Browsing by Author Li, Bao

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 17 of 17
TitleAuthor(s)Issue Date
 
Authenticated key exchange from supersingular isogeny
Journal:Journal of Cryptologic Research
2018
Compact hierarchical IBE from lattices in the standard model
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
 
2019
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
Efficient lossy trapdoor functions based on subgroup membership assumptions
Proceeding/Conference:Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings
2013
Identity-based lossy encryption from learning with errors
Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings
2015
IND-PCA secure KEM is enough for password-based authenticated key exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
Lattice-based dual receiver encryption and more
Proceeding/Conference:Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018, Proceedings
2018
 
Lossy key encapsulation mechanism and its applications
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
Lossy projective hashing and its applications
Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
2015
 
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
New framework of password-based authenticated key exchange from only-one lossy encryption
Proceeding/Conference:Provable Security : 11th International Conference, ProvSec 2017, Xi’an, China, October 23–25, 2017, Proceedings
2017
On the lossiness of 2k-th power and the instantiability of rabin-OAEP
Proceeding/Conference:Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014, Proceedings
2014
Preprocess-then-NTT technique and its applications to kyber and newhope
Proceeding/Conference:Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised Selected Papers
2019
 
1999
Towards tightly secure deterministic public key encryption
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
Proceeding/Conference:Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II
2018