Feng-Hao Liu
Orcid: 0000-0003-4298-3925
According to our database1,
Feng-Hao Liu
authored at least 58 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024
Des. Codes Cryptogr., June, 2024
Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security.
IACR Cryptol. ePrint Arch., 2024
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023
Batch Bootstrapping II: - Bootstrapping in Polynomial Modulus only Requires Õ(1) FHE Multiplications in Amortization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Batch Bootstrapping I: - A New Framework for SIMD Bootstrapping in Polynomial Modulus.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.
IACR Cryptol. ePrint Arch., 2022
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
FedTrust: Towards Building Secure Robust and Trustworthy Moderators for Federated Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks.
IACR Cryptol. ePrint Arch., 2021
Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
J. Cryptol., 2020
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
IACR Cryptol. ePrint Arch., 2015
2014
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
Proceedings of the 28th Conference on Computational Complexity, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Electron. Colloquium Comput. Complex., 2009
2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
2007
IACR Cryptol. ePrint Arch., 2007