default search action
Yunlei Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j35]Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and efficient KEMs over NTRU lattices. Comput. Stand. Interfaces 89: 103828 (2024) - [j34]Zhichuang Liang, Yunlei Zhao, Zhenfeng Zhang:
Generalized splitting-ring number theoretic transform. Frontiers Comput. Sci. 18(4): 184818 (2024) - [j33]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IEEE Trans. Computers 73(12): 2817-2829 (2024) - [j32]Zhaoman Liu, Yanbo Chen, Jianting Ning, Yunlei Zhao:
Fully anonymous identity-based broadcast signcryption with public verification. Theor. Comput. Sci. 992: 114464 (2024) - [j31]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. IEEE Trans. Dependable Secur. Comput. 21(5): 4895-4906 (2024) - [j30]Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 19: 3581-3592 (2024) - [j29]Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IEEE Trans. Parallel Distributed Syst. 35(11): 1964-1976 (2024) - [c51]Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang, Yunlei Zhao:
Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment. ESORICS (2) 2024: 123-143 - [i51]Jieyu Zheng, Hong Zhang, Le Tian, Zhuo Zhang, Hanyu Wei, Zhiwei Chu, Yafang Yang, Yunlei Zhao:
ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2. CoRR abs/2404.12675 (2024) - [i50]Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang, Yunlei Zhao:
Faster Post-Quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment. CoRR abs/2404.13544 (2024) - [i49]Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao:
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric. IACR Cryptol. ePrint Arch. 2024: 1184 (2024) - [i48]Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3. IACR Cryptol. ePrint Arch. 2024: 1360 (2024) - [i47]Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IACR Cryptol. ePrint Arch. 2024: 1365 (2024) - [i46]Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao:
Π-signHD: A New Structure for the SQIsign Family with Flexible Applicability. IACR Cryptol. ePrint Arch. 2024: 1404 (2024) - 2023
- [j28]Huanhuan Lian, Yafang Yang, Yunlei Zhao:
Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT. IEEE Internet Things J. 10(6, March 15): 4725-4734 (2023) - [j27]Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things. IEEE Trans. Computers 72(7): 1999-2010 (2023) - [c50]Zhuo Zhang, Jieyu Zheng, Yunlei Zhao:
Efficient NTTRU Implementation on ARMv8. ICPADS 2023: 2793-2794 - [i45]Jieyu Zheng, Haoliang Zhu, Zhenyu Song, Zheng Wang, Yunlei Zhao:
Optimized Vectorization Implementation of CRYSTALS-Dilithium. CoRR abs/2306.01989 (2023) - [i44]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. IACR Cryptol. ePrint Arch. 2023: 49 (2023) - [i43]Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao:
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1428 (2023) - [i42]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IACR Cryptol. ePrint Arch. 2023: 1429 (2023) - [i41]Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. IACR Cryptol. ePrint Arch. 2023: 1522 (2023) - 2022
- [j26]Shiyu Shen, Hongbing Wang, Yunlei Zhao:
Identity-based authenticated encryption with identity confidentiality. Theor. Comput. Sci. 901: 1-18 (2022) - [j25]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(5): 3448-3463 (2022) - [j24]Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. IEEE Trans. Inf. Forensics Secur. 17: 317-331 (2022) - [j23]Zhengzhong Jin, Shiyu Shen, Yunlei Zhao:
Compact and Flexible KEM From Ideal Lattice. IEEE Trans. Inf. Theory 68(6): 3829-3840 (2022) - [j22]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. IEEE Trans. Serv. Comput. 15(5): 2551-2564 (2022) - [c49]Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. ACSAC 2022: 304-317 - [c48]Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. ESORICS (2) 2022: 385-404 - [c47]Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decryption Failure Probability of Kyber in Reality. ICICS 2022: 148-160 - [i40]Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. CoRR abs/2205.05413 (2022) - [i39]Shiyu Shen, Hao Yang, Wangchen Dai, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. CoRR abs/2211.12265 (2022) - [i38]Zhichuang Liang, Yunlei Zhao:
Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey. CoRR abs/2211.13546 (2022) - [i37]Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decrypton Failure Probability of Kyber in Reality. IACR Cryptol. ePrint Arch. 2022: 212 (2022) - [i36]Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. IACR Cryptol. ePrint Arch. 2022: 222 (2022) - [i35]Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. IACR Cryptol. ePrint Arch. 2022: 579 (2022) - [i34]Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2022: 633 (2022) - [i33]Yu Liu, Haodong Jiang, Yunlei Zhao:
