


default search action
Yamin Liu 0002
Person information
- affiliation: HuaWei International, Singapore
- affiliation: University of Chinese Academy of Sciences (UCAS), School of Cyber Security, China
- affiliation: Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, Institute of Information Engineering, China
Other persons with the same name
- Yamin Liu — disambiguation page
- Yamin Liu 0001
— Huadian Electric Power Research Institute Company Ltd., Hangzhou, Zhejiang, China (and 1 more) - Yamin Liu 0003
— Henan Normal University, School of Computer and Information Engineering, Xinxiang, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c17]Xianhui Lu, Yongjian Yin, Dingding Jia, Jingnan He, Yamin Liu, Yijian Liu, Hongbo Liu:
Fiat-Shamir with Rejection and Rotation. ACISP (2) 2025: 145-165- 2020
[j2]Dingding Jia
, Yamin Liu, Bao Li:
IBE with tight security against selective opening and chosen-ciphertext attacks. Des. Codes Cryptogr. 88(7): 1371-1400 (2020)
2010 – 2019
- 2019
[j1]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue
, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. Secur. Commun. Networks 2019: 1816393:1-1816393:12 (2019)
[i3]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. IACR Cryptol. ePrint Arch. 2019: 51 (2019)- 2018
[i2]Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li:
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus. IACR Cryptol. ePrint Arch. 2018: 1009 (2018)- 2017
[c16]Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue
, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. ICICS 2017: 154-161- 2016
[c15]Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue
:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. AsiaCCS 2016: 907-912
[c14]Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue
:
Lossy Key Encapsulation Mechanism and Its Applications. ICISC 2016: 126-144
[c13]Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang:
Approximate-Deterministic Public Key Encryption from Hard Learning Problems. INDOCRYPT 2016: 25-42- 2015
[c12]Haiyang Xue
, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. INDOCRYPT 2015: 64-84- 2014
[c11]Haiyang Xue
, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49
[c10]Haiyang Xue
, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ProvSec 2014: 162-177- 2013
[c9]Haiyang Xue
, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu:
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. CANS 2013: 235-250
[c8]Dingding Jia, Bao Li, Xianhui Lu, Yamin Liu:
RSA-OAEP is RKA Secure. Inscrypt 2013: 270-281
[c7]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. ISPEC 2013: 105-116
[c6]Xianhui Lu, Bao Li, Yamin Liu:
How to Remove the Exponent GCD in HK09. ProvSec 2013: 239-248
[i1]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme. IACR Cryptol. ePrint Arch. 2013: 159 (2013)- 2012
[c5]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. ISPEC 2012: 34-45- 2011
[c4]Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia:
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. ACISP 2011: 310-318
[c3]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Tradeoff between Encapsulation and Decapsulation of HK09. Inscrypt 2011: 131-141
[c2]Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:
Encryption Simulatability Reconsidered. ISPEC 2011: 14-23- 2010
[c1]Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang:
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. IWSEC 2010: 40-54
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-31 00:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







