Constructions secure against receiver selective opening and chosen ciphertext attacks. Zbl 1383.94024
Jia, Dingding; Lu, Xianhui; Li, Bao |
|
2017
|
Receiver selective opening security from indistinguishability obfuscation. Zbl 1394.94934
Jia, Dingding; Lu, Xianhui; Li, Bao |
|
2016
|
KDM-CCA security from RKA secure authenticated encryption. Zbl 1370.94531
Lu, Xianhui; Li, Bao; Jia, Dingding |
|
2015
|
Understanding and constructing AKE via double-key key encapsulation mechanism. Zbl 1446.94162
Xue, Haiyang; Lu, Xianhui; Li, Bao; Liang, Bei; He, Jingnan |
|
2018
|
Improved cryptanalysis on reduced-round GOST and Whirlpool hash function. Zbl 1314.94088
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2014
|
Chosen ciphertext secure encryption under factoring assumption revisited. Zbl 1291.94127
Mei, Qixiang; Li, Bao; Lu, Xianhui; Jia, Dingding |
|
2011
|
Related-key security for hybrid encryption. Zbl 1336.94063
Lu, Xianhui; Li, Bao; Jia, Dingding |
|
2014
|
RKA secure PKE based on the DDH and HR assumptions. Zbl 1319.94069
Jia, Dingding; Lu, Xianhui; Li, Bao; Mei, Qixiang |
|
2013
|
Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions. Zbl 1398.94140
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2015
|
Related key secure PKE from hash proof systems. Zbl 1417.94063
Jia, Dingding; Li, Bao; Lu, Xianhui; Mei, Qixiang |
|
2014
|
Preprocess-then-NTT Technique and its applications to Kyber and NewHope. Zbl 1477.94065
Zhou, Shuai; Xue, Haiyang; Zhang, Daode; Wang, Kunpeng; Lu, Xianhui; Li, Bao; He, Jingnan |
|
2018
|
Double-base chains for scalar multiplications on elliptic curves. Zbl 1479.94276
Yu, Wei; Musa, Saud Al; Li, Bao |
|
2020
|
A protocol of comparing information without leaking. Zbl 1109.68358
Qin, Jing; Zhang, Zhenfeng; Feng, Dengguo; Li, Bao |
|
2004
|
Cover attacks for elliptic curves with cofactor two. Zbl 1401.94176
Tian, Song; Li, Bao; Wang, Kunpeng; Yu, Wei |
|
2018
|
A general construction of binary interleaved sequences of period \(4{N}\) with optimal autocorrelation. Zbl 1355.94077
Yan, Tongjiang; Chen, Zhixiong; Li, Bao |
|
2014
|
Leveled strongly-unforgeable identity-based fully homomorphic signatures. Zbl 1397.94106
Wang, Fuqun; Wang, Kunpeng; Li, Bao; Gao, Yuanyuan |
|
2015
|
Hashing into Jacobi quartic curves. Zbl 1397.94111
Yu, Wei; Wang, Kunpeng; Li, Bao; He, Xiaoyang; Tian, Song |
|
2015
|
On the expansion length of triple-base number systems. Zbl 1312.94104
Yu, Wei; Wang, Kunpeng; Li, Bao; Tian, Song |
|
2013
|
Triple-base number system for scalar multiplication. Zbl 1312.94105
Yu, Wei; Wang, Kunpeng; Li, Bao; Tian, Song |
|
2013
|
A generalized sub-equation expansion method and its application to the nonlinear Schrödinger equation in inhomogeneous optical fiber media. Zbl 1170.78406
Li, Bao |
|
2007
|
A method to personalize the lumped parameter model of coronary artery. Zbl 1511.92019
Li, Bao; Wang, Wenxin; Mao, Boyan; Liu, Youjun |
|
2019
|
Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates. Zbl 1439.94047
Li, Weixuan; Yu, Wei; Li, Bao; Fan, Xuejun |
|
2019
|
Cryptanalysis of reduced-round Whirlwind. Zbl 1356.94075
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2015
|
How to remove the exponent GCD in HK09. Zbl 1319.94079
Lu, Xianhui; Li, Bao; Liu, Yamin |
|
2013
|
Deterministic identity-based encryption from lattices with more compact public parameters. Zbl 1398.94184
Zhang, Daode; Fang, Fuyang; Li, Bao; Wang, Xin |
|
2017
|
Round-optimal zero-knowledge proofs of knowledge for NP. Zbl 1270.68110
Li, Hongda; Feng, Dengguo; Li, Bao; Xue, Haixia |
