Volgen
Weiqiang Wen
Weiqiang Wen
Telecom Paris, Institut Polytechnique de Paris
Geverifieerd e-mailadres voor telecom-paris.fr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
S Bai, D Stehlé, W Wen
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
522018
Faster enumeration-based lattice reduction: root Hermite factor Time
MR Albrecht, S Bai, PA Fouque, P Kirchner, D Stehlé, W Wen
Annual International Cryptology Conference, 186-212, 2020
382020
On the hardness of module learning with errors with short distributions
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Journal of Cryptology 36 (1), 1, 2023
362023
Towards classical hardness of module-LWE: the linear rank case
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on the Theory and Application of Cryptology and …, 2020
302020
Improved reduction from the bounded distance decoding problem to the unique shortest vector problem in lattices
S Bai, D Stehlé, W Wen
Cryptology ePrint Archive, 2016
252016
A refined analysis of the cost for solving LWE via uSVP
S Bai, S Miller, W Wen
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
242019
On the hardness of module-LWE with binary secret
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Cryptographers’ Track at the RSA Conference, 503-526, 2021
202021
Learning with errors and extrapolated dihedral cosets
Z Brakerski, E Kirshanova, D Stehlé, W Wen
IACR international workshop on public key cryptography, 702-727, 2018
182018
Partial key exposure attacks on BIKE, Rainbow and NTRU
A Esser, A May, J Verbel, W Wen
Annual International Cryptology Conference, 346-375, 2022
162022
Middle-product learning with rounding problem and its applications
S Bai, K Boudgoust, D Das, A Roux-Langlois, W Wen, Z Zhang
International Conference on the Theory and Application of Cryptology and …, 2019
122019
Entropic hardness of module-LWE from module-NTRU
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on Cryptology in India, 78-99, 2022
102022
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
92016
A generic transform from multi-round interactive proof to NIZK
PA Fouque, A Georgescu, C Qian, A Roux-Langlois, W Wen
IACR International Conference on Public-Key Cryptography, 461-481, 2023
62023
One-round deniable key exchange with perfect forward security
W Wen, L Wang, M Xie
Cryptology ePrint Archive, 2014
32014
Compact Encryption based on Module-NTRU problems
S Bai, H Jangir, H Lin, T Ngo, W Wen, J Zheng
International Conference on Post-Quantum Cryptography, 371-405, 2024
22024
Zero-Knowledge Proofs of Quantumness
DH Phan, W Wen, X Yan, J Zheng
Cryptology ePrint Archive, 2025
2025
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus
DH Phan, W Wen, X Yan, J Zheng
International Conference on the Theory and Application of Cryptology and …, 2025
2025
Quantum computation capability verification protocol for noisy intermediate-scale quantum devices with the dihedral coset problem
R Lin, W Wen
Physical Review A 106 (1), 012430, 2022
2022
Master internship: Zero-Knowledge proofs based on lattice problems, with applications to threshold signatures
M Rambaud, W Wen
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19