LAC: Practical ring-LWE based public-key encryption with byte-level modulus X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li, K Wang Cryptology ePrint Archive, 2018 | 82 | 2018 |
Lac X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang Technical report, National Institute of Standards and Technology, 2017 | 37 | 2017 |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus C Tian, J Yu, H Zhang, H Xue, C Wang, K Ren IEEE Transactions on Services Computing 15 (1), 241-253, 2019 | 33 | 2019 |
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope S Zhou, H Xue, D Zhang, K Wang, X Lu, B Li, J He Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 32 | 2019 |
Efficient online-friendly two-party ECDSA signature H Xue, MH Au, X Xie, TH Yuen, H Cui Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 25 | 2021 |
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies X Xu, H Xue, K Wang, MH Au, B Liang, S Tian International Conference on the Theory and Application of Cryptology and …, 2018 | 23* | 2018 |
LAC: Lattice-based cryptosystems X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang NIST PQC Round 2, 4, 2019 | 22 | 2019 |
Efficient lossy trapdoor functions based on subgroup membership assumptions H Xue, B Li, X Lu, D Jia, Y Liu International Conference on Cryptology and Network Security, 235-250, 2013 | 16 | 2013 |
Understanding and constructing AKE via double-key key encapsulation mechanism H Xue, X Lu, B Li, B Liang, J He Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 13 | 2018 |
LAC: lattice-based cryptosystems (2019) X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019 | 12 | 2019 |
Deterministic Identity‐Based Encryption from Lattice‐Based Programmable Hash Functions with High Min‐Entropy D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu Security and Communication Networks 2019 (1), 1816393, 2019 | 10 | 2019 |
Lattice-based dual receiver encryption and more D Zhang, K Zhang, B Li, X Lu, H Xue, J Li Australasian Conference on Information Security and Privacy, 520-538, 2018 | 10 | 2018 |
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers Q Yuan, P Wei, K Jia, H Xue Science China Information Sciences 63, 1-15, 2020 | 9 | 2020 |
Regular lossy functions and their applications in leakage-resilient cryptography Y Chen, B Qin, H Xue Theoretical Computer Science 739, 13-38, 2018 | 7 | 2018 |
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus F Fang, B Li, X Lu, Y Liu, D Jia, H Xue Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 7 | 2016 |
Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Regularly lossy functions and applications Y Chen, B Qin, H Xue Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018 | 5 | 2018 |
Identity-based lossy encryption from learning with errors J He, B Li, X Lu, D Jia, H Xue, X Sun International Workshop on Security, 3-20, 2015 | 5 | 2015 |
Constructing strong designated verifier signatures from key encapsulation mechanisms B Gong, MH Au, H Xue 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 4 | 2019 |
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation H Xue, X Lu, B Li, Y Liu International Conference on Provable Security, 162-177, 2014 | 4 | 2014 |