Follow
Haiyang Xue
Title
Cited by
Cited by
Year
LAC: Practical ring-LWE based public-key encryption with byte-level modulus
X Lu, Y Liu, Z Zhang, D Jia, H Xue, J He, B Li, K Wang
Cryptology ePrint Archive, 2018
882018
Novel secure outsourcing of modular inversion for arbitrary and variable modulus
C Tian, J Yu, H Zhang, H Xue, C Wang, K Ren
IEEE Transactions on Services Computing 15 (1), 241-253, 2019
372019
Lac
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
Technical report, National Institute of Standards and Technology, 2017
372017
Efficient online-friendly two-party ECDSA signature
H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
362021
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope
S Zhou, H Xue, D Zhang, K Wang, X Lu, B Li, J He
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
362019
LAC: Lattice-based cryptosystems
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
NIST PQC Round 2, 4, 2019
232019
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies
X Xu, H Xue, K Wang, MH Au, B Liang, S Tian
International Conference on the Theory and Application of Cryptology and …, 2018
23*2018
Efficient lossy trapdoor functions based on subgroup membership assumptions
H Xue, B Li, X Lu, D Jia, Y Liu
International Conference on Cryptology and Network Security, 235-250, 2013
162013
Understanding and constructing AKE via double-key key encapsulation mechanism
H Xue, X Lu, B Li, B Liang, J He
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
132018
LAC: lattice-based cryptosystems (2019)
X Lu, Y Liu, D Jia, H Xue, J He, Z Zhang, Z Liu, H Yang, B Li, K Wang
URL: https://csrc. nist. gov/projects/post-quantum-cryptography/round-2 …, 2019
122019
Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA
H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
112023
Deterministic Identity‐Based Encryption from Lattice‐Based Programmable Hash Functions with High Min‐Entropy
D Zhang, J Li, B Li, X Lu, H Xue, D Jia, Y Liu
Security and Communication Networks 2019 (1), 1816393, 2019
102019
Lattice-based dual receiver encryption and more
D Zhang, K Zhang, B Li, X Lu, H Xue, J Li
Australasian Conference on Information Security and Privacy, 520-538, 2018
102018
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Q Yuan, P Wei, K Jia, H Xue
Science China Information Sciences 63, 1-15, 2020
92020
Regular lossy functions and their applications in leakage-resilient cryptography
Y Chen, B Qin, H Xue
Theoretical Computer Science 739, 13-38, 2018
72018
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
F Fang, B Li, X Lu, Y Liu, D Jia, H Xue
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
72016
Constructing strong designated verifier signatures from key encapsulation mechanisms
B Gong, MH Au, H Xue
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
52019
Regularly lossy functions and applications
Y Chen, B Qin, H Xue
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
52018
Identity-based lossy encryption from learning with errors
J He, B Li, X Lu, D Jia, H Xue, X Sun
International Workshop on Security, 3-20, 2015
52015
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation
H Xue, X Lu, B Li, Y Liu
International Conference on Provable Security, 162-177, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20