The following pages link to Xiang-Xue Li (Q615207):
Displaying 30 items.
- (Q394921) (redirect page) (← links)
- Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree (Q394926) (← links)
- (Q407477) (redirect page) (← links)
- Efficient democratic group signatures with threshold traceability (Q407480) (← links)
- Pitfalls in identity based encryption using an elliptic curve combined public key (Q449329) (← links)
- Distributed certificateless key encapsulation mechanism secure against the adaptive adversary (Q615208) (← links)
- A universal composability framework for analysis of proxy threshold signature (Q615210) (← links)
- Cryptanalysis of a certificateless signcryption scheme in the standard model (Q621650) (← links)
- Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption (Q726469) (← links)
- Democratic group signatures with collective traceability (Q733294) (← links)
- Verifiable encrypted signatures without random oracles (Q849952) (← links)
- Simulatability and security of certificateless threshold signatures (Q865909) (← links)
- CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN (Q1981773) (← links)
- On the robustness of learning parity with noise (Q1989525) (← links)
- Collision resistant hashing from sub-exponential learning parity with noise (Q2176637) (← links)
- CCA secure multi-recipient KEM from LPN (Q2218975) (← links)
- Simpler CCA secure PKE from LPN problem without double-trapdoor (Q2218992) (← links)
- Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model (Q2256406) (← links)
- Optimal assignment schemes for general access structures based on linear programming (Q2260793) (← links)
- An efficient threshold key-insulated signature scheme (Q2440174) (← links)
- Pseudorandom generators from regular one-way functions: new constructions with improved parameters (Q2513673) (← links)
- ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings (Q2572349) (← links)
- Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations (Q2817469) (← links)
- An effective localization attack in locationbased social network (Q2823766) (← links)
- Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters (Q2867157) (← links)
- Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles (Q2873648) (← links)
- Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator (Q2900607) (← links)
- Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model (Q2920969) (← links)
- Identity-Based Strong Key-Insulated Signature Without Random Oracles (Q3406352) (← links)
- (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond (Q3457067) (← links)