More efficient digital signatures with tight multi-user security D Diemert, K Gellert, T Jager, L Lyu IACR International Conference on Public-Key Cryptography, 1-31, 2021 | 42 | 2021 |
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system S Han, S Liu, L Lyu, D Gu Annual International Cryptology Conference, 417-447, 2019 | 22 | 2019 |
Efficient KDM-CCA secure public-key encryption for polynomial functions S Han, S Liu, L Lyu International Conference on the Theory and Application of Cryptology and …, 2016 | 17 | 2016 |
Tightly SIM-SO-CCA secure public key encryption from standard assumptions L Lyu, S Liu, S Han, D Gu Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 16 | 2018 |
Digital signatures with memory-tight security in the multi-challenge setting D Diemert, K Gellert, T Jager, L Lyu Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 10 | 2021 |
On fingerprinting attacks and length-hiding encryption K Gellert, T Jager, L Lyu, T Neuschulten Cryptographers’ Track at the RSA Conference, 345-369, 2022 | 7 | 2022 |
Anonymous public key encryption under corruptions Z Huang, J Lai, S Han, L Lyu, J Weng International Conference on the Theory and Application of Cryptology and …, 2022 | 6 | 2022 |
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system S Han, S Liu, L Lyu Designs, Codes and Cryptography 86 (7), 1411-1449, 2018 | 3 | 2018 |
Public-key encryption with tight simulation-based selective-opening security L Lyu, S Liu, S Han The Computer Journal 61 (2), 288-318, 2018 | 2 | 2018 |
Tightly secure encryption schemes against related-key attacks S Han, S Liu, L Lyu, D Gu The Computer Journal 61 (12), 1825-1844, 2018 | 1 | 2018 |
Structure-preserving public-key encryption with leakage-resilient CCA security L Lyu, S Liu, D Gu Theoretical Computer Science 795, 57-80, 2019 | | 2019 |
QANIZK for adversary-dependent languages and their applications S Han, S Liu, L Lyu Theoretical Computer Science 779, 47-71, 2019 | | 2019 |
Efficient KDM‐CCA Secure Public‐Key Encryption via Auxiliary‐Input Authenticated Encryption S Han, S Liu, L Lyu Security and Communication Networks 2017 (1), 2148534, 2017 | | 2017 |