Yilei Chen

Affiliations:
  • Tsinghua University, Institute for Interdisciplinary Information Science (IIIS), Beijing, China


According to our database1, Yilei Chen authored at least 27 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LWE with Quantum Amplitudes: Algorithm, Hardness, and Oblivious Sampling.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2023
Practically Solving LPN in High Noise Regimes Faster Using Neural Networks.
IACR Cryptol. ePrint Arch., 2023

On the Hardness of $\sf{S|LWE\rangle}$ with Gaussian and Other Amplitudes.
IACR Cryptol. ePrint Arch., 2023

On the Hardness of S|LWE〉 with Gaussian and Other Amplitudes.
CoRR, 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

On Removing Rejection Conditions in Practical Lattice-Based Signatures.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Does Fiat-Shamir Require a Cryptographic Hash Function?
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2019
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Fiat-Shamir: from practice to theory.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Hiding secrets in public random functions
PhD thesis, 2018

Fiat-Shamir From Simpler Assumptions.
IACR Cryptol. ePrint Arch., 2018

Traitor-Tracing from LWE Made Simple and Attribute-Based.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Constraint-hiding Constrained PRFs for NC1 from LWE.
IACR Cryptol. ePrint Arch., 2017

Cryptanalyses of Candidate Branching Program Obfuscators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Constraint-Hiding Constrained PRFs for NC<sup>1</sup> from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
An Alternative View of the Graph-Induced Multilinear Maps.
IACR Cryptol. ePrint Arch., 2016

On the Correlation Intractability of Obfuscated Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

2015
Succinct Adaptive Garbled RAM.
IACR Cryptol. ePrint Arch., 2015


  Loading...