|
2012
|
Improved efficiency of chosen ciphertext secure encryption from factoring. Zbl 1291.94121
Lu, Xianhui; Li, Bao; Mei, Qixiang; Liu, Yamin |
|
2012
|
Existence of 3-round zero-knowledge proof systems for NP. Zbl 1137.94007
Li, Hongda; Li, Bao |
|
2008
|
Competitive flow effects of internal mammary artery bypass with different coronary stenosis lengths. Zbl 1511.92020
Mao, Boyan; Wang, Wenxin; Li, Bao; Zhang, Xiaoyan; Liu, Youjun |
|
2019
|
IBE with tight security against selective opening and chosen-ciphertext attacks. Zbl 1448.94209
Jia, Dingding; Liu, Yamin; Li, Bao |
|
2020
|
Identity-based lossy encryption from learning with errors. Zbl 1398.68136
He, Jingnan; Li, Bao; Lu, Xianhui; Jia, Dingding; Xue, Haiyang; Sun, Xiaochao |
|
2015
|
Cramer-Shoup like chosen ciphertext security from LPN. Zbl 1403.94080
Sun, Xiaochao; Li, Bao; Lu, Xianhui |
|
2015
|
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I. Zbl 0948.94018
Li, Bao; Zhou, Linfang; Xiao, Guozhen |
|
1998
|
IND-CCA security of Kyber in the quantum random oracle model, revisited. Zbl 1530.81052
Chen, Zhao; Lu, Xianhui; Jia, Dingding; Li, Bao |
|
2023
|
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation. Zbl 1368.94132
Xue, Haiyang; Lu, Xianhui; Li, Bao; Liu, Yamin |
|
2014
|
Deterministic encoding into twisted Edwards curves. Zbl 1346.94138
Yu, Wei; Wang, Kunpeng; Li, Bao; He, Xiaoyang; Tian, Song |
|
2016
|
CCA secure public key encryption scheme based on LWE without Gaussian sampling. Zbl 1345.94088
Sun, Xiaochao; Li, Bao; Lu, Xianhui; Fang, Fuyang |
|
2016
|
On constant-round zero-knowledge proofs of knowledge for NP-relations. Zbl 1497.68215
Li, Hongda; Xu, Haixia; Li, Bao; Feng, Dengguo |
|
2010
|
IND-CCA security of Kyber in the quantum random oracle model, revisited. Zbl 1530.81052
Chen, Zhao; Lu, Xianhui; Jia, Dingding; Li, Bao |
|
2023
|
Double-base chains for scalar multiplications on elliptic curves. Zbl 1479.94276
Yu, Wei; Musa, Saud Al; Li, Bao |
|
2020
|
IBE with tight security against selective opening and chosen-ciphertext attacks. Zbl 1448.94209
Jia, Dingding; Liu, Yamin; Li, Bao |
|
2020
|
A method to personalize the lumped parameter model of coronary artery. Zbl 1511.92019
Li, Bao; Wang, Wenxin; Mao, Boyan; Liu, Youjun |
|
2019
|
Speeding up scalar multiplication on Koblitz curves using \(\mu_4\) coordinates. Zbl 1439.94047
Li, Weixuan; Yu, Wei; Li, Bao; Fan, Xuejun |
|
2019
|
Competitive flow effects of internal mammary artery bypass with different coronary stenosis lengths. Zbl 1511.92020
Mao, Boyan; Wang, Wenxin; Li, Bao; Zhang, Xiaoyan; Liu, Youjun |
|
2019
|
Understanding and constructing AKE via double-key key encapsulation mechanism. Zbl 1446.94162
Xue, Haiyang; Lu, Xianhui; Li, Bao; Liang, Bei; He, Jingnan |
|
2018
|
Preprocess-then-NTT Technique and its applications to Kyber and NewHope. Zbl 1477.94065
Zhou, Shuai; Xue, Haiyang; Zhang, Daode; Wang, Kunpeng; Lu, Xianhui; Li, Bao; He, Jingnan |
|
2018
|
Cover attacks for elliptic curves with cofactor two. Zbl 1401.94176
Tian, Song; Li, Bao; Wang, Kunpeng; Yu, Wei |
|
2018
|
Constructions secure against receiver selective opening and chosen ciphertext attacks. Zbl 1383.94024
Jia, Dingding; Lu, Xianhui; Li, Bao |
|
2017
|
Deterministic identity-based encryption from lattices with more compact public parameters. Zbl 1398.94184
Zhang, Daode; Fang, Fuyang; Li, Bao; Wang, Xin |
|
2017
|
Receiver selective opening security from indistinguishability obfuscation. Zbl 1394.94934
Jia, Dingding; Lu, Xianhui; Li, Bao |
