Folgen
Haiyang Xue
Haiyang Xue
Bestätigte E-Mail-Adresse bei polyu.edu.hk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
LAC: Practical ring-LWE based public-key encryption with byte-level modulus
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li, K Wang
Cryptology ePrint Archive, 2018
812018
Lac
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
Technical report, National Institute of Standards and Technology, 2017
352017
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope
S Zhou, H Xue, D Zhang, K Wang, X Lu, B Li, J He
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
312019
Novel secure outsourcing of modular inversion for arbitrary and variable modulus
C Tian, J Yu, H Zhang, H Xue, C Wang, K Ren
IEEE Transactions on Services Computing 15 (1), 241-253, 2019
282019
Efficient online-friendly two-party ECDSA signature
H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
252021
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
X Xu, H Xue, K Wang, MH Au, B Liang, S Tian
International Conference on the Theory and Application of Cryptology and …, 2018
23*2018
LAC: Lattice-based cryptosystems
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
NIST PQC Round 2, 4, 2019
222019
Efficient lossy trapdoor functions based on subgroup membership assumptions
H Xue, B Li, X Lu, D Jia, Y Liu
International Conference on Cryptology and Network Security, 235-250, 2013
162013
Understanding and constructing AKE via double-key key encapsulation mechanism
H Xue, X Lu, B Li, B Liang, J He
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
132018
LAC: lattice-based cryptosystems (2019)
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
122019
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Q Yuan, P Wei, K Jia, H Xue
Science China Information Sciences 63, 1-15, 2020
102020
Deterministic identity-based encryption from lattice-based programmable hash functions with high min-entropy
D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu
Security and Communication Networks 2019, 2019
102019
Lattice-based dual receiver encryption and more
D Zhang, K Zhang, B Li, X Lu, H Xue, J Li
Australasian Conference on Information Security and Privacy, 520-538, 2018
102018
Regular lossy functions and their applications in leakage-resilient cryptography
Y Chen, B Qin, H Xue
Theoretical Computer Science 739, 13-38, 2018
72018
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
F Fang, B Li, X Lu, Y Liu, D Jia, H Xue
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
72016
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA
H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
Regularly lossy functions and applications
Y Chen, B Qin, H Xue
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
52018
Identity-based lossy encryption from learning with errors
J He, B Li, X Lu, D Jia, H Xue, X Sun
International Workshop on Security, 3-20, 2015
52015
Constructing strong designated verifier signatures from key encapsulation mechanisms
B Gong, MH Au, H Xue
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
42019
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation
H Xue, X Lu, B Li, Y Liu
International Conference on Provable Security, 162-177, 2014
42014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20