Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High performance optoelectronics based on CVD Mos2., , and . ASICON, page 1-3. IEEE, (2019)Cryptanalysis on AW digital signature scheme based on error-correcting codes., , and . Sci. China Ser. F Inf. Sci., 45 (5): 397-400 (2002)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network., , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 234-256. Springer, (2019)Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions., , and . IACR Cryptology ePrint Archive, (2011)Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model., , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 42-61. Springer, (2015)Deep Neural Network based Channel Allocation for Interference-Limited Wireless Networks., , , and . HPSR, page 1-5. IEEE, (2019)Universally composable anonymous password authenticated key exchange., , , and . Sci. China Inf. Sci., 60 (5): 52107 (2017)Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" Computers & Security, Volume 73, 2018, Pages 507-518., and . Comput. Secur., (2020)LPSE: Lightweight password-strength estimation for password meters., and . Comput. Secur., (2018)Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs., , and . IACR Cryptol. ePrint Arch., (2022)