Yang Cui

Affiliations:
  • Huawei Technologies, Wireless Network Research Department, Beijing, China
  • Chuo University, Tokyo, Japan
  • National Institute of Advanced Industrial Science and Technology (AIST), Research Center for Information Security, Tokyo, Japan
  • University of Tokyo, Institute of Industrial Science, Japan


According to our database1, Yang Cui authored at least 22 papers between 2003 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014

2010
Applications of Signcryption.
Proceedings of the Practical Signcryption, 2010

Efficient hybrid encryption from ID-based encryption.
Des. Codes Cryptogr., 2010

Practical Searching over Encrypted Data by Private Information Retrieval.
Proceedings of the Global Communications Conference, 2010

Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking.
Proceedings of the Global Communications Conference, 2010

2009
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions.
IEICE Trans. Inf. Syst., 2009

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Tag-KEM from Set Partial Domain One-Way Permutations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Lightweight broadcast authentication protocols reconsidered.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Efficient and Adaptively Secure Append-Only Signature.
Proceedings of IEEE International Conference on Communications, 2009

2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008

2007
Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

On the Key-Privacy Issue of McEliece Public-Key Encryption.
Proceedings of the Applied Algebra, 2007

2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006

On Achieving Chosen Ciphertext Security with Decryption Errors.
Proceedings of the Applied Algebra, 2006

2005
Relations Among Notions of Security for Identity Based Encryption Schemes.
IACR Cryptol. ePrint Arch., 2005

Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Generic Conversion with Optimal Redundancy.
Proceedings of the Topics in Cryptology, 2005

2003
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...