Yanbin Pan

Orcid: 0000-0002-5591-0234

According to our database1, Yanbin Pan authored at least 77 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Provably Secure Network Protocol for Private Communication with Analysis and Tracing Resistance.
CoRR, August, 2025

Commitment Schemes Based on Module-LIP.
IACR Cryptol. ePrint Arch., 2025

Solving LWE with Independent Hints about Secret and Errors.
IACR Cryptol. ePrint Arch., 2025

On Factoring and Power Divisor Problems via Rank-3 Lattices and the Second Vector.
IACR Cryptol. ePrint Arch., 2025

Better Bounds for Finding Fixed-Degree Isogenies via Coppersmith's Method.
IACR Cryptol. ePrint Arch., 2025

Linear codes from planar functions and related covering codes.
Finite Fields Their Appl., 2025

Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Computing Asymptotic Bounds for Small Roots in Coppersmith's Method via Sumset Theory.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
On the SVP for low-dimensional circulant lattices.
J. Comb. Optim., July, 2024

Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15.
J. Syst. Sci. Complex., June, 2024

Partial prime factor exposure attacks on some RSA variants.
Theor. Comput. Sci., 2024

Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Cryptol. ePrint Arch., 2024

New Results for Coppersmith's Method from the Perspective of Sumsets Theory.
IACR Cryptol. ePrint Arch., 2024

Practical Small Private Exponent Attacks against RSA.
IACR Cryptol. ePrint Arch., 2024

Infinite families of optimal and minimal codes over rings using simplicial complexes.
CoRR, 2024

Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA.
IACR Commun. Cryptol., 2024

An Improved Practical Key Mismatch Attack Against NTRU.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Embedding Integer Lattices as Ideals into Polynomial Rings.
Proceedings of the 2024 International Symposium on Symbolic and Algebraic Computation, 2024

Solving Modular Linear Equations via Automated Coppersmith and Its Applications.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

1-Out-of-N Oblivious Transfer from MLWE.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Generalized attack on ECDSA: known bits in arbitrary positions.
Des. Codes Cryptogr., November, 2023

Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

A Coefficient-Embedding Ideal Lattice can be Embedded into Infinitely Many Polynomial Rings.
CoRR, 2023

Generalized Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

Building Recognition Based on Improved U-Net Model.
Proceedings of the 2023 3rd International Conference on Big Data, 2023

2022
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project.
J. Syst. Sci. Complex., 2022

On Some Computational Problems in Local Fields.
J. Syst. Sci. Complex., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

On Rangasamy's outsourcing algorithm for solving quadratic congruence equations.
CoRR, 2022

BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange.
Proceedings of the Computer Security - ESORICS 2022, 2022

Handle the Traces: Revisiting the Attack on ECDSA with EHNP.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

P/poly Invalidity of the Agr17 Functional Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Public-key Cryptosystems and Signature Schemes from p-adic Lattices.
IACR Cryptol. ePrint Arch., 2021

A Lattice Reduction Algorithm Based on Sublattice BKZ.
Proceedings of the Provable and Practical Security, 2021

Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

On the Ideal Shortest Vector Problem over Random Rational Primes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Lattice Klepto Revisited.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

It all Started with Compression: Another Look at Reconciliation Mechanism.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Computing Hermite Normal Form Faster via Solving System of Linear Equations.
Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, 2019

Breaking HK17 in Practice.
Proceedings of the IEEE International Symposium on Information Theory, 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project.
IACR Cryptol. ePrint Arch., 2018

A Generalized Attack on Some Variants of the RSA Cryptosystem.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Cryptanalysis of HK17.
IACR Cryptol. ePrint Arch., 2017

The Search Successive Minima Problem Is Equivalent to Its Optimization Version.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2016
Solving low-density multiple subset sum problems with SVP oracle.
J. Syst. Sci. Complex., 2016

The Sum of Binomial Coefficients and Integer Factorization.
Integers, 2016

Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Two Types of Special Bases for Integral Lattices.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice.
Proceedings of the Image and Graphics - 8th International Conference, 2015

2014
The Security of the Hanser-Slamanig Signature Scheme Revisited.
IACR Cryptol. ePrint Arch., 2014

Solving Random Subset Sum Problem by l<sub>p</sub>-norm SVP Oracle.
IACR Cryptol. ePrint Arch., 2014

Solving Random Subset Sum Problem by l p -norm SVP Oracle.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Improvements on Reductions among Different Variants of SVP and CVP.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

A Three-Level Sieve Algorithm for the Shortest Vector Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
An algorithm for factoring integers.
IACR Cryptol. ePrint Arch., 2012

A New Reduction from Search SVP to Optimization SVP
CoRR, 2012

An efficient broadcast attack against NTRU.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

An Algebraic Broadcast Attack against NTRU.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem.
IEEE Trans. Inf. Theory, 2011

A Note on the Density of the Multiple Subset Sum Problems.
IACR Cryptol. ePrint Arch., 2011

A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
A Broadcast Attack against NTRU Using Ding's Algorithm.
IACR Cryptol. ePrint Arch., 2010

2009
A New Lattice-Based Cryptosystem Mixed with a Knapsack.
IACR Cryptol. ePrint Arch., 2009

Covering Radius of Two-dimensional Lattices.
IACR Cryptol. ePrint Arch., 2009

2008
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem.
IACR Cryptol. ePrint Arch., 2008


  Loading...