The following pages link to Rongmao Chen (Q1680227):
Displaying 27 items.
- Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample (Q1680228) (← links)
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost (Q1694723) (← links)
- Asymmetric subversion attacks on signature schemes (Q1784469) (← links)
- Privacy-preserving mining of association rule on outsourced cloud data from multiple parties (Q1784474) (← links)
- Subversion-resilient public key encryption with practical watchdogs (Q2061938) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- A note on the strong authenticated key exchange with auxiliary inputs (Q2402977) (← links)
- Privacy-enhanced remote data integrity checking with updatable timestamp (Q2663494) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Strongly Leakage-Resilient Authenticated Key Exchange (Q2799004) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction (Q2953795) (← links)
- Oblivious Keyword Search with Authorization (Q2953857) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy (Q5056036) (← links)
- Security of Auditing Protocols Against Subversion Attacks (Q5859735) (← links)
- A lattice-based forward secure IBE scheme for Internet of things (Q6198752) (← links)
- Subversion-resilient signatures without random oracles (Q6547986) (← links)
- Secure approximate nearest neighbor search with locality-sensitive hashing (Q6558611) (← links)
- Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-Kyber (Q6575036) (← links)
- Sender-anamorphic encryption reformulated: achieving robust and generic constructions (Q6605321) (← links)
- Parameter-hiding order-revealing encryption without pairings (Q6635898) (← links)