| Publication | Date of Publication | Type |
|---|
| A refined hardness estimation of LWE in two-step mode | 2024-11-12 | Paper |
| Lattice-based threshold, accountable, and private signature | 2024-11-12 | Paper |
Hardness of (M)LWE with semi-uniform seeds Theoretical Computer Science | 2024-03-28 | Paper |
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class Information and Computation | 2024-03-27 | Paper |
Group public key encryption supporting equality test without bilinear pairings Information Sciences | 2024-03-07 | Paper |
MDOPE: efficient multi-dimensional data order preserving encryption scheme Information Sciences | 2024-02-28 | Paper |
Toward practical privacy-preserving linear regression Information Sciences | 2024-02-28 | Paper |
A polynomial system for bit-based division property solving by quantum algorithm Quantum Information Processing | 2024-01-25 | Paper |
Hiding the input-size in multi-party private set intersection Designs, Codes and Cryptography | 2023-09-07 | Paper |
Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting Quantum Information Processing | 2023-06-13 | Paper |
Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography | 2022-09-22 | Paper |
Lattice-based linearly homomorphic signature scheme over binary field Science China Information Sciences | 2021-12-15 | Paper |
Accountable identity-based encryption with distributed private key generators Information Sciences | 2021-03-16 | Paper |
A key-sharing based secure deduplication scheme in cloud storage Information Sciences | 2021-02-05 | Paper |
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant Information Sciences | 2020-09-08 | Paper |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts Theoretical Computer Science | 2020-01-29 | Paper |
Algebraic attacks against several weak variants of GVW'13 ABE International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Signature scheme using the root extraction problem on quaternions Journal of Applied Mathematics | 2019-11-19 | Paper |
Improved secure fuzzy auditing protocol for cloud data storage Soft Computing | 2019-08-12 | Paper |
Preimage selective trapdoor function: how to repair an easy problem Mathematical Problems in Engineering | 2019-02-08 | Paper |
Lattice-based certificateless encryption scheme Frontiers of Computer Science | 2018-12-19 | Paper |
Sieve method for polynomial linear equivalence Journal of Applied Mathematics | 2018-10-10 | Paper |
Identity-based blind signature from lattices Wuhan University Journal of Natural Sciences | 2018-05-25 | Paper |
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking Fundamenta Informaticae | 2018-05-03 | Paper |
Identity-based blind signature from lattices in standard model Information Security and Cryptology | 2017-05-05 | Paper |
The termination of the F5 algorithm revisited Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation | 2017-02-10 | Paper |
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model Frontiers of Computer Science | 2015-11-20 | Paper |
Authenticated asymmetric group key agreement based on certificateless cryptosystem International Journal of Computer Mathematics | 2014-08-14 | Paper |
Identity-based key distribution for mobile ad hoc networks Frontiers of Computer Science in China | 2013-07-04 | Paper |
| Key exchange schemes using finite non-abelian groups | 2013-06-20 | Paper |
| A fast public key cryptosystem based on matrix rings | 2013-06-20 | Paper |
Group key agreement for secure group communication in dynamic peer systems Journal of Parallel and Distributed Computing | 2012-10-23 | Paper |
| The Termination of Algorithms for Computing Gr\"{o}bner Bases | 2012-02-16 | Paper |
| A digital signature scheme based on the root extraction problem on a matrix ring | 2012-01-27 | Paper |
| scientific article; zbMATH DE number 5973815 (Why is no real title available?) | 2011-11-17 | Paper |
Quadratic compact knapsack public-key cryptosystem Computers & Mathematics with Applications | 2010-06-28 | Paper |
NTRUSign With a New Perturbation IEEE Transactions on Information Theory | 2009-02-24 | Paper |
A knapsack-based probabilistic encryption scheme Information Sciences | 2007-10-10 | Paper |
New weak keys in RSA Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |