On the compressed-oracle technique, and post-quantum security of proofs of sequential work KM Chung, S Fehr, YH Huang, TN Liao Annual International Conference on the Theory and Applications of …, 2021 | 45 | 2021 |
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium M Barbosa, G Barthe, C Doczkal, J Don, S Fehr, B Grégoire, YH Huang, ... Annual International Cryptology Conference, 358-389, 2023 | 31 | 2023 |
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM KM Chung, YC Hsieh, MY Huang, YH Huang, T Lange, BY Yang arXiv preprint arXiv:2110.04795, 2021 | 10* | 2021 |
On the (in) security of the BUFF transform J Don, S Fehr, YH Huang, P Struck Annual International Cryptology Conference, 246-275, 2024 | 8 | 2024 |
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF J Don, S Fehr, YH Huang Theory of Cryptography Conference, 33-51, 2022 | 4 | 2022 |
Hide-and-Seek and the Non-Resignability of the BUFF Transform J Don, S Fehr, YH Huang, JJ Liao, P Struck Cryptology ePrint Archive, 2024 | 2 | 2024 |
HAPKIDO Project Report D5. 2 S Fehr, YH Huang, A Amadori | | 2023 |
On the Quantum Security of HAWK S Fehr, YH Huang International Conference on Post-Quantum Cryptography, 405-416, 2023 | | 2023 |
Quadrangle Inequality Improvement for CSIDH Strategy YH Huang, CK Yang, RJ Chen Cryptology and Information Security Conference, 2020 | | 2020 |
Constructing Smooth-Degree Isogenies in Isogeny-Based Cryptography YH Huang Master's thesis, url: https://hdl.handle.net/11296/6f3ur4, 2020 | | 2020 |
Simulating Quantum Algorithm by Using Singular Value Decomposition YH Huang, RJ Chen Cryptology and Information Security Conference, 2018 | | 2018 |