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE. IACR Cryptol. ePrint Arch. 2022: 1441 (2022) - [i32]Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 1621 (2022) - 2021
- [j21]Huige Wang, Guangye Sui, Yunlei Zhao, Kefei Chen:
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings. IEEE Access 9: 10443-10459 (2021) - [j20]Yuan Li, Xing-Chen Wang, Lin Huang, Yunlei Zhao:
Order-Revealing Encryption: File-Injection Attack and Forward Security. J. Comput. Sci. Technol. 36(4): 877-895 (2021) - [j19]Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao:
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal. Secur. Commun. Networks 2021: 3680359:1-3680359:20 (2021) - [c46]Huanhuan Lian, Tianyu Pan, Huige Wang, Yunlei Zhao:
Identity-Based Identity-Concealed Authenticated Key Exchange. ESORICS (2) 2021: 651-675 - [i31]Shiyu Shen, Feng He, Zhichuang Liang, Yang Wang, Yunlei Zhao:
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice. CoRR abs/2109.02893 (2021) - 2020
- [j18]Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. Peer-to-Peer Netw. Appl. 13(6): 2334-2341 (2020) - [j17]Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. Secur. Commun. Networks 2020: 8823788:1-8823788:14 (2020) - [c45]Boru Gong, Leixiao Cheng, Yunlei Zhao:
SKCN: Practical and Flexible Digital Signature from Module Lattice. ACISP 2020: 62-81 - [c44]Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao:
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications. Inscrypt 2020: 415-432 - [c43]Yunlei Zhao:
Identity-Based Authenticated Encryption with Identity Confidentiality. ESORICS (2) 2020: 633-653 - [i30]Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. IACR Cryptol. ePrint Arch. 2020: 56 (2020) - [i29]Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao:
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin. IACR Cryptol. ePrint Arch. 2020: 1484 (2020)
2010 – 2019
- 2019
- [j16]Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j15]Zhenfu Cao, Hongbing Wang, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. IEEE Trans. Dependable Secur. Comput. 16(5): 833-842 (2019) - [c42]Zhengzhong Jin, Yunlei Zhao:
Generic and Practical Key Establishment from Lattice. ACNS 2019: 302-322 - [c41]Yuan Li, Hongbing Wang, Yunlei Zhao:
Delegatable Order-Revealing Encryption. AsiaCCS 2019: 134-147 - [c40]Yunlei Zhao:
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. AsiaCCS 2019: 529-538 - [c39]Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. Inscrypt 2019: 397-415 - [i28]Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. IACR Cryptol. ePrint Arch. 2019: 106 (2019) - 2018
- [j14]Meng-Jun Qin, Yunlei Zhao, Zhoujun Ma:
Practical Constant-Size Ring Signature. J. Comput. Sci. Technol. 33(3): 533-541 (2018) - [c38]Guangye Sui, Yunlei Zhao:
Revisiting OAKE in the eCK Security Model. CNS 2018: 9 - [c37]Xingchen Wang, Yunlei Zhao:
Order-Revealing Encryption: File-Injection Attack and Forward Security. ESORICS (2) 2018: 101-121 - [i27]Yunlei Zhao:
Aggregation of Gamma-Signatures and Applications to Bitcoin. IACR Cryptol. ePrint Arch. 2018: 414 (2018) - [i26]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. IACR Cryptol. ePrint Arch. 2018: 1165 (2018) - [i25]Leixiao Cheng, Boru Gong, Yunlei Zhao:
Lattice-Based Signature from Key Consensus. IACR Cryptol. ePrint Arch. 2018: 1180 (2018) - 2017
- [j13]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j12]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. EAI Endorsed Trans. Security Safety 4(12): e4 (2017) - [c36]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact Lossy and All-but-One Trapdoor Functions from Lattice. ISPEC 2017: 279-296 - [c35]Boru Gong, Yunlei Zhao:
Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange. PQCrypto 2017: 163-183 - [i24]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. IACR Cryptol. ePrint Arch. 2017: 1058 (2017) - [i23]Xingchen Wang, Yunlei Zhao:
File-injection Attack and Forward Security for Order-revealing Encryption. IACR Cryptol. ePrint Arch. 2017: 1086 (2017) - 2016
- [j11]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in Public-Key Models. J. Cryptol. 29(1): 156-219 (2016) - [c34]Tianhao Wang, Yunlei Zhao:
Secure Dynamic SSE via Access Indistinguishable Storage. AsiaCCS 2016: 535-546 - [c33]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. CCS 2016: 1464-1479 - [c32]Zhoujun Ma, Li Yang, Yunlei Zhao:
