Bao Li
Affiliations:- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
According to our database1,
Bao Li
authored at least 100 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields.
Secur. Commun. Networks, 2020
IACR Cryptol. ePrint Arch., 2020
Des. Codes Cryptogr., 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy.
Cybersecur., 2019
IEEE Access, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption.
Proceedings of the Provable Security, 2017
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters.
Proceedings of the Advances in Information and Computer Security, 2017
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2016
CoRR, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes.
Int. J. Inf. Comput. Secur., 2015
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version).
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions.
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
A general construction of binary interleaved sequences of period 4N with optimal autocorrelation.
Inf. Sci., 2014
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version).
IACR Cryptol. ePrint Arch., 2014
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Proceedings of the Progress in Cryptology, 2013
Proceedings of the Progress in Cryptology, 2013
2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Information Security, 2010
2008
Sci. China Ser. F Inf. Sci., 2008
2007
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme.
J. Comput. Sci. Technol., 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
J. Comput. Sci. Technol., 2004
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999