Dingding Jia

From MaRDI portal
Person:780377


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
IND-CCA security of Kyber in the quantum random oracle model, revisited
Information Security and Cryptology
2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
Lecture Notes in Computer Science
2023-08-04Paper
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
Designs, Codes and Cryptography
2021-05-10Paper
Towards tightly secure deterministic public key encryption
Information and Communications Security
2020-07-20Paper
IBE with tight security against selective opening and chosen-ciphertext attacks
Designs, Codes and Cryptography
2020-07-15Paper
Identity-based encryption tightly secure under chosen-ciphertext attacks
 
2019-01-23Paper
Public-key encryption with simulation-based sender selective-opening security
 
2018-11-07Paper
Identity-based lossy encryption from learning with errors
 
2018-10-24Paper
Dual-mode cryptosystem based on the learning with errors problem
 
2017-08-25Paper
Constructions secure against receiver selective opening and chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
RSA-OAEP is RKA secure
Information Security and Cryptology
2015-12-02Paper
Related-key security for hybrid encryption
Lecture Notes in Computer Science
2015-11-03Paper
KDM-CCA Security from RKA Secure Authenticated Encryption
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Related key secure PKE from hash proof systems
Advances in Information and Computer Security
2015-05-27Paper
RKA secure PKE based on the DDH and HR assumptions
Provable Security
2013-10-23Paper
Efficient CCA-secure CDH based KEM balanced between ciphertext and key
Information Security and Privacy
2011-07-07Paper
Chosen ciphertext secure encryption under factoring assumption revisited
Public Key Cryptography – PKC 2011
2011-03-15Paper


Research outcomes over time


This page was built for person: Dingding Jia