The following pages link to Xianhui Lu (Q989582):
Displaying 40 items.
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- Cramer-Shoup like chosen ciphertext security from LPN (Q1631899) (← links)
- Understanding and constructing AKE via double-key key encapsulation mechanism (Q1710595) (← links)
- Lattice-based dual receiver encryption and more (Q1784487) (← links)
- Identity-based lossy encryption from learning with errors (Q1800569) (← links)
- Improved efficiency of MP12 (Q1800589) (← links)
- IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) (Q1800839) (← links)
- Dual-mode cryptosystem based on the learning with errors problem (Q2014649) (← links)
- Attacking ECDSA leaking discrete bits with a more efficient lattice (Q2151304) (← links)
- Preprocess-then-NTT Technique and its applications to Kyber and NewHope (Q2331942) (← links)
- Predicting the concrete security of LWE against the dual attack using binary search (Q2673056) (← links)
- How to Remove the Exponent GCD in HK09 (Q2856168) (← links)
- RKA Secure PKE Based on the DDH and HR Assumptions (Q2856171) (← links)
- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring (Q2894341) (← links)
- Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation (Q2948148) (← links)
- KDM-CCA Security from RKA Secure Authenticated Encryption (Q2948344) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Encryption Simulatability Reconsidered (Q3001860) (← links)
- Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key (Q3012997) (← links)
- Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited (Q3084349) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- Approximate-Deterministic Public Key Encryption from Hard Learning Problems (Q3179474) (← links)
- Receiver Selective Opening Security from Indistinguishability Obfuscation (Q3179497) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Towards Tightly Secure Deterministic Public Key Encryption (Q3297488) (← links)
- Related-Key Security for Hybrid Encryption (Q3449174) (← links)
- RSA-OAEP is RKA Secure (Q3454158) (← links)
- Lossy Projective Hashing and Its Applications (Q3460168) (← links)
- (Q3610050) (← links)
- Improved Tradeoff between Encapsulation and Decapsulation of HK09 (Q4899203) (← links)
- Related Key Secure PKE from Hash Proof Systems (Q5253645) (← links)
- On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP (Q5498715) (← links)
- CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling (Q5740257) (← links)
- Revisiting key switching techniques with applications to light-key FHE (Q6547847) (← links)
- Full domain functional bootstrapping with least significant bit encoding (Q6573662) (← links)
- Improved homomorphic evaluation for hash function based on TFHE (Q6575064) (← links)
- Power of randomness recovery: tighter CCA-secure KEM in the QROM (Q6575065) (← links)
- Circuit bootstrapping: faster and smaller (Q6636511) (← links)