关注
Yu-Hsuan Huang
Yu-Hsuan Huang
在 cwi.nl 的电子邮件经过验证
标题
引用次数
引用次数
年份
On the compressed-oracle technique, and post-quantum security of proofs of sequential work
KM Chung, S Fehr, YH Huang, TN Liao
Annual International Conference on the Theory and Applications of …, 2021
452021
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium
M Barbosa, G Barthe, C Doczkal, J Don, S Fehr, B Grégoire, YH Huang, ...
Annual International Cryptology Conference, 358-389, 2023
312023
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM
KM Chung, YC Hsieh, MY Huang, YH Huang, T Lange, BY Yang
arXiv preprint arXiv:2110.04795, 2021
10*2021
On the (in) security of the BUFF transform
J Don, S Fehr, YH Huang, P Struck
Annual International Cryptology Conference, 246-275, 2024
82024
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
J Don, S Fehr, YH Huang
Theory of Cryptography Conference, 33-51, 2022
42022
Hide-and-Seek and the Non-Resignability of the BUFF Transform
J Don, S Fehr, YH Huang, JJ Liao, P Struck
Cryptology ePrint Archive, 2024
22024
HAPKIDO Project Report D5. 2
S Fehr, YH Huang, A Amadori
2023
On the Quantum Security of HAWK
S Fehr, YH Huang
International Conference on Post-Quantum Cryptography, 405-416, 2023
2023
Quadrangle Inequality Improvement for CSIDH Strategy
YH Huang, CK Yang, RJ Chen
Cryptology and Information Security Conference, 2020
2020
Constructing Smooth-Degree Isogenies in Isogeny-Based Cryptography
YH Huang
Master's thesis, url: https://hdl.handle.net/11296/6f3ur4, 2020
2020
Simulating Quantum Algorithm by Using Singular Value Decomposition
YH Huang, RJ Chen
Cryptology and Information Security Conference, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–11