| Publication | Date of Publication | Type |
|---|
| Towards compact identity-based encryption on ideal lattices | 2024-11-12 | Paper |
| On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation | 2024-03-14 | Paper |
Simplified server-aided revocable identity-based encryption from lattices Provable and Practical Security | 2023-07-21 | Paper |
Improved key-recovery attacks on reduced-round WEM-8 Designs, Codes and Cryptography | 2022-09-22 | Paper |
Lattice-based linearly homomorphic signature scheme over binary field Science China Information Sciences | 2021-12-15 | Paper |
Accountable identity-based encryption with distributed private key generators Information Sciences | 2021-03-16 | Paper |
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant Information Sciences | 2020-09-08 | Paper |
Lattice-based group signatures with verifier-local revocation: achieving shorter key-sizes and explicit traceability with ease Cryptology and Network Security | 2020-07-20 | Paper |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts Theoretical Computer Science | 2020-01-29 | Paper |
Algebraic attacks against several weak variants of GVW'13 ABE International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Signature scheme using the root extraction problem on quaternions Journal of Applied Mathematics | 2019-11-19 | Paper |
A new Gaussian sampling for trapdoor lattices with arbitrary modulus Designs, Codes and Cryptography | 2019-10-17 | Paper |
Lattice-based certificateless encryption scheme Frontiers of Computer Science | 2018-12-19 | Paper |
Sieve method for polynomial linear equivalence Journal of Applied Mathematics | 2018-10-10 | Paper |
Identity-based blind signature from lattices Wuhan University Journal of Natural Sciences | 2018-05-25 | Paper |
Cryptanalysis of multilinear maps from ideal lattices: revisited Designs, Codes and Cryptography | 2017-09-28 | Paper |
A New Correlation Attack on Nonlinear Combining Generators IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Guess and Determine Attacks on Filter Generators—Revisited IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Identity-based blind signature from lattices in standard model Information Security and Cryptology | 2017-05-05 | Paper |
The termination of the F5 algorithm revisited Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation | 2017-02-10 | Paper |
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions Information Sciences | 2017-02-07 | Paper |
New secondary constructions of bent functions Applicable Algebra in Engineering, Communication and Computing | 2017-01-13 | Paper |
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage Quantum Information Processing | 2016-10-27 | Paper |
Cryptanalysis of GGH map Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Gaussian sampling of lattices for cryptographic applications Science China Information Sciences | 2015-11-20 | Paper |
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model Frontiers of Computer Science | 2015-11-20 | Paper |
| Unbounded hierarchical identity-based encryption in the standard model | 2015-10-28 | Paper |
| scientific article; zbMATH DE number 6499820 (Why is no real title available?) | 2015-10-28 | Paper |
| Constructions of cryptographically significant Boolean permutations | 2015-09-11 | Paper |
| Post-quantum secure hybrid signcryption from lattice assumption | 2015-09-11 | Paper |
Hard fault analysis of Trivium Information Sciences | 2014-08-01 | Paper |
Chosen ciphertext secure identity-based broadcast encryption in the standard model Journal of Shanghai Jiaotong University (Science) | 2014-03-27 | Paper |
| An efficient and strongly unforgeable short signature scheme in standard model | 2014-02-28 | Paper |
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions Frontiers of Computer Science in China | 2013-07-04 | Paper |
| Distinguishing attack on the stream cipher Sosemanuk | 2013-01-24 | Paper |
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree International Journal of Computer Mathematics | 2013-01-22 | Paper |
Secondary constructions of bent functions and their enforcement Advances in Mathematics of Communications | 2012-11-12 | Paper |
On the value distributions of Walsh spectrums of quadratic plateaued functions Computers and Electrical Engineering | 2012-10-25 | Paper |
Linear spans of optimal sets of frequency hopping sequences RAIRO. Theoretical Informatics and Applications | 2012-08-27 | Paper |
Linear spans of optimal sets of frequency hopping sequences RAIRO. Theoretical Informatics and Applications | 2012-08-27 | Paper |
