Hongrui Cui

Orcid: 0000-0002-6203-413X

According to our database1, Hongrui Cui authored at least 23 papers between 2020 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Fuzzy Decision Support System for Medical Service Quality Management in Hospitals.
Int. J. Comput. Intell. Syst., December, 2025

Multimedia event extraction based on multimodal low-dimensional feature representation space.
Signal Image Video Process., May, 2025

A text mining and grounded theory analysis of the dissemination of public opinion toward food safety incidents.
J. Comput. Methods Sci. Eng., 2025

Dory: Streaming PCG with Small Memory.
IACR Cryptol. ePrint Arch., 2025

Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC.
IACR Cryptol. ePrint Arch., 2025

On Probabilistic Truncation in Privacy-preserving Machine Learning.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Fast two-party signature for upgrading ECDSA to two-party scenario easily.
Theor. Comput. Sci., February, 2024

A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR.
IACR Cryptol. ePrint Arch., 2024

ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head.
IACR Cryptol. ePrint Arch., 2024

AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2024

A system capable of verifiably and privately screening global DNA synthesis.
CoRR, 2024

sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS.
IACR Cryptol. ePrint Arch., 2023

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS<sup>+</sup> and XMSS.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Algebraic Attacks on Round-Reduced Rain and Full AIM-III.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
SPHINCS-α: A Compact Stateless Hash-Based Signature Scheme.
IACR Cryptol. ePrint Arch., 2022

2021
Facial Template Protection via Lattice-based Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2021

Automatic Generation of Distribution Network Operation Data Report and Application of Data Mining.
Proceedings of the 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 2021

MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021

A Simple Post-Quantum Non-interactive Zero-Knowledge Proof from Garbled Circuits.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
A Not-So-Trival Replay Attack Against DH-PSI.
IACR Cryptol. ePrint Arch., 2020


  Loading...