Folgen
Shuai Han
Shuai Han
Bestätigte E-Mail-Adresse bei sjtu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology 33 (3), 1080-1113, 2020
472020
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86, 2495-2512, 2018
392018
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
252021
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
S Han, S Liu, L Lyu, D Gu
Annual International Cryptology Conference, 417-447, 2019
192019
Efficient KDM-CCA secure public-key encryption for polynomial functions
S Han, S Liu, L Lyu
International Conference on the Theory and Application of Cryptology and …, 2016
162016
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
L Lyu, S Liu, S Han, D Gu
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
152018
Proofs of retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
International Conference on Information Security Practice and Experience …, 2014
112014
Optimized Paillier’s cryptosystem with fast encryption and decryption
H Ma, S Han, H Lei
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
92021
Proofs of retrievability from linearly homomorphic structure-preserving signatures
X Zhang, S Liu, S Han
International Journal of Information and Computer Security 11 (2), 178-202, 2019
72019
Anonymous public key encryption under corruptions
Z Huang, J Lai, S Han, L Lyu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
62022
Privacy-preserving authenticated key exchange in the standard model
Y Lyu, S Liu, S Han, D Gu
International Conference on the Theory and Application of Cryptology and …, 2022
52022
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
S Han, S Liu, D Gu
International Conference on the Theory and Application of Cryptology and …, 2021
52021
New insights on linear cryptanalysis
Z Liu, S Han, Q Wang, W Li, Y Liu, D Gu
Science China Information Sciences 63, 1-11, 2020
52020
Proofs of data possession and retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
Cryptology ePrint Archive, 2013
52013
Improved bounds on negativity of superpositions
ZH Ma, ZH Chen, S Han, SM Fei, S Severini
52012
Almost tight multi-user security under adaptive corruptions & leakages in the standard model
S Han, S Liu, D Gu
Annual International Conference on the Theory and Applications of …, 2023
42023
Tightly CCA-secure inner product functional encryption scheme
X Liu, S Liu, S Han, D Gu
Theoretical Computer Science 898, 1-19, 2022
42022
Homomorphic data encryption method and apparatus for implementing privacy protection
S Han, Z Huang, H Ma, H Lei
US Patent 10,778,410, 2020
42020
Computational robust fuzzy extractor
Y Wen, S Liu, Z Hu, S Han
The Computer Journal 61 (12), 1794-1805, 2018
42018
Fuzzy authenticated key exchange with tight security
M Jiang, S Liu, S Han, D Gu
European Symposium on Research in Computer Security, 337-360, 2022
32022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20