Practical Signature Scheme from \varGamma Γ -Protocol. ISPEC 2016: 94-109 - [c31]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [i22]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. CoRR abs/1611.06150 (2016) - [i21]Boru Gong, Yunlei Zhao:
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15. IACR Cryptol. ePrint Arch. 2016: 913 (2016) - 2015
- [j10]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c30]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [i20]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j9]Andrew Chi-Chih Yao, Yunlei Zhao:
Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Trans. Inf. Forensics Secur. 9(1): 125-140 (2014) - [c29]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c28]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [e2]Keita Emura, Goichiro Hanaoka, Yunlei Zhao:
ASIAPKC'14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan. ACM 2014, ISBN 978-1-4503-2801-2 [contents] - 2013
- [j8]Andrew Chi-Chih Yao, Yunlei Zhao:
Online/Offline Signatures for Low-Power Devices. IEEE Trans. Inf. Forensics Secur. 8(2): 283-294 (2013) - [c27]Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou:
Privacy-preserving smart metering with regional statistics and personal enquiry services. AsiaCCS 2013: 369-380 - [c26]Andrew Chi-Chih Yao, Yunlei Zhao:
OAKE: a new family of implicitly authenticated diffie-hellman protocols. CCS 2013: 1113-1128 - [c25]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c24]Shengli Liu, Jian Weng, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. CT-RSA 2013: 84-100 - [c23]Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [e1]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - 2012
- [j7]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [c22]Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. ACNS 2012: 473-488 - [c21]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c20]Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. SEC 2012: 501-512 - [c19]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. TAMC 2012: 237-247 - [i19]Andrew C. Yao, Yunlei Zhao:
Digital Signatures from Challenge-Divided Sigma-Protocols. IACR Cryptol. ePrint Arch. 2012: 1 (2012) - [i18]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. IACR Cryptol. ePrint Arch. 2012: 287 (2012) - 2011
- [j6]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. J. Comput. Secur. 19(6): 1109-1146 (2011) - [c18]Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c17]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. IMACC 2011: 469-495 - [c16]Jian Weng, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Public Key Cryptography 2011: 284-295 - [c15]Kazuki Yoneyama, Yunlei Zhao:
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. ProvSec 2011: 348-365 - [i17]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Diffie-Hellman Protocols. CoRR abs/1105.1071 (2011) - [i16]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Protocols. IACR Cryptol. ePrint Arch. 2011: 35 (2011) - [i15]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. IACR Cryptol. ePrint Arch. 2011: 182 (2011) - [i14]Jian Weng, Yunlei Zhao:
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. IACR Cryptol. ePrint Arch. 2011: 208 (2011) - [i13]Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2011: 621 (2011) - 2010
- [c14]Andrew Chi-Chih Yao, Yunlei Zhao:
Deniable Internet Key Exchange. ACNS 2010: 329-348 - [c13]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. ESORICS 2010: 1-18 - [c12]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. ICALP (1) 2010: 702-714 - [i12]Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. IACR Cryptol. ePrint Arch. 2010: 59 (2010) - [i11]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. IACR Cryptol. ePrint Arch. 2010: 74 (2010) - [i10]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. IACR Cryptol. ePrint Arch. 2010: 107 (2010) - [i9]Jian Weng, Yunlei Zhao:
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. IACR Cryptol. ePrint Arch. 2010: 319 (2010)
2000 – 2009
- 2009
- [j5]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on the feasibility of generalised universal composability. Math. Struct. Comput. Sci. 19(1): 193-205 (2009) - [j4]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on universal composable zero-knowledge in the common reference string model. Theor. Comput. Sci. 410(11): 1099-1108 (2009) - [i8]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. CoRR abs/0908.2476 (2009) - [i7]