Haiyang Xue

Orcid: 0000-0002-0173-7894

According to our database1, Haiyang Xue authored at least 33 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023

2022
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives.
IACR Cryptol. ePrint Arch., 2022

Efficient Online-friendly Two-Party ECDSA Signature.
IACR Cryptol. ePrint Arch., 2022

2020
Compact Authenticated Key Exchange in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2020

Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers.
Sci. China Inf. Sci., 2020

2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019

Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Neural Machine Translation with Bilingual History Involved Attention.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Regular lossy functions and their applications in leakage-resilient cryptography.
Theor. Comput. Sci., 2018

Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Dual Receiver Encryption and More.
IACR Cryptol. ePrint Arch., 2018

Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2018

Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
IACR Cryptol. ePrint Arch., 2018

LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018

Regularly Lossy Functions and Their Applications.
IACR Cryptol. ePrint Arch., 2018

Improving the Robustness of Speech Translation.
CoRR, 2018

Regularly Lossy Functions and Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption.
Proceedings of the Provable Security, 2017

IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2017

Towards Tightly Secure Deterministic Public Key Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Compact Hierarchical IBE from Lattices in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Lossy Key Encapsulation Mechanism and Its Applications.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Identity-Based Lossy Encryption from Learning with Errors.
Proceedings of the Advances in Information and Computer Security, 2015

Lossy Projective Hashing and Its Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field.
Sci. China Inf. Sci., 2014

Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Proceedings of the Provable Security - 8th International Conference, 2014

On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013


  Loading...