Ivy K. Y. Woo

Orcid: 0000-0001-8905-1207

According to our database1, Ivy K. Y. Woo authored at least 13 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Pilvi: Lattice Threshold PKE with Small Decryption Shares and Improved Security.
IACR Cryptol. ePrint Arch., 2025

Threshold Public-Key Encryption: Definitions, Relations and Constructions.
IACR Cryptol. ePrint Arch., 2025

Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally.
IACR Cryptol. ePrint Arch., 2025

A Gaussian Leftover Hash Lemma for Modules over Number Fields.
IACR Cryptol. ePrint Arch., 2025

Leaky LWE: Learning with Errors with Semi-Adaptive Secret- and Error-Leakage.
IACR Commun. Cryptol., 2025

Lattice-Based Proof-Friendly Signatures from Vanishing Short Integer Solutions.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Lattice-Based Obfuscation from NTRU and Equivocal LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Lattice-based Multi-Authority/Client Attribute-based Encryption for Circuits.
IACR Commun. Cryptol., 2024

Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Evasive LWE Assumptions: Definitions, Classes, and Counterexamples.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Traitor Tracing Without Trusted Authority from Registered Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
On Sustainable Ring-Based Anonymous Systems.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
On Defeating Graph Analysis of Anonymous Transactions.
IACR Cryptol. ePrint Arch., 2022


  Loading...