Xianhui Lu
Orcid: 0000-0001-7091-5810
According to our database1,
Xianhui Lu
authored at least 81 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
2024
Cybersecur., December, 2024
Cybersecur., December, 2024
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy.
Cybersecur., December, 2024
ALT: Area-Efficient and Low-Latency FPGA Design for Torus Fully Homomorphic Encryption.
IEEE Trans. Very Large Scale Integr. Syst., April, 2024
Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping.
IEEE Commun. Lett., March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data.
Comput. J., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Approaching Shannon's One-Time Pad: Metrics, Architectures, and Enabling Technologies.
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2017
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
2011
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Advances in Information and Computer Security, 2010
2009
2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007