Folgen
Yamin Liu
Yamin Liu
Huawei International
Bestätigte E-Mail-Adresse bei huawei.com
Titel
Zitiert von
Zitiert von
Jahr
LAC: Practical ring-LWE based public-key encryption with byte-level modulus
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li, K Wang
Cryptology ePrint Archive, 2018
812018
Research on the consensus mechanisms of blockchain technology
X Han, Y Liu
Netinfo Security 5 (9), 147-152, 2017
56*2017
LAC: Lattice-based cryptosystems
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
NIST PQC Round 2, 4, 2019
222019
Efficient lossy trapdoor functions based on subgroup membership assumptions
H Xue, B Li, X Lu, D Jia, Y Liu
International Conference on Cryptology and Network Security, 235-250, 2013
162013
LAC: lattice-based cryptosystems (2019)
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
122019
Random oracle model
贾小英, 李宝, 刘亚敏
Journal of Software 23 (1), 140-151, 2012
112012
Long-term privacy-preserving aggregation with user-dynamics for federated learning
Z Liu, HY Lin, Y Liu
IEEE Transactions on Information Forensics and Security, 2023
102023
Pipa: Privacy-preserving password checkup via homomorphic encryption
J Li, Y Liu, S Wu
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
102021
Deterministic identity-based encryption from lattice-based programmable hash functions with high min-entropy
D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu
Security and Communication Networks 2019, 2019
102019
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
F Fang, B Li, X Lu, Y Liu, D Jia, H Xue
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
72016
Improved efficiency of chosen ciphertext secure encryption from factoring
X Lu, B Li, Q Mei, Y Liu
International Conference on Information Security Practice and Experience, 34-45, 2012
62012
A user-friendly centrally banked cryptocurrency
X Han, Y Liu, H Xu
Information Security Practice and Experience: 13th International Conference …, 2017
52017
Improved tradeoff between encapsulation and decapsulation of HK09
X Lu, B Li, Q Mei, Y Liu
Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012
52012
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation
H Xue, X Lu, B Li, Y Liu
International Conference on Provable Security, 162-177, 2014
42014
IBE with tight security against selective opening and chosen-ciphertext attacks
D Jia, Y Liu, B Li
Designs, Codes and Cryptography 88 (7), 1371-1400, 2020
32020
Efficient CCA-secure CDH based KEM balanced between ciphertext and key
Y Liu, B Li, X Lu, D Jia
Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011
32011
Towards tightly secure deterministic public key encryption
D Zhang, B Li, Y Liu, H Xue, X Lu, D Jia
Information and Communications Security: 19th International Conference …, 2018
22018
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP
H Xue, B Li, X Lu, K Wang, Y Liu
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
22014
How to remove the exponent GCD in HK09
X Lu, B Li, Y Liu
International Conference on Provable Security, 239-248, 2013
22013
基于格的后量子密钥交换研究
刘亚敏, 李祥学, 刘晗林
密码学报 4 (5), 485-497, 2017
12017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20