Follow
Yang Cui
Yang Cui
Verified email at huawei.com
Title
Cited by
Cited by
Year
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
1022006
Efficient hybrid encryption from ID-based encryption
M Abe, Y Cui, H Imai, E Kiltz
Designs, Codes and Cryptography 54, 205-240, 2010
452010
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
Y Cui, K Kobara, K Matsuura, H Imai
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
392007
Relations among notions of security for identity based encryption schemes
N Attrapadung, Y Cui, D Galindo, G Hanaoka, I Hasuo, H Imai, ...
Latin American Symposium on Theoretical Informatics, 130-141, 2006
332006
Field trial on millimeter wave integrated access and backhaul
T Tian, Y Dou, G Ren, L Gu, J Chen, Y Cui, T Takada, M Iwabuchi, ...
2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 1-5, 2019
202019
Formal security treatments for IBE-to-signature transformation: Relations among security notions
Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang
IEICE transactions on fundamentals of electronics, communications and …, 2009
202009
Formal security treatments for signatures from identity-based encryption
Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang
Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007
202007
Large scale field experimental trial of downlink TDD Massive MIMO at the 4.5 GHz band
Y Saito, A Benjebbour, Y Kishiyama, X Wang, X Hou, H Jiang, L Lu, ...
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017
192017
Lightweight broadcast authentication protocols reconsidered
S Yamakawa, Y Cui, K Kobara, H Imai
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
182009
5G field experimental trial on frequency domain multiplexing of mixed numerology
M Iwabuchi, A Benjebbour, Y Kishiyama, D Wu, T Tian, L Gu, Y Cui, ...
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017
172017
Evaluation of coverage and mobility for URLLC via outdoor experimental trials
M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ...
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
152018
Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking
T Sekino, Y Cui, K Kobara, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
112010
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
112010
The practicality of the keyword search using pir
R Yoshida, Y Cui, R Shigetomi, H Imai
2008 International Symposium on Information Theory and Its Applications, 1-6, 2008
112008
Outdoor experimental trials of long range mobile communications using 39 GHz
A Benjebbour, M Iwabuchi, Y Kishiyama, W Guangjian, L Gu, Y Cui, ...
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
102018
5G experimental trials for ultra-reliable and low latency communications using new frame structure
M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ...
IEICE Transactions on Communications 102 (2), 381-390, 2019
92019
A generic conversion with optimal redundancy
Y Cui, K Kobara, H Imai
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
72005
Outdoor experiments on long-range and mobile communications using 39-GHz band for 5G and beyond
M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ...
IEICE Transactions on Communications 102 (8), 1437-1446, 2019
62019
Tag-KEM from set partial domain one-way permutations
M Abe, Y Cui, H Imai, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 2009
62009
Lightweight privacy-preserving authentication protocols secure against active attack in an asymmetric way
Y Cui, K Kobara, K Matsuura, H Imai
IEICE TRANSACTIONS on Information and Systems 91 (5), 1457-1465, 2008
62008
The system can't perform the operation now. Try again later.
Articles 1–20