The following pages link to Jian Weng (Q338378):
Displaying 47 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- A note on the security of KHL scheme (Q497669) (← links)
- Strong key-insulated signature in the standard model (Q615357) (← links)
- Certificateless key-insulated signature without random oracles (Q621463) (← links)
- Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings (Q621615) (← links)
- Cryptanalysis of a certificateless signcryption scheme in the standard model (Q621650) (← links)
- Robustly reusable fuzzy extractor with imperfect randomness (Q831183) (← links)
- Efficient discrete logarithm based multi-signature scheme in the plain public key model (Q849361) (← links)
- Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext (Q893723) (← links)
- Indistinguishability of pure orthogonal product states by LOCC (Q1674557) (← links)
- Zero-knowledge argument for simultaneous discrete logarithms (Q1759659) (← links)
- Cryptanalysis of an identity based broadcast encryption scheme without random oracles (Q1944923) (← links)
- Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations (Q1999081) (← links)
- Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting (Q2129001) (← links)
- Attribute-based conditional proxy re-encryption in the standard model under LWE (Q2148755) (← links)
- Collision resistant hashing from sub-exponential learning parity with noise (Q2176637) (← links)
- Notes on a provably-secure certificate-based encryption against malicious CA attacks (Q2198258) (← links)
- A hybrid universal blind quantum computation (Q2215088) (← links)
- Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification (Q2215138) (← links)
- Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model (Q2256406) (← links)
- Pirate decoder for the broadcast encryption schemes from Crypto 2005 (Q2385401) (← links)
- Pseudorandom generators from regular one-way functions: new constructions with improved parameters (Q2513673) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- Key regeneration-free ciphertext-policy attribute-based encryption and its application (Q2660936) (← links)
- Scalable revocable identity-based signature over lattices in the standard model (Q2662710) (← links)
- Efficient and fully secure lattice-based IBE with equality test (Q2673061) (← links)
- Two-pass authenticated key exchange with explicit authentication and tight security (Q2692405) (← links)
- Simulatable verifiable random function from the LWE assumption (Q2700784) (← links)
- CCA-Secure Keyed-Fully Homomorphic Encryption (Q2798772) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters (Q2867157) (← links)
- Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles (Q2873648) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model (Q2920969) (← links)
- Fine-Grained Conditional Proxy Re-Encryption and Application (Q2948152) (← links)
- Verifiable Computation over Large Database with Incremental Updates (Q2985269) (← links)
- Optionally Identifiable Private Handshakes (Q3056894) (← links)
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 (Q3084354) (← links)
- New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model (Q3297503) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Identity-Based Strong Key-Insulated Signature Without Random Oracles (Q3406352) (← links)
- CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles (Q5046387) (← links)
- Generalized attack on ECDSA: known bits in arbitrary positions (Q6063142) (← links)
- Single-state distributed \(k\)-winners-take-all neural network model (Q6095652) (← links)
- Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance (Q6118648) (← links)
- Identifying buckling resistance of reinforced concrete columns during inelastic deformation (Q6490605) (← links)
- Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing (Q6494637) (← links)