Showing results 1 to 17 of 17
Title | Author(s) | Issue Date | |
---|---|---|---|
Authenticated key exchange from supersingular isogeny Journal:Journal of Cryptologic Research | 2018 | ||
Compact hierarchical IBE from lattices in the standard model Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | 2018 | ||
Deterministic identity-based encryption from lattice-based programmable hash functions with high min-entropy Journal:Security and Communication Networks | 2019 | ||
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 2016 | ||
Efficient lossy trapdoor functions based on subgroup membership assumptions Proceeding/Conference:Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings | 2013 | ||
Identity-based lossy encryption from learning with errors Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings | 2015 | ||
IND-PCA secure KEM is enough for password-based authenticated key exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Lattice-based dual receiver encryption and more Proceeding/Conference:Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018, Proceedings | 2018 | ||
Lossy key encapsulation mechanism and its applications Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Lossy projective hashing and its applications Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings | 2015 | ||
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
New framework of password-based authenticated key exchange from only-one lossy encryption Proceeding/Conference:Provable Security : 11th International Conference, ProvSec 2017, Xi’an, China, October 23–25, 2017, Proceedings | 2017 | ||
On the lossiness of 2k-th power and the instantiability of rabin-OAEP Proceeding/Conference:Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014, Proceedings | 2014 | ||
Preprocess-then-NTT technique and its applications to kyber and newhope Proceeding/Conference:Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised Selected Papers | 2019 | ||
1999 | |||
Towards tightly secure deterministic public key encryption Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | 2018 | ||
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism Proceeding/Conference:Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II | 2018 |