Follow
Lin Lyu
Lin Lyu
Verified email at uni-wuppertal.de
Title
Cited by
Cited by
Year
More efficient digital signatures with tight multi-user security
D Diemert, K Gellert, T Jager, L Lyu
IACR International Conference on Public-Key Cryptography, 1-31, 2021
302021
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
S Han, S Liu, L Lyu, D Gu
Annual International Cryptology Conference, 417-447, 2019
202019
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
L Lyu, S Liu, S Han, D Gu
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
162018
Efficient KDM-CCA secure public-key encryption for polynomial functions
S Han, S Liu, L Lyu
International Conference on the Theory and Application of Cryptology and …, 2016
162016
Digital signatures with memory-tight security in the multi-challenge setting
D Diemert, K Gellert, T Jager, L Lyu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
92021
Anonymous public key encryption under corruptions
Z Huang, J Lai, S Han, L Lyu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
62022
On fingerprinting attacks and length-hiding encryption
K Gellert, T Jager, L Lyu, T Neuschulten
Cryptographers’ Track at the RSA Conference, 345-369, 2022
42022
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
S Han, S Liu, L Lyu
Designs, Codes and Cryptography 86 (7), 1411-1449, 2018
32018
Public-key encryption with tight simulation-based selective-opening security
L Lyu, S Liu, S Han
The Computer Journal 61 (2), 288-318, 2018
22018
Tightly secure encryption schemes against related-key attacks
S Han, S Liu, L Lyu, D Gu
The Computer Journal 61 (12), 1825-1844, 2018
12018
Structure-preserving public-key encryption with leakage-resilient CCA security
L Lyu, S Liu, D Gu
Theoretical Computer Science 795, 57-80, 2019
2019
QANIZK for adversary-dependent languages and their applications
S Han, S Liu, L Lyu
Theoretical Computer Science 779, 47-71, 2019
2019
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
S Han, S Liu, L Lyu
Security and Communication Networks 2017, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–13