Yang Cui
Affiliations:- Huawei Technologies, Wireless Network Research Department, Beijing, China
- Chuo University, Tokyo, Japan
- National Institute of Advanced Industrial Science and Technology (AIST), Research Center for Information Security, Tokyo, Japan
- University of Tokyo, Institute of Industrial Science, Japan
According to our database1,
Yang Cui
authored at least 22 papers
between 2003 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014
2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
2009
IEICE Trans. Inf. Syst., 2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008
2007
Proceedings of the Provable Security, 2007
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Applied Algebra, 2007
2006
Inf. Media Technol., 2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Applied Algebra, 2006
2005
Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Topics in Cryptology, 2005
2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003