Artykuły udostępnione publicznie: - Haiyang XueWięcej informacji
Niedostępne w żadnym miejscu: 3
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting
Z Zhang, P Wei, H Xue
International Conference on Cryptology and Network Security, 141-160, 2019
Upoważnienia: National Natural Science Foundation of China
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection
G Ling, F Tang, C Cai, J Shan, H Xue, W Li, P Tang, X Huang, W Qiu
IEEE Transactions on Information Forensics and Security 19, 2201-2216, 2023
Upoważnienia: National Natural Science Foundation of China
Efficient Verifiably Encrypted ECDSA Schemes from Castagnos-Laguillaumie and Joye-Libert Encryptions
X Yang, C Zhang, H Xue, MH Au
IEEE Transactions on Information Forensics and Security, 2024
Upoważnienia: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Dostępne w jakimś miejscu: 22
Efficient online-friendly two-party ECDSA signature
H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Upoważnienia: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Novel secure outsourcing of modular inversion for arbitrary and variable modulus
C Tian, J Yu, H Zhang, H Xue, C Wang, K Ren
IEEE Transactions on Services Computing 15 (1), 241-253, 2019
Upoważnienia: US National Science Foundation, US Department of Energy, US Department of …
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope
S Zhou, H Xue, D Zhang, K Wang, X Lu, B Li, J He
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
Upoważnienia: National Natural Science Foundation of China
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
X Xu, H Xue, K Wang, MH Au, B Liang, S Tian
International Conference on the Theory and Application of Cryptology and …, 2018
Upoważnienia: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA
H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
Upoważnienia: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Understanding and constructing AKE via double-key key encapsulation mechanism
H Xue, X Lu, B Li, B Liang, J He
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
Upoważnienia: National Natural Science Foundation of China
Lattice-based dual receiver encryption and more
D Zhang, K Zhang, B Li, X Lu, H Xue, J Li
Australasian Conference on Information Security and Privacy, 520-538, 2018
Upoważnienia: National Natural Science Foundation of China
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Q Yuan, P Wei, K Jia, H Xue
Science China Information Sciences 63, 1-15, 2020
Upoważnienia: National Natural Science Foundation of China
Deterministic Identity‐Based Encryption from Lattice‐Based Programmable Hash Functions with High Min‐Entropy
D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu
Security and Communication Networks 2019 (1), 1816393, 2019
Upoważnienia: National Natural Science Foundation of China
Regular lossy functions and their applications in leakage-resilient cryptography
Y Chen, B Qin, H Xue
Theoretical Computer Science 739, 13-38, 2018
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
F Fang, B Li, X Lu, Y Liu, D Jia, H Xue
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Upoważnienia: National Natural Science Foundation of China
Identity-based lossy encryption from learning with errors
J He, B Li, X Lu, D Jia, H Xue, X Sun
International Workshop on Security, 3-20, 2015
Upoważnienia: National Natural Science Foundation of China
Regularly lossy functions and applications
Y Chen, B Qin, H Xue
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation
H Xue, X Lu, B Li, Y Liu
International Conference on Provable Security, 162-177, 2014
Upoważnienia: National Natural Science Foundation of China
Resumable zero-knowledge for circuits from symmetric key primitives
H Zhang, P Wei, H Xue, Y Deng, J Li, W Wang, G Liu
Australasian Conference on Information Security and Privacy, 375-398, 2022
Upoważnienia: Chinese Academy of Sciences, National Natural Science Foundation of China
Towards tightly secure deterministic public key encryption
D Zhang, B Li, Y Liu, H Xue, X Lu, D Jia
Information and Communications Security: 19th International Conference …, 2018
Upoważnienia: National Natural Science Foundation of China
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper)
H Xue, B Li, X Lu
Advances in Information and Computer Security: 12th International Workshop …, 2017
Upoważnienia: National Natural Science Foundation of China
Informacje na temat publikacji i finansowania automatycznie określa program komputerowy