What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yunlei Zhao
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
VeloFHE: GPU Acceleration for FHEW and TFHE Bootstrapping.
Shiyu Shen
Hao Yang
Zhe Liu
Ying Liu
Xianhui Lu
Wangchen Dai
Lu Zhou
Yunlei Zhao
Ray C. C. Cheung
2025
conf/africacrypt
FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment.
Xiaowen Hu
Hanyu Wei
Hengchuan Zou
Zhichuang Liang
Wenqian Li
Yunlei Zhao
2024
journals/tifs
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
Hao Yang
Shiyu Shen
Zhe Liu
Yunlei Zhao
2024
journals/tifs
Rebuttal to "On the Unforgeability of 'Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"'.
Yafang Yang
Lei Zhang
Yunlei Zhao
Kim-Kwang Raymond Choo
Yan Zhang
2024
conf/esorics
Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment.
Jieyu Zheng
Haoliang Zhu
Yifan Dong
Zhenyu Song
Zhenhao Zhang
Yafang Yang
Yunlei Zhao
2024
conf/asiacrypt
CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3.
Biming Zhou
Haodong Jiang
Yunlei Zhao
2022
journals/tifs
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
Yafang Yang
Lei Zhang
Yunlei Zhao
Kim-Kwang Raymond Choo
Yan Zhang
2022
conf/esorics
Half-Aggregation of Schnorr Signatures with Tight Reductions.
Yanbo Chen
Yunlei Zhao
2022
conf/icics
Tight Analysis of Decryption Failure Probability of Kyber in Reality.
Boyue Fang
Weize Wang
Yunlei Zhao
2022
conf/acsac
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Jieyu Zheng
Feng He
Shiyu Shen
Chenxi Xue
Yunlei Zhao
2021
conf/esorics
Identity-Based Identity-Concealed Authenticated Key Exchange.
Huanhuan Lian
Tianyu Pan
Huige Wang
Yunlei Zhao
2020
conf/acisp
SKCN: Practical and Flexible Digital Signature from Module Lattice.
Boru Gong
Leixiao Cheng
Yunlei Zhao
2020
conf/esorics
Identity-Based Authenticated Encryption with Identity Confidentiality.
Yunlei Zhao
2019
conf/ccs
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.
Yunlei Zhao
2019
conf/ccs
Delegatable Order-Revealing Encryption.
Yuan Li
Hongbing Wang
Yunlei Zhao
2019
conf/acns
Generic and Practical Key Establishment from Lattice.
Zhengzhong Jin
Yunlei Zhao
2018
conf/esorics
Order-Revealing Encryption: File-Injection Attack and Forward Security.
Xingchen Wang
Yunlei Zhao
2018
conf/cns
Revisiting OAKE in the eCK Security Model.
Guangye Sui
Yunlei Zhao
2017
journals/compsec
Socialized policy administration.
Zeqing Guo
Weili Han
Liangxing Liu
Wenyuan Xu
Minyue Ni
Yunlei Zhao
Xiaoyang Sean Wang
2016
journals/joc
Concurrent Knowledge Extraction in Public-Key Models.
Andrew Chi-Chih Yao
Moti Yung
Yunlei Zhao
2016
conf/ccs
Identity-Concealed Authenticated Encryption and Key Exchange.
Yunlei Zhao
2016
conf/ccs
Secure Dynamic SSE via Access Indistinguishable Storage.
Tianhao Wang
Yunlei Zhao
2015
conf/provsec
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
journals/tifs
Privacy-Preserving Authenticated Key-Exchange Over Internet.
Andrew Chi-Chih Yao
Yunlei Zhao
2014
conf/acns
All-but-One Dual Projective Hashing and Its Applications.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
conf/eurocrypt
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Junzuo Lai
Robert H. Deng
Shengli Liu
Jian Weng
Yunlei Zhao
2013
journals/tifs
Online/Offline Signatures for Low-Power Devices.
Andrew Chi-Chih Yao
Yunlei Zhao
2013
conf/ccs
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Cheng-Kang Chu
Joseph K. Liu
Jun Wen Wong
Yunlei Zhao
Jianying Zhou
2013
conf/ccs
OAKE: a new family of implicitly authenticated diffie-hellman protocols.
