Fuchun Lin

Orcid: 0000-0002-2282-6474

According to our database1, Fuchun Lin authored at least 39 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Amortized NISC over ℤ<sub>2<sup>k</sup></sub> from RMFE.
IACR Cryptol. ePrint Arch., 2023

More Efficient Zero-Knowledge Protocols over ℤ<sub>2<sup>k</sup></sub> via Galois Rings.
IACR Cryptol. ePrint Arch., 2023

Full threshold change range of threshold changeable secret sharing.
Des. Codes Cryptogr., 2023

Amortized NISC over $\mathbb {Z}_{2^k}$ from RMFE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Non-Malleable Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2022

Quantum-safe cryptography: crossroads of coding theory and cryptography.
Sci. China Inf. Sci., 2022

Post-Quantum Cheating Detectable Private Information Retrieval.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2020
Mapping accumulative whole-brain activities during environmental enrichment with manganese-enhanced magnetic resonance imaging.
NeuroImage, 2020

Efficient Threshold Function Secret Sharing With Information-Theoretic Security.
IEEE Access, 2020

Optimal Threshold Changeable Secret Sharing with New Threshold Change Range.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

2019
Non-Malleable Secret Sharing against Affine Tampering.
CoRR, 2019

Non-malleable Coding for Arbitrary Varying Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Non-Malleable Codes against Active Physical Layer Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Threshold Changeable Ramp Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Mapping of thalamic magnetic susceptibility in multiple sclerosis indicates decreasing iron with disease duration: A proposed mechanistic relationship between inflammation and oligodendrocyte vitality.
NeuroImage, 2018

Secret Sharing with Binary Shares.
IACR Cryptol. ePrint Arch., 2018

Post-quantum Security using Channel Noise.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Virtual Wiretap Channel for Secure MessageTransmission.
IACR Cryptol. ePrint Arch., 2017

Non-Malleable Codes with Leakage and Applications to Secure Communication.
CoRR, 2017

Secret key agreement using a virtual wiretap channel.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Virtual Wiretap Channel for Secure Message Transmission.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Detecting Algebraic Manipulation in Leaky Storage Systems.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Codes for Detection of Limited View Algebraic Tampering.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
2- and 3-Modular lattice wiretap codes in small dimensions.
Appl. Algebra Eng. Commun. Comput., 2015

Erasure adversarial wiretap channels.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Construction and secrecy gain of a family of 5-modular lattices.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions.
IEEE Trans. Inf. Theory, 2013

2012
Constructions of binary array set with zero-correlation zone.
Inf. Sci., 2012

Gaussian wiretap lattice codes from binary self-dual codes.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Secrecy gain of Gaussian wiretap codes from 2- and 3-modular lattices.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Secrecy gain of Gaussian wiretap codes from unimodular lattices.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2007
Progressive atrophy in the optic pathway and visual cortex of early blind Chinese adults: A voxel-based morphometry magnetic resonance imaging study.
NeuroImage, 2007

Discriminative Analysis of Neuromyelitis Optica Using Twodimensional Histogram from Diffusion Tensor Imaging.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007

2006
Discriminative analysis of relapsing neuromyelitis optica and relapsing-remitting multiple sclerosis based on two-dimensional histogram from diffusion tensor imaging.
NeuroImage, 2006

Quantitative analysis along the pyramidal tract by length-normalized parameterization based on diffusion tensor tractography: Application to patients with relapsing neuromyelitis optica.
NeuroImage, 2006

2005
Advances on Medical Imaging and Computing.
Proceedings of the Computer Vision for Biomedical Image Applications, 2005

Parcellating the Intra-splenium Based on the Traced Fiber from Tractography.
Proceedings of the Computer Vision for Biomedical Image Applications, 2005


  Loading...