The following pages link to Yu Pu Hu (Q332060):
Displaying 50 items.
- Efficient quantum dialogue using entangled states and entanglement swapping without information leakage (Q332061) (← links)
- A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions (Q352050) (← links)
- (Q445343) (redirect page) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- On the value distributions of Walsh spectrums of quadratic plateaued functions (Q456442) (← links)
- New secondary constructions of bent functions (Q503554) (← links)
- Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions (Q508599) (← links)
- (Q655094) (redirect page) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Fault analysis of Trivium (Q664385) (← links)
- Certificateless signcryption scheme in the standard model (Q845333) (← links)
- Key management using certificate-based cryptosystem in ad hoc networks (Q849917) (← links)
- Pseudo-randomness of the fourth class of GSS sequences (Q866073) (← links)
- Stream cipher based on GSS sequences (Q866116) (← links)
- Gaussian sampling of lattices for cryptographic applications (Q893724) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Quadratic compact knapsack public-key cryptosystem (Q980333) (← links)
- Lattice-based certificateless encryption scheme (Q1633051) (← links)
- Secondary constructions of bent functions and their enforcement (Q1760065) (← links)
- Sieve method for polynomial linear equivalence (Q1791367) (← links)
- D-NTRU: more efficient and average-case IND-CPA secure NTRU variant (Q2195452) (← links)
- New related-key rectangle attacks on reduced AES-192 and AES-256 (Q2267092) (← links)
- Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts (Q2290624) (← links)
- A new Gaussian sampling for trapdoor lattices with arbitrary modulus (Q2329396) (← links)
- Signature scheme using the root extraction problem on quaternions (Q2336748) (← links)
- A knapsack-based probabilistic encryption scheme (Q2384519) (← links)
- Impossible differential cryptanalysis of advanced encryption standard (Q2385406) (← links)
- Cryptanalysis of multilinear maps from ideal lattices: revisited (Q2407051) (← links)
- Chosen ciphertext secure identity-based broadcast encryption in the standard model (Q2440178) (← links)
- Fast S-box security mechanism research based on the polymorphic cipher (Q2476793) (← links)
- Hard fault analysis of Trivium (Q2510159) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- Improved key-recovery attacks on reduced-round WEM-8 (Q2673988) (← links)
- Cryptanalysis of GGH Map (Q2820496) (← links)
- Linear spans of optimal sets of frequency hopping sequences (Q2905325) (← links)
- (Q2943320) (← links)
- (Q2943331) (← links)
- The termination of the F5 algorithm revisited (Q2963248) (← links)
- Identity-Based Blind Signature from Lattices in Standard Model (Q2980856) (← links)
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits (Q3001880) (← links)
- (Q3016681) (← links)
- Weak generalized self-shrinking generators (Q3089939) (← links)
- (Q3092090) (← links)
- (Q3098534) (← links)
- (Q3110730) (← links)
- (Q3110732) (← links)
- (Q3110813) (← links)
- (Q3110822) (← links)
- LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS (Q3173474) (← links)
- Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease (Q3297617) (← links)