Yamin Liu

From MaRDI portal
Person:667976


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fault-tolerant anti-synchronization control for chaotic switched neural networks with time delay and reaction diffusion
Discrete and Continuous Dynamical Systems. Series S
2021-12-07Paper
Sampled-data exponential synchronization of time-delay neural networks subject to random controller gain perturbations
Applied Mathematics and Computation
2021-03-12Paper
Towards tightly secure deterministic public key encryption
Information and Communications Security
2020-07-20Paper
IBE with tight security against selective opening and chosen-ciphertext attacks
Designs, Codes and Cryptography
2020-07-15Paper
Resilient fault-tolerant anti-synchronization for stochastic delayed reaction-diffusion neural networks with semi-Markov jump parameters
Neural Networks
2020-06-05Paper
\(\mathscr{L}_2 - \mathscr{L}_\infty\) consensus of stochastic delayed multi-agent systems with ADT switching interaction topologies
Applied Mathematics and Computation
2020-01-15Paper
Symmetry reductions of the \((3+1)\)-dimensional modified Zakharov-Kuznetsov equation
Advances in Difference Equations
2019-03-04Paper
Lossy key encapsulation mechanism and its applications
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Approximate-deterministic public key encryption from hard learning problems
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Lossy Projective Hashing and Its Applications
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
RSA-OAEP is RKA secure
Information Security and Cryptology
2015-12-02Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation
Provable Security
2015-09-29Paper
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP
Cryptology and Network Security
2015-02-10Paper
How to Remove the Exponent GCD in HK09
Provable Security
2013-10-23Paper
Improved tradeoff between encapsulation and decapsulation of HK09
Information Security and Cryptology
2013-01-07Paper
Improved efficiency of chosen ciphertext secure encryption from factoring
Information Security Practice and Experience
2012-06-29Paper
Efficient CCA-secure CDH based KEM balanced between ciphertext and key
Information Security and Privacy
2011-07-07Paper
Encryption Simulatability Reconsidered
Information Security Practice and Experience
2011-05-19Paper


Research outcomes over time


This page was built for person: Yamin Liu