Follow
Weiqiang Wen
Weiqiang Wen
Telecom Paris, Institut Polytechnique de Paris
Verified email at telecom-paris.fr - Homepage
Title
Cited by
Cited by
Year
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
S Bai, D Stehlé, W Wen
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
472018
Faster enumeration-based lattice reduction: root Hermite factor Time
MR Albrecht, S Bai, PA Fouque, P Kirchner, D Stehlé, W Wen
Annual International Cryptology Conference, 186-212, 2020
342020
Towards classical hardness of module-LWE: the linear rank case
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on the Theory and Application of Cryptology and …, 2020
262020
A refined analysis of the cost for solving LWE via uSVP
S Bai, S Miller, W Wen
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
232019
On the hardness of module learning with errors with short distributions
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Journal of Cryptology 36 (1), 1, 2023
222023
Improved reduction from the bounded distance decoding problem to the unique shortest vector problem in lattices
S Bai, D Stehlé, W Wen
Cryptology ePrint Archive, 2016
212016
Partial key exposure attacks on BIKE, Rainbow and NTRU
A Esser, A May, J Verbel, W Wen
Annual International Cryptology Conference, 346-375, 2022
162022
On the hardness of module-LWE with binary secret
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Cryptographers’ Track at the RSA Conference, 503-526, 2021
162021
Learning with errors and extrapolated dihedral cosets
Z Brakerski, E Kirshanova, D Stehlé, W Wen
IACR International Workshop on Public Key Cryptography, 702-727, 2018
162018
Middle-product learning with rounding problem and its applications
S Bai, K Boudgoust, D Das, A Roux-Langlois, W Wen, Z Zhang
International Conference on the Theory and Application of Cryptology and …, 2019
102019
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
82016
Entropic hardness of module-LWE from module-NTRU
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on Cryptology in India, 78-99, 2022
72022
One-round deniable key exchange with perfect forward security
W Wen, L Wang, M Xie
Cryptology ePrint Archive, 2014
32014
A Generic Transform from Multi-Round Interactive Proof to NIZK
PA Fouque, A Georgescu, C Qian, A Roux-Langlois, W Wen
IACR International Conference on Public-Key Cryptography, 461-481, 2023
2023
Post-Quantum -to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets
X Yan, L Wang, L Gu, Z Li, J Suo
arXiv preprint arXiv:2211.16993, 2022
2022
Quantum computation capability verification protocol for noisy intermediate-scale quantum devices with the dihedral coset problem
R Lin, W Wen
Physical Review A 106 (1), 012430, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–16