Xianhui Lu

From MaRDI portal
Person:989582

Available identifiers

zbMath Open lu.xianhuiMaRDI QIDQ989582

List of research outcomes

PublicationDate of PublicationType
IND-CCA security of Kyber in the quantum random oracle model, revisited2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization2023-08-04Paper
Hybrid dual and meet-LWE attack2023-07-26Paper
Attacking ECDSA leaking discrete bits with a more efficient lattice2022-07-01Paper
Predicting the concrete security of LWE against the dual attack using binary search2022-06-08Paper
Compact (Targeted Homomorphic) Inner Product Encryption from LWE2020-07-20Paper
Towards Tightly Secure Deterministic Public Key Encryption2020-07-20Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope2019-10-31Paper
Understanding and constructing AKE via double-key key encapsulation mechanism2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN2018-12-07Paper
Identity-based lossy encryption from learning with errors2018-10-24Paper
Improved efficiency of MP122018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)2018-10-24Paper
Lattice-based dual receiver encryption and more2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem2017-08-25Paper
Lossy Key Encapsulation Mechanism and Its Applications2017-05-19Paper
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation2017-05-05Paper
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks2017-04-12Paper
Approximate-Deterministic Public Key Encryption from Hard Learning Problems2016-12-21Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation2016-12-21Paper
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling2016-07-25Paper
Lossy Projective Hashing and Its Applications2016-01-12Paper
RSA-OAEP is RKA Secure2015-12-02Paper
Related-Key Security for Hybrid Encryption2015-11-03Paper
KDM-CCA Security from RKA Secure Authenticated Encryption2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation2015-09-29Paper
Related Key Secure PKE from Hash Proof Systems2015-05-27Paper
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP2015-02-10Paper
How to Remove the Exponent GCD in HK092013-10-23Paper
RKA Secure PKE Based on the DDH and HR Assumptions2013-10-23Paper
Improved Tradeoff between Encapsulation and Decapsulation of HK092013-01-07Paper
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring2012-06-29Paper
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing2011-09-16Paper
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key2011-07-07Paper
Encryption Simulatability Reconsidered2011-05-19Paper
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited2011-03-15Paper
Improved efficiency of Kiltz07-KEM2010-08-20Paper
https://portal.mardi4nfdi.de/entity/Q36100502009-03-06Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Xianhui Lu