Shi Bai

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An algebraic algorithm for breaking NTRU with multiple keys
Designs, Codes and Cryptography
2024-12-11Paper
Concrete analysis of quantum lattice enumeration2024-08-30Paper
The group factorization problem in finite groups of Lie type
Information Processing Letters
2024-06-07Paper
Fiat-Shamir signatures based on module-NTRU
Information Security and Privacy
2023-07-26Paper
Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)2022-11-09Paper
Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performance2022-04-22Paper
MPSign: a signature from small-secret middle-product learning with errors2021-12-01Paper
Middle-product learning with rounding problem and its applications2020-05-20Paper
A refined analysis of the cost for solving LWE via uSVP2020-05-06Paper
Improved combinatorial algorithms for the inhomogeneous short integer solution problem
Journal of Cryptology
2019-01-29Paper
Measuring, simulating and exploiting the head concavity phenomenon in BKZ2018-12-20Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Journal of Cryptology
2018-05-28Paper
scientific article; zbMATH DE number 6820265 (Why is no real title available?)2017-12-19Paper
ISRA-Based Grouping: A Disk Reorganization Approach for Disk Energy Conservation and Disk Performance Enhancement
IEEE Transactions on Computers
2017-07-27Paper
Tuple lattice sieving
LMS Journal of Computation and Mathematics
2017-04-04Paper
A Subfield Lattice Attack on Overstretched NTRU Assumptions
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Better polynomials for GNFS
Mathematics of Computation
2016-03-09Paper
Root optimization of polynomials in the number field sieve
Mathematics of Computation
2015-07-20Paper
Lattice decoding attacks on binary LWE
Information Security and Privacy
2014-07-24Paper
An improved compression technique for signatures based on learning with errors
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Complicated dynamics of prototype continuous-line adaptive control system
IEEE Transactions on Circuits and Systems
1988-01-01Paper
Disturbance-generated bifurcation in a prototype adaptive system with e/sub 1/-modification law
IEEE Transactions on Automatic Control
1988-01-01Paper
Disturbance-generated bifurcations in a simple adaptive system: Simulation evidence
Systems & Control Letters
1986-01-01Paper


Research outcomes over time


This page was built for person: Shi Bai