|
2016
|
Deterministic encoding into twisted Edwards curves. Zbl 1346.94138
Yu, Wei; Wang, Kunpeng; Li, Bao; He, Xiaoyang; Tian, Song |
|
2016
|
CCA secure public key encryption scheme based on LWE without Gaussian sampling. Zbl 1345.94088
Sun, Xiaochao; Li, Bao; Lu, Xianhui; Fang, Fuyang |
|
2016
|
KDM-CCA security from RKA secure authenticated encryption. Zbl 1370.94531
Lu, Xianhui; Li, Bao; Jia, Dingding |
|
2015
|
Improved (pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions. Zbl 1398.94140
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2015
|
Leveled strongly-unforgeable identity-based fully homomorphic signatures. Zbl 1397.94106
Wang, Fuqun; Wang, Kunpeng; Li, Bao; Gao, Yuanyuan |
|
2015
|
Hashing into Jacobi quartic curves. Zbl 1397.94111
Yu, Wei; Wang, Kunpeng; Li, Bao; He, Xiaoyang; Tian, Song |
|
2015
|
Cryptanalysis of reduced-round Whirlwind. Zbl 1356.94075
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2015
|
Identity-based lossy encryption from learning with errors. Zbl 1398.68136
He, Jingnan; Li, Bao; Lu, Xianhui; Jia, Dingding; Xue, Haiyang; Sun, Xiaochao |
|
2015
|
Cramer-Shoup like chosen ciphertext security from LPN. Zbl 1403.94080
Sun, Xiaochao; Li, Bao; Lu, Xianhui |
|
2015
|
Improved cryptanalysis on reduced-round GOST and Whirlpool hash function. Zbl 1314.94088
Ma, Bingke; Li, Bao; Hao, Ronglin; Li, Xiaoqian |
|
2014
|
Related-key security for hybrid encryption. Zbl 1336.94063
Lu, Xianhui; Li, Bao; Jia, Dingding |
|
2014
|
Related key secure PKE from hash proof systems. Zbl 1417.94063
Jia, Dingding; Li, Bao; Lu, Xianhui; Mei, Qixiang |
|
2014
|
A general construction of binary interleaved sequences of period \(4{N}\) with optimal autocorrelation. Zbl 1355.94077
Yan, Tongjiang; Chen, Zhixiong; Li, Bao |
|
2014
|
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation. Zbl 1368.94132
Xue, Haiyang; Lu, Xianhui; Li, Bao; Liu, Yamin |
|
2014
|
RKA secure PKE based on the DDH and HR assumptions. Zbl 1319.94069
Jia, Dingding; Lu, Xianhui; Li, Bao; Mei, Qixiang |
|
2013
|
On the expansion length of triple-base number systems. Zbl 1312.94104
Yu, Wei; Wang, Kunpeng; Li, Bao; Tian, Song |
|
2013
|
Triple-base number system for scalar multiplication. Zbl 1312.94105
Yu, Wei; Wang, Kunpeng; Li, Bao; Tian, Song |
|
2013
|
How to remove the exponent GCD in HK09. Zbl 1319.94079
Lu, Xianhui; Li, Bao; Liu, Yamin |
|
2013
|
Round-optimal zero-knowledge proofs of knowledge for NP. Zbl 1270.68110
Li, Hongda; Feng, Dengguo; Li, Bao; Xue, Haixia |
|
2012
|
Improved efficiency of chosen ciphertext secure encryption from factoring. Zbl 1291.94121
Lu, Xianhui; Li, Bao; Mei, Qixiang; Liu, Yamin |
|
2012
|
Chosen ciphertext secure encryption under factoring assumption revisited. Zbl 1291.94127
Mei, Qixiang; Li, Bao; Lu, Xianhui; Jia, Dingding |
|
2011
|
On constant-round zero-knowledge proofs of knowledge for NP-relations. Zbl 1497.68215
Li, Hongda; Xu, Haixia; Li, Bao; Feng, Dengguo |
|
2010
|
Existence of 3-round zero-knowledge proof systems for NP. Zbl 1137.94007
Li, Hongda; Li, Bao |
|
2008
|
A generalized sub-equation expansion method and its application to the nonlinear Schrödinger equation in inhomogeneous optical fiber media. Zbl 1170.78406
Li, Bao |
|
2007
|
A protocol of comparing information without leaking. Zbl 1109.68358
Qin, Jing; Zhang, Zhenfeng; Feng, Dengguo; Li, Bao |
|
2004
|
A type of recurring relation on sequences and efficient decoding of a class of algebraic-geometric codes. I. Zbl 0948.94018
Li, Bao; Zhou, Linfang; Xiao, Guozhen |
|
1998
|