LAC: Practical ring-LWE based public-key encryption with byte-level modulus X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li, K Wang Cryptology ePrint Archive, 2018 | 85 | 2018 |
Research on the consensus mechanisms of blockchain technology X Han, Y Liu Netinfo Security 5 (9), 147-152, 2017 | 57* | 2017 |
LAC: Lattice-based cryptosystems X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang NIST PQC Round 2, 4, 2019 | 22 | 2019 |
Long-term privacy-preserving aggregation with user-dynamics for federated learning Z Liu, HY Lin, Y Liu IEEE Transactions on Information Forensics and Security 18, 2398-2412, 2023 | 17 | 2023 |
Efficient lossy trapdoor functions based on subgroup membership assumptions H Xue, B Li, X Lu, D Jia, Y Liu International Conference on Cryptology and Network Security, 235-250, 2013 | 16 | 2013 |
LAC: lattice-based cryptosystems (2019) X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019 | 12 | 2019 |
Pipa: Privacy-preserving password checkup via homomorphic encryption J Li, Y Liu, S Wu Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 11 | 2021 |
Random oracle model 贾小英, 李宝, 刘亚敏 Journal of Software 23 (1), 140-151, 2012 | 11 | 2012 |
Deterministic Identity‐Based Encryption from Lattice‐Based Programmable Hash Functions with High Min‐Entropy D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu Security and Communication Networks 2019 (1), 1816393, 2019 | 10 | 2019 |
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus F Fang, B Li, X Lu, Y Liu, D Jia, H Xue Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 7 | 2016 |
A user-friendly centrally banked cryptocurrency X Han, Y Liu, H Xu Information Security Practice and Experience: 13th International Conference …, 2017 | 6 | 2017 |
Improved efficiency of chosen ciphertext secure encryption from factoring X Lu, B Li, Q Mei, Y Liu International Conference on Information Security Practice and Experience, 34-45, 2012 | 6 | 2012 |
Improved tradeoff between encapsulation and decapsulation of HK09 X Lu, B Li, Q Mei, Y Liu Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012 | 5 | 2012 |
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation H Xue, X Lu, B Li, Y Liu International Conference on Provable Security, 162-177, 2014 | 4 | 2014 |
IBE with tight security against selective opening and chosen-ciphertext attacks D Jia, Y Liu, B Li Designs, Codes and Cryptography 88 (7), 1371-1400, 2020 | 3 | 2020 |
Efficient CCA-secure CDH based KEM balanced between ciphertext and key Y Liu, B Li, X Lu, D Jia Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011 | 3 | 2011 |
Towards tightly secure deterministic public key encryption D Zhang, B Li, Y Liu, H Xue, X Lu, D Jia Information and Communications Security: 19th International Conference …, 2018 | 2 | 2018 |
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP H Xue, B Li, X Lu, K Wang, Y Liu Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 2 | 2014 |
How to remove the exponent GCD in HK09 X Lu, B Li, Y Liu International Conference on Provable Security, 239-248, 2013 | 2 | 2013 |
基于格的后量子密钥交换研究 刘亚敏, 李祥学, 刘晗林 密码学报 4 (5), 485-497, 2017 | 1 | 2017 |