Fiat-Shamir: from practice to theory R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ... Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019 | 184 | 2019 |
Fiat-Shamir and correlation intractability from strong KDM-secure encryption R Canetti, Y Chen, L Reyzin, RD Rothblum Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 104 | 2018 |
Constraint-hiding constrained PRFs for NC from LWE R Canetti, Y Chen Annual International Conference on the Theory and Applications of …, 2017 | 98 | 2017 |
GGH15 beyond permutation branching programs: proofs, attacks, and candidates Y Chen, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 88 | 2018 |
Cryptanalyses of candidate branching program obfuscators Y Chen, C Gentry, S Halevi Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 79 | 2017 |
Fiat-Shamir From Simpler Assumptions. R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum IACR Cryptol. ePrint Arch. 2018, 1004, 2018 | 61 | 2018 |
Approximate trapdoors for lattices and smaller hash-and-sign signatures Y Chen, N Genise, P Mukherjee Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 56 | 2019 |
Adaptive succinct garbled RAM or: How to delegate your database R Canetti, Y Chen, J Holmgren, M Raykova Theory of Cryptography Conference, 61-90, 2016 | 52* | 2016 |
On the correlation intractability of obfuscated pseudorandom functions R Canetti, Y Chen, L Reyzin Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016 | 52 | 2016 |
Traitor-tracing from LWE made simple and attribute-based Y Chen, V Vaikuntanathan, B Waters, H Wee, D Wichs Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018 | 40 | 2018 |
Does Fiat-Shamir require a cryptographic hash function? Y Chen, A Lombardi, F Ma, W Quach Annual International Cryptology Conference, 334-363, 2021 | 35 | 2021 |
Matrix PRFs: constructions, attacks, and applications to obfuscation Y Chen, M Hhan, V Vaikuntanathan, H Wee Theory of Cryptography Conference, 55-80, 2019 | 18 | 2019 |
Quantum algorithms for variants of average-case lattice problems via filtering Y Chen, Q Liu, M Zhandry Annual international conference on the theory and applications of …, 2022 | 14 | 2022 |
Continuous space-bounded non-malleable codes from stronger proofs-of-space B Chen, Y Chen, K Hostáková, P Mukherjee Annual International Cryptology Conference, 467-495, 2019 | 9 | 2019 |
Quantum algorithms for lattice problems Y Chen Cryptology ePrint Archive, 2024 | 8 | 2024 |
On removing rejection conditions in practical lattice-based signatures R Behnia, Y Chen, D Masny Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 6 | 2021 |
Hard isogeny problems over RSA moduli and groups with infeasible inversion SA Altuğ, Y Chen Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 6* | 2019 |
White-box Cryptography with Device Binding from Token-based Obfuscation and more. S Agrawal, EA Bock, Y Chen, GJ Watson IACR Cryptol. ePrint Arch. 2021, 767, 2021 | 4 | 2021 |
Cryptanalysis of candidate obfuscators for affine determinant programs L Yao, Y Chen, Y Yu Annual International Conference on the Theory and Applications of …, 2022 | 3 | 2022 |
An alternative view of the graph-induced multilinear maps Y Chen Cryptology ePrint Archive, 2016 | 3 | 2016 |