Sihang Pu

Orcid: 0009-0003-2056-6079

According to our database1, Sihang Pu authored at least 14 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fuzzy Private Set Intersection from VOLE.
IACR Cryptol. ePrint Arch., 2025

Enhanced Trapdoor Hashing from DDH and DCR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Fuzzy Private Set Intersection with Large Hyperballs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Practical Lattice-Based Distributed Signatures for a Small Number of Signers.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Towards compact bandwidth and efficient privacy-preserving computation.
PhD thesis, 2023

Post Quantum Fuzzy Stealth Signatures and Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Batch-OT with Optimal Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Laconic Private Set Intersection and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Multiparty Cardinality Testing for Threshold Private Intersection.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
Multiparty Cardinality Testing for Threshold Private Set Intersection.
IACR Cryptol. ePrint Arch., 2020

A Combinatorial Approach to Quantum Random Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2017
Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016


  Loading...