Another elliptic curve model for faster pairing computation Information Security Practice and Experience | 2011-05-19 | Paper |
| Characterization of multi-continued fractions for multi-formal Laurent series | 2011-01-03 | Paper |
| Construction of elliptic curves over finite fields with a point of given order | 2009-03-06 | Paper |
Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
On optimal simultaneous rational approximation to \((\omega ,\omega ^{2})^{\tau}\) with \(\omega \) being some kind of cubic algebraic function Journal of Approximation Theory | 2008-01-08 | Paper |
A criterion for periodicity of multi-continued fraction expansion of multi-formal Laurent series Acta Arithmetica | 2007-11-15 | Paper |
Multi-continued fraction algorithm on multi-formal Laurent series Acta Arithmetica | 2006-06-30 | Paper |
Bounds of the ideal class numbers of real quadratic function fields Acta Mathematica Sinica, English Series | 2004-11-26 | Paper |
Subgroups of class groups of algebraic quadratic function fields Chinese Annals of Mathematics. Series B | 2004-05-27 | Paper |
Fundamental unit system and class number of real bicyclic biquadratic number fields Proceedings of the Japan Academy. Series A | 2003-06-04 | Paper |
Ideal class groups and subgroups of real quadratic function fields Tsinghua Science and Technology | 2001-10-31 | Paper |
Lower bound for ideal class numbers of real quadratic function fields Tsinghua Science and Technology | 2001-10-31 | Paper |
Fundamental unit system and class number for real number field of type \((2,2,2)\). Tsinghua Science and Technology | 2001-05-06 | Paper |