- [1]会议论文,Privacy-Preserving Authenticated Key Exchange in the Standard Model,ASIACRYPT 2022,2022/12/01
- [2]会议论文,Anonymous Public Key Encryption under Corruptions,ASIACRYPT 2022,2022/12/01
- [3]期刊论文,Tightly CCA-secure inner product functional encryption scheme,THEORETICAL COMPUTER SCIENCE,2022/01/01
- [4]期刊论文,Generic Construction of 1-out-of-n Oblivious Signatures,IEICE Transactions on Information and Systems,2022/11/01
- [5]会议论文,Fuzzy Authenticated Key Exchange with Tight Security,ESORICS 2022,2022/09/01
- [6]会议论文,Authenticated Key Exchange and Signatures with Tight Security in the Standard Model,Crypto2021,Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2021/08/01,韩帅
- [7]会议论文,Authentication System Based on Fuzzy Extractors,Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2021/06/01
- [8]会议论文,Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Re,ASIACRYPT 2021,2021/12/01,韩帅
- [9]期刊论文,Pseudorandom functions in NC class from the standard LWE assumption,Designs, Codes, and Cryptography,2021/10/01
- [10]期刊论文,New insights on linear cryptanalysis,SCIENCE CHINA-INFORMATION SCIENCES,2020/07/01