2024
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field.
Des. Codes Cryptogr., December, 2024
Key derivable signature and its application in blockchain stealth address.
Cybersecur., December, 2024
High-low level task combination for object detection in foggy weather conditions.
J. Vis. Commun. Image Represent., 2024
Jolt-b: recursion friendly Jolt with basefold commitment.
IACR Cryptol. ePrint Arch., 2024
Parallel Zero-knowledge Virtual Machine.
IACR Cryptol. ePrint Arch., 2024
Text-Driven Synchronized Diffusion Video and Audio Talking Head Generation.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024
Image Manipulation Detection with Implicit Neural Representation and Limited Supervision.
Proceedings of the Computer Vision - ECCV 2024, 2024
A New Benchmark and Model for Challenging Image Manipulation Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Origami: Fold a Plonk for Ethereum's VDF.
IACR Cryptol. ePrint Arch., 2023
Chipmunk: Better Synchronized Multi-Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2023
VeriZexe: Decentralized Private Computation with Universal Setup.
Proceedings of the 32nd USENIX Security Symposium, 2023
Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speaker.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Two-Stage Dual Augmentation with CLIP for Improved Text-to-Sketch Synthesis.
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023
Tomato leaf diseases classification with convolutional neural network.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023
2022
IACR Cryptol. ePrint Arch., 2022
VERI-ZEXE: Decentralized Private Computation with Universal Setup.
IACR Cryptol. ePrint Arch., 2022
Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2022
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates.
IACR Cryptol. ePrint Arch., 2022
TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022
Improving Class Activation Map for Weakly Supervised Object Localization.
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
IACR Cryptol. ePrint Arch., 2021
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks.
IACR Cryptol. ePrint Arch., 2021
Manta: a Plug and Play Private DeFi Stack.
IACR Cryptol. ePrint Arch., 2021
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021
Hybrid Dual Attack on LWE with Arbitrary Secrets.
IACR Cryptol. ePrint Arch., 2021
2020
A signature scheme from the finite field isomorphism problem.
J. Math. Cryptol., 2020
Pointproofs: Aggregating Proofs for Multiple Vector Commitments.
IACR Cryptol. ePrint Arch., 2020
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.
IACR Cryptol. ePrint Arch., 2020
Manta: Privacy Preserving Decentralized Exchange.
IACR Cryptol. ePrint Arch., 2020
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
IACR Cryptol. ePrint Arch., 2020
Modular lattice signatures, revisited.
Des. Codes Cryptogr., 2020
Improving Text to Image Generation using Mode-seeking Function.
CoRR, 2020
Attention-based Selection Strategy for Weakly Supervised Object Localization.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019
(Linkable) Ring Signature from Hash-Then-One-Way Signature.
IACR Cryptol. ePrint Arch., 2019
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.
IACR Cryptol. ePrint Arch., 2019
Middle-Product Learning with Rounding Problem and its Applications.
IACR Cryptol. ePrint Arch., 2019
Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019
Wetland Environmental Protection and Spatial Distribution of Plant Communities in Arid and Semi-Arid Areas of Northwest China.
Proceedings of the 8th International Conference on Agro-Geoinformatics, 2019
Ring Signatures Based on Middle-Product Learning with Errors Problems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
2018
Optimizing Polynomial Convolution for NTRUEncrypt.
IEEE Trans. Computers, 2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.
IACR Cryptol. ePrint Arch., 2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018
Raptor: A Practical Lattice-Based (Linkable) Ring Signature.
IACR Cryptol. ePrint Arch., 2018
On the Hardness of the Computational Ring-LWR Problem and its Applications.
IACR Cryptol. ePrint Arch., 2018
Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018
Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
A signature scheme from Learning with Truncation.
IACR Cryptol. ePrint Arch., 2017
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
IACR Cryptol. ePrint Arch., 2017
Round2: KEM and PKE based on GLWR.
IACR Cryptol. ePrint Arch., 2017
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017
Correlation between climate warming and changes in agricultural caloric resources in arid regions of northwest China.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
2016
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
Proc. Priv. Enhancing Technol., 2016
NTRU Modular Lattice Signature Scheme on CUDA GPUs.
IACR Cryptol. ePrint Arch., 2016
2015
A quantum-safe circuit-extension handshake for Tor.
IACR Cryptol. ePrint Arch., 2015
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report.
IACR Cryptol. ePrint Arch., 2015
Choosing Parameters for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2015
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme.
Des. Codes Cryptogr., 2015
2014
An enhancement for heuristic attribute reduction algorithm in rough set.
Expert Syst. Appl., 2014
2013
Fully Homomorphic Encryption Using Hidden Ideal Lattice.
IEEE Trans. Inf. Forensics Secur., 2013
Adaptive Precision Floating Point LLL.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Lattice Reduction for Modular Knapsack.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
Proceedings of the Information Security Practice and Experience, 2012
2011
AGFSM: An new FSM based on adapted Gaussian membership in case retrieval model for customer-driven design.
Expert Syst. Appl., 2011
Integration of similarity measurement and dynamic SVM for electrically evoked potentials prediction in visual prostheses research.
Expert Syst. Appl., 2011
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2009
A case retrieval method combined with similarity measurement and multi-criteria decision making for concurrent design.
Expert Syst. Appl., 2009