Author of the publication

Efficient identity-based signature over NTRU lattice.

, , , and . Frontiers Inf. Technol. Electron. Eng., 17 (2): 135-142 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 222-232. Springer, (2011)Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions., , , and . Inf. Sci., (2014)Fast S-box security mechanism research based on the polymorphic cipher., , and . Inf. Sci., 178 (6): 1603-1610 (2008)On the Invalidity of LV16/Lin17 Obfuscation Schemes., , , and . IACR Cryptol. ePrint Arch., (2023)A Note on P/poly Validity of GVW15 Predicate Encryption Scheme., , , and . IACR Cryptol. ePrint Arch., (2021)Lattice-based linearly homomorphic signature scheme over binary field., , and . Sci. China Inf. Sci., 56 (11): 1-9 (2013)Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 369-382. Springer, (2021)Evolutionary Algorithm Based Immune Intrusion Analysis Engine., , , and . ICNC (7), page 138-142. IEEE Computer Society, (2008)ECGSC: Elliptic Curve Based Generalized Signcryption., , , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 956-965. Springer, (2006)Faster Bootstrapping of FHE over the integers with large prime message space., , , and . IACR Cryptology ePrint Archive, (2019)