Discovery - Top 10
By people
- 205 yiu, siu ming
- 205 yiu, siu-ming
- 205 yiu, sm
- 205 姚兆明
- 180 wu, c
- 163 lau, f
- 163 lau, fcm
- 163 lau, francis c. m.
- 163 lau, francis chi moon
- 163 劉智滿
HKU Organizations
- 2909 faculty of engineering
- 2901 school of computing and data science
- 143 hku musketeers foundation institu...
- 121 faculty of engineering
- 45 department of electrical and elec...
- 32 president's office
- 21 li ka shing faculty of medicine
- 14 faculty of science
- 12 faculty of dentistry
- 10 faculty of business and economics...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 3037
Title | Author(s) | Issue Date | |
---|---|---|---|
Neural Machine Translation with Bilingual History Involved Attention Proceeding/Conference:Natural Language Processing and Chinese Computing: 8th CCF International Conference, NLPCC 2019, Dunhuang, China, October 9–14, 2019, Proceedings, Part II | 2019 | ||
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism Proceeding/Conference:Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II | 2018 | ||
Lattice-based dual receiver encryption and more Proceeding/Conference:Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018, Proceedings | 2018 | ||
Preprocess-then-NTT technique and its applications to kyber and newhope Proceeding/Conference:Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised Selected Papers | 2019 | ||
Regularly lossy functions and applications Proceeding/Conference:Topics in Cryptology - CT-RSA 2018 : The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings | 2018 | ||
Compact hierarchical IBE from lattices in the standard model Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | 2018 | ||
Towards tightly secure deterministic public key encryption Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | 2018 | ||
New framework of password-based authenticated key exchange from only-one lossy encryption Proceeding/Conference:Provable Security : 11th International Conference, ProvSec 2017, Xi’an, China, October 23–25, 2017, Proceedings | 2017 | ||
IND-PCA secure KEM is enough for password-based authenticated key exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 2016 | ||
Lossy projective hashing and its applications Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings | 2015 | ||
Identity-based lossy encryption from learning with errors Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings | 2015 | ||
On the lossiness of 2k-th power and the instantiability of rabin-OAEP Proceeding/Conference:Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014, Proceedings | 2014 | ||
Efficient lossy trapdoor functions based on subgroup membership assumptions Proceeding/Conference:Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings | 2013 | ||
A secure public key encryption from computational linear Diffe-Hellman problem Proceeding/Conference:Proceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012 | 2012 | ||
Security on SM2 and GOST Signatures against Related Key Attacks Proceeding/Conference:2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) | 2021 | ||
A Trustless GQ Multi-signature Scheme with Identifiable Abort Proceeding/Conference:The 26th Australasian Conference on Information Security and Privacy (ACISP), 2021 | 2021 | ||
One-More Unforgeability of Blind ECDSA Proceeding/Conference:26th European Symposium on Research in Computer Security (ESORICS 2021) | 2021 | ||
Semantic Search and Summarization of Judgments Using Topic Modeling Proceeding/Conference:Legal Knowledge and Information Systems | 2021 | ||
Quantum Superpositions Of Causal Orders Proceeding/Conference:Young Researchers' Forum on Quantum Information Science 2020, Taiwan | 2020 |
Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 3037