Xianhui Lu

From MaRDI portal
Person:989582


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Circuit bootstrapping: faster and smaller
 
2024-11-12Paper
Improved homomorphic evaluation for hash function based on TFHE
 
2024-07-19Paper
Power of randomness recovery: tighter CCA-secure KEM in the QROM
 
2024-07-19Paper
Full domain functional bootstrapping with least significant bit encoding
 
2024-07-17Paper
Revisiting key switching techniques with applications to light-key FHE
 
2024-05-31Paper
IND-CCA security of Kyber in the quantum random oracle model, revisited
Information Security and Cryptology
2023-08-21Paper
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
Lecture Notes in Computer Science
2023-08-04Paper
Hybrid dual and meet-LWE attack
Information Security and Privacy
2023-07-26Paper
Attacking ECDSA leaking discrete bits with a more efficient lattice
 
2022-07-01Paper
Predicting the concrete security of LWE against the dual attack using binary search
 
2022-06-08Paper
Towards tightly secure deterministic public key encryption
Information and Communications Security
2020-07-20Paper
Compact (targeted homomorphic) inner product encryption from LWE
Information and Communications Security
2020-07-20Paper
Preprocess-then-NTT Technique and its applications to Kyber and NewHope
 
2019-10-31Paper
Understanding and constructing AKE via double-key key encapsulation mechanism
 
2019-01-23Paper
Cramer-Shoup like chosen ciphertext security from LPN
 
2018-12-07Paper
Identity-based lossy encryption from learning with errors
 
2018-10-24Paper
Improved efficiency of MP12
 
2018-10-24Paper
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)
 
2018-10-24Paper
Lattice-based dual receiver encryption and more
 
2018-09-26Paper
Dual-mode cryptosystem based on the learning with errors problem
 
2017-08-25Paper
Lossy key encapsulation mechanism and its applications
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
Information Security and Cryptology
2017-05-05Paper
Constructions secure against receiver selective opening and chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Receiver Selective Opening Security from Indistinguishability Obfuscation
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Approximate-deterministic public key encryption from hard learning problems
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
CCA secure public key encryption scheme based on LWE without Gaussian sampling
Information Security and Cryptology
2016-07-25Paper
Lossy Projective Hashing and Its Applications
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
RSA-OAEP is RKA secure
Information Security and Cryptology
2015-12-02Paper
Related-key security for hybrid encryption
Lecture Notes in Computer Science
2015-11-03Paper
KDM-CCA Security from RKA Secure Authenticated Encryption
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation
Provable Security
2015-09-29Paper
Related key secure PKE from hash proof systems
Advances in Information and Computer Security
2015-05-27Paper
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP
Cryptology and Network Security
2015-02-10Paper
RKA secure PKE based on the DDH and HR assumptions
Provable Security
2013-10-23Paper
How to Remove the Exponent GCD in HK09
Provable Security
2013-10-23Paper
Improved tradeoff between encapsulation and decapsulation of HK09
Information Security and Cryptology
2013-01-07Paper
Improved efficiency of chosen ciphertext secure encryption from factoring
Information Security Practice and Experience
2012-06-29Paper
Key-dependent message security for division function: discouraging anonymous credential sharing
Provable Security
2011-09-16Paper
Efficient CCA-secure CDH based KEM balanced between ciphertext and key
Information Security and Privacy
2011-07-07Paper
Encryption Simulatability Reconsidered
Information Security Practice and Experience
2011-05-19Paper
Chosen ciphertext secure encryption under factoring assumption revisited
Public Key Cryptography – PKC 2011
2011-03-15Paper
Improved efficiency of Kiltz07-KEM
Information Processing Letters
2010-08-20Paper
Authenticated group key agreement protocol with resistance to leakage of ephemeral secret DH exponents
 
2009-03-06Paper


Research outcomes over time


This page was built for person: Xianhui Lu