Yanbin Pan

Orcid: 0000-0002-5591-0234

According to our database1, Yanbin Pan authored at least 56 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15.
J. Syst. Sci. Complex., June, 2024

Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Cryptol. ePrint Arch., 2024

2023
Generalized attack on ECDSA: known bits in arbitrary positions.
Des. Codes Cryptogr., November, 2023

Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

Generalized Implicit Factorization Problem.
IACR Cryptol. ePrint Arch., 2023

A Coefficient-Embedding Ideal Lattice can be Embedded into Infinitely Many Polynomial Rings.
CoRR, 2023

2022
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project.
J. Syst. Sci. Complex., 2022

On Some Computational Problems in Local Fields.
J. Syst. Sci. Complex., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.
IACR Cryptol. ePrint Arch., 2022

On Rangasamy's outsourcing algorithm for solving quadratic congruence equations.
CoRR, 2022

BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Handle the Traces: Revisiting the Attack on ECDSA with EHNP.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

On the Ideal Shortest Vector Problem over Random Rational Primes.
IACR Cryptol. ePrint Arch., 2021

P/poly Invalidity of the Agr17 Functional Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Public-key Cryptosystems and Signature Schemes from p-adic Lattices.
IACR Cryptol. ePrint Arch., 2021

A Lattice Reduction Algorithm Based on Sublattice BKZ.
Proceedings of the Provable and Practical Security, 2021

Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project.
IET Inf. Secur., 2020

Lattice Klepto Revisited.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

It all Started with Compression: Another Look at Reconciliation Mechanism.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited.
IACR Cryptol. ePrint Arch., 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15.
IACR Cryptol. ePrint Arch., 2019

Computing Hermite Normal Form Faster via Solving System of Linear Equations.
Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, 2019

Breaking HK17 in Practice.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project.
IACR Cryptol. ePrint Arch., 2018

A Generalized Attack on Some Variants of the RSA Cryptosystem.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Cryptanalysis of HK17.
IACR Cryptol. ePrint Arch., 2017

The Search Successive Minima Problem Is Equivalent to Its Optimization Version.
Proceedings of the Information Security Applications - 18th International Conference, 2017

2016
Solving low-density multiple subset sum problems with SVP oracle.
J. Syst. Sci. Complex., 2016

The Sum of Binomial Coefficients and Integer Factorization.
Integers, 2016

Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Two Types of Special Bases for Integral Lattices.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice.
Proceedings of the Image and Graphics - 8th International Conference, 2015

2014
The Security of the Hanser-Slamanig Signature Scheme Revisited.
IACR Cryptol. ePrint Arch., 2014

Solving Random Subset Sum Problem by l<sub>p</sub>-norm SVP Oracle.
IACR Cryptol. ePrint Arch., 2014

Solving Random Subset Sum Problem by l p -norm SVP Oracle.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A Three-Level Sieve Algorithm for the Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2013

Improvements on Reductions among Different Variants of SVP and CVP.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
An algorithm for factoring integers.
IACR Cryptol. ePrint Arch., 2012

A New Reduction from Search SVP to Optimization SVP
CoRR, 2012

An Algebraic Broadcast Attack against NTRU.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem.
IEEE Trans. Inf. Theory, 2011

A Note on the Density of the Multiple Subset Sum Problems.
IACR Cryptol. ePrint Arch., 2011

An Efficient Broadcast Attack against NTRU.
IACR Cryptol. ePrint Arch., 2011

A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
A Broadcast Attack against NTRU Using Ding's Algorithm.
IACR Cryptol. ePrint Arch., 2010

2009
A New Lattice-Based Cryptosystem Mixed with a Knapsack.
IACR Cryptol. ePrint Arch., 2009

Covering Radius of Two-dimensional Lattices.
IACR Cryptol. ePrint Arch., 2009

2008
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem.
IACR Cryptol. ePrint Arch., 2008


  Loading...