8 results on '"Jiehui Nan"'
Search Results
2. Quantum attacks against BBB secure PRFs or MACs built from public random permutations.
3. Adaptively code-correlation robustness functions and its applications to private set intersection.
4. Post-Quantum Pseudorandom Functions from Mersenne Primes.
5. A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs.
6. Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism.
7. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
8. Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.