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups Mathematical and Computer Modelling | 2012-08-24 | Paper |
Fault analysis of Trivium Designs, Codes and Cryptography | 2012-03-01 | Paper |
| The Termination of Algorithms for Computing Gr\"{o}bner Bases | 2012-02-16 | Paper |
| scientific article; zbMATH DE number 6001368 (Why is no real title available?) | 2012-01-27 | Paper |
| scientific article; zbMATH DE number 6001304 (Why is no real title available?) | 2012-01-27 | Paper |
| Resilient Boolean functions with high algebraic immunity | 2012-01-27 | Paper |
| Algebraic attack on Boolean functions | 2012-01-27 | Paper |
Identity-based broadcast encryption with shorter transmissions Journal of Shanghai Jiaotong University (Science) | 2012-01-01 | Paper |
| scientific article; zbMATH DE number 5973815 (Why is no real title available?) | 2011-11-17 | Paper |
Lower bounds on the second order nonlinearity of Boolean functions International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
| Autocorrelation coefficients of two classes of semi-bent functions | 2011-09-15 | Paper |
Weak generalized self-shrinking generators Journal of Systems Engineering and Electronics | 2011-08-25 | Paper |
| Lower bounds on the second-order nonlinearity of cubic monomial Boolean functions | 2011-07-19 | Paper |
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits Information Security Practice and Experience | 2011-05-19 | Paper |
Quadratic compact knapsack public-key cryptosystem Computers & Mathematics with Applications | 2010-06-28 | Paper |
New related-key rectangle attacks on reduced AES-192 and AES-256 Science in China. Series F | 2010-02-26 | Paper |
| On the memory space of shrinking type sequence generators | 2010-02-12 | Paper |
| Node matrix representation of braid group. | 2010-02-12 | Paper |
Certificateless signcryption scheme in the standard model Information Sciences | 2010-01-28 | Paper |
| Analysis and improvement of a research scheme of NTRU decryption failure | 2009-07-22 | Paper |
| A fast and secure elliptic curve scalar multiplication algorithm based on special addition chains | 2009-07-22 | Paper |
New Construction of Short Hierarchical ID-Based Signature in the Standard Model Fundamenta Informaticae | 2009-05-22 | Paper |
On the Computational Efficiency of XTR+ Information Security and Cryptology | 2009-04-29 | Paper |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks Applied Cryptography and Network Security | 2009-03-10 | Paper |
ID-based threshold proxy signcryption scheme from bilinear pairings International Journal of Security and Networks | 2009-02-24 | Paper |
NTRUSign With a New Perturbation IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Secure Proxy Multi-signature Scheme in the Standard Model Provable Security | 2009-01-27 | Paper |
Resilient functions over finite fields IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Generalized Self-Shrinking Generator IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Computing the k-Error N-Adic Complexity of a Sequence of Period p n Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Fast S-box security mechanism research based on the polymorphic cipher Information Sciences | 2008-03-12 | Paper |
| Security analysis of the Pomykala-Barabasz scheme | 2008-01-02 | Paper |
Impossible differential cryptanalysis of advanced encryption standard Science in China. Series F | 2007-10-12 | Paper |
A knapsack-based probabilistic encryption scheme Information Sciences | 2007-10-10 | Paper |
An efficient method against side-channel attacks on ECC Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Fault attack on the balanced shrinking generator Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
New weak keys in RSA Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Improvement of identity-based threshold proxy signature scheme with known signers Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Pseudo-randomness of the fourth class of GSS sequences Science in China. Series F | 2007-02-20 | Paper |
Stream cipher based on GSS sequences Science in China. Series F | 2007-02-20 | Paper |
Key management using certificate-based cryptosystem in ad hoc networks Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
| A new method for constructing high order resilient functions | 2006-10-04 | Paper |
| Partition of a set and transitive closure | 2006-03-13 | Paper |
| scientific article; zbMATH DE number 465328 (Why is no real title available?) | 1994-04-26 | Paper |