Rupeng Yang
Orcid: 0000-0002-1029-4415
According to our database1,
Rupeng Yang
authored at least 32 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Provable and Practical Security, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
2023
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014