Yunlei Zhao
Orcid: 0000-0002-2623-9170
According to our database1,
Yunlei Zhao
authored at least 120 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Frontiers Comput. Sci., August, 2024
IEEE Trans. Parallel Distributed Syst., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Theor. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2.
CoRR, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023
Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022
Theor. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey.
CoRR, 2022
CoRR, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal.
Secur. Commun. Networks, 2021
J. Comput. Sci. Technol., 2021
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice.
CoRR, 2021
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.
IEEE Access, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Secur. Commun. Networks, 2020
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Inf. Sci., 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
EAI Endorsed Trans. Security Safety, 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
2016
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEICE Trans. Inf. Syst., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Theor. Comput. Sci., 2009
Math. Struct. Comput. Sci., 2009
2007
Electron. Colloquium Comput. Complex., 2007
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
2005
Electron. Colloquium Comput. Complex., 2005
Electron. Colloquium Comput. Complex., 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
2004
Int. J. Inf. Technol. Decis. Mak., 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
2001
IACR Cryptol. ePrint Arch., 2001