Author of the publication

Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem.

, , , , , and . Sci. China Inf. Sci., 59 (5): 052109:1-052109:11 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions., , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 186-206. Springer, (2023)Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States., , and . IEEE Access, (2019)Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem., , , , , and . Sci. China Inf. Sci., 59 (5): 052109:1-052109:11 (2016)Extended multivariate public key cryptosystems with secure encryption function., , , and . Sci. China Inf. Sci., 54 (6): 1161-1171 (2011)Quantum protocols for secure multi-party summation., , , , , and . Quantum Inf. Process., 18 (6): 168 (2019)Cryptanalysis of an MOR cryptosystem based on a finite associative algebra., , , , , and . Sci. China Inf. Sci., 59 (3): 32111:1-32111:9 (2016)Multi-bit LWE-based encryption scheme without decryption errors., , , and . Int. J. Embed. Syst., 8 (1): 24-33 (2016)Key recovery on several matrix public-key encryption schemes., , and . IET Inf. Secur., 10 (3): 152-155 (2016)Cryptanalysis of a lattice based key exchange protocol., , , , and . Sci. China Inf. Sci., 60 (2): 28101 (2017)A public key cryptosystem based on data complexity under quantum environment., , , , , and . Sci. China Inf. Sci., 58 (11): 1-11 (2015)