Search

Your search keyword '"Wang, Xiaoyun"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Wang, Xiaoyun" Remove constraint Author: "Wang, Xiaoyun" Topic management of computing and information systems Remove constraint Topic: management of computing and information systems
33 results on '"Wang, Xiaoyun"'

Search Results

1. Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.

2. New Chosen-Ciphertext Attacks on NTRU.

3. Optimistic Fair Exchange in a Multi-user Setting.

4. A Closer Look at PKI: Security and Efficiency.

5. Self-Generated-Certificate Public Key Encryption Without Pairing.

6. Fast Batch Verification of Multiple Signatures.

7. Efficient Pseudorandom Generators Based on the DDH Assumption.

8. Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.

9. Verifiable Shuffle of Large Size Ciphertexts.

10. A Survey of Single-Database Private Information Retrieval: Techniques and Applications.

11. Identity-Based Traitor Tracing.

12. Practical and Secure Solutions for Integer Comparison.

13. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.

14. Multi-bit Cryptosystems Based on Lattice Problems.

15. Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.

16. Parallel Key-Insulated Public Key Encryption Without Random Oracles.

17. ℓ-Invertible Cycles for $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic (${\mathcal{MQ}}$) Public Key Cryptography.

18. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.

19. Cryptanalysis of HFE with Internal Perturbation.

20. Improved On-Line/Off-Line Threshold Signatures.

21. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.

22. Traceable Ring Signature.

23. Efficient Ring Signatures Without Random Oracles.

24. Knowledge-Binding Commitments with Applications in Time-Stamping.

25. Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.

26. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.

27. Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.

28. Anonymous Signatures Made Easy.

29. On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.

30. A Direct Anonymous Attestation Scheme for Embedded Devices.

31. Full-Domain Subgroup Hiding and Constant-Size Group Signatures.

32. Finding Collisions in the Full SHA-1.

33. Efficient Collision Search Attacks on SHA-0.

Catalog

Books, media, physical & digital resources