Andrew Chi-Chih Yao
Yunlei Zhao
2013
conf/ctrsa
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Shengli Liu
Jian Weng
Yunlei Zhao
2013
conf/ctrsa
Accountable Authority Identity-Based Encryption with Public Traceability.
Junzuo Lai
Robert H. Deng
Yunlei Zhao
Jian Weng
2012
conf/sec
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Shaoying Cai
Yingjiu Li
Yunlei Zhao
2012
conf/acns
A New Framework for Privacy of RFID Path Authentication.
Shaoying Cai
Robert H. Deng
Yingjiu Li
Yunlei Zhao
2012
conf/ctrsa
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Goichiro Hanaoka
Yutaka Kawai
Noboru Kunihiro
Takahiro Matsuda
Jian Weng
Rui Zhang
Yunlei Zhao
2011
conf/acns
Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao
Robert H. Deng
Xuhua Ding
Junzuo Lai
Yunlei Zhao
2011
conf/provsec
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
Kazuki Yoneyama
Yunlei Zhao
2011
conf/pkc
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Jian Weng
Yunlei Zhao
Goichiro Hanaoka
2010
conf/acns
Deniable Internet Key Exchange.
Andrew Chi-Chih Yao
Yunlei Zhao
2010
conf/esorics
A New Framework for RFID Privacy.
Robert H. Deng
Yingjiu Li
Moti Yung
Yunlei Zhao
2007
conf/eurocrypt
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Moti Yung
Yunlei Zhao
2006
conf/tcc
Interactive Zero-Knowledge with Restricted Random Oracles.
Moti Yung
Yunlei Zhao
2004
conf/acns
Some Observations on Zap and Its Applications.
Yunlei Zhao
Chan H. Lee
Yiming Zhao
Hong Zhu
2003
conf/eurocrypt
Resettable Zero-Knowledge in the Weak Public-Key Model.
Yunlei Zhao
Xiaotie Deng
Chan H. Lee
Hong Zhu
Coauthors
Andrew Chi-Chih Yao
(5)
Biming Zhou
(1)
Boru Gong
(1)
Boyue Fang
(1)
Chan H. Lee
(2)
Cheng-Kang Chu
(1)
Chenxi Xue
(1)
Feng Bao
(1)
Feng He
(1)
Goichiro Hanaoka
(4)
Guangye Sui
(1)
Hanyu Wei
(1)
Hao Yang
(2)
Haodong Jiang
(1)
Haoliang Zhu
(1)
Hengchuan Zou
(1)
Hong Zhu
(2)
Hongbing Wang
(1)
Huanhuan Lian
(1)
Huige Wang
(1)
Jian Weng
(5)
Jianying Zhou
(1)
Jieyu Zheng
(2)
Joseph K. Liu
(1)
Jun Wen Wong
(1)
Junzuo Lai
(3)
Kazuki Yoneyama
(1)
Kim-Kwang Raymond Choo
(2)
Lei Zhang
(2)
Leixiao Cheng
(1)
Liangxing Liu
(1)
Lu Zhou
(1)
Minyue Ni
(1)
Moti Yung
(4)
Noboru Kunihiro
(1)
Ray C. C. Cheung
(1)
Robert H. Deng
(5)
Rui Zhang
(1)
Shaoying Cai
(2)
Shengli Liu
(2)
Sherman S. M. Chow
(2)
Shiyu Shen
(3)
Takahiro Matsuda
(1)
Tianhao Wang
(1)
Tianyu Pan
(1)
Wangchen Dai
(1)
Weili Han
(1)
Weize Wang
(1)
Wenqian Li
(1)
Wenyuan Xu
(1)
Xianhui Lu
(1)
Xiaotie Deng
(1)
Xiaowen Hu
(1)
Xiaoyang Sean Wang
(1)
Xingchen Wang
(1)
Xuhua Ding
(1)
Yafang Yang
(3)
Yan Zhang
(2)
Yanbo Chen
(1)
Yifan Dong
(1)
Yiming Zhao
(1)
Ying Liu
(1)
Yingjiu Li
(3)
Yu Chen
(2)
Yuan Li
