Yanbin Pan
Orcid: 0000-0002-5591-0234
According to our database1,
Yanbin Pan
authored at least 68 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Finite Fields Their Appl., 2025
2024
J. Syst. Sci. Complex., June, 2024
Theor. Comput. Sci., 2024
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Infinite families of optimal and minimal codes over rings using simplicial complexes.
CoRR, 2024
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA.
IACR Commun. Cryptol., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
2023
Des. Codes Cryptogr., November, 2023
IEEE Trans. Inf. Theory, August, 2023
A Coefficient-Embedding Ideal Lattice can be Embedded into Infinitely Many Polynomial Rings.
CoRR, 2023
Proceedings of the 2023 3rd International Conference on Big Data, 2023
2022
J. Syst. Sci. Complex., 2022
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Provable and Practical Security, 2021
Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project.
IET Inf. Secur., 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
2016
J. Syst. Sci. Complex., 2016
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Image and Graphics - 8th International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem.
IEEE Trans. Inf. Theory, 2011
IACR Cryptol. ePrint Arch., 2011
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
2009
IACR Cryptol. ePrint Arch., 2009
2008
IACR Cryptol. ePrint Arch., 2008