Yilei Chen

Affiliations:
  • Tsinghua University, Institute for Interdisciplinary Information Science (IIIS), Beijing, China


According to our database1, Yilei Chen authored at least 26 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks.
IACR Cryptol. ePrint Arch., 2023

On the Hardness of $\sf{S|LWE\rangle}$ with Gaussian and Other Amplitudes.
IACR Cryptol. ePrint Arch., 2023

On the Hardness of S|LWE〉 with Gaussian and Other Amplitudes.
CoRR, 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2021
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.
IACR Cryptol. ePrint Arch., 2021

On Removing Rejection Conditions in Practical Lattice-Based Signatures.
IACR Cryptol. ePrint Arch., 2021

White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering.
Electron. Colloquium Comput. Complex., 2021

2020
Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptol. ePrint Arch., 2020

2019
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation.
IACR Cryptol. ePrint Arch., 2019

Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures.
IACR Cryptol. ePrint Arch., 2019

Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space.
IACR Cryptol. ePrint Arch., 2019

Fiat-Shamir: from practice to theory.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Hiding secrets in public random functions
PhD thesis, 2018

Traitor-Tracing from LWE Made Simple and Attribute-Based.
IACR Cryptol. ePrint Arch., 2018

GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.
IACR Cryptol. ePrint Arch., 2018

Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption.
IACR Cryptol. ePrint Arch., 2018

Fiat-Shamir From Simpler Assumptions.
IACR Cryptol. ePrint Arch., 2018

2017
Constraint-hiding Constrained PRFs for NC1 from LWE.
IACR Cryptol. ePrint Arch., 2017

Constraint-Hiding Constrained PRFs for NC<sup>1</sup> from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Cryptanalyses of Candidate Branching Program Obfuscators.
IACR Cryptol. ePrint Arch., 2016

An Alternative View of the Graph-Induced Multilinear Maps.
IACR Cryptol. ePrint Arch., 2016

Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

2015
On the Correlation Intractability of Obfuscated Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2015

Succinct Adaptive Garbled RAM.
IACR Cryptol. ePrint Arch., 2015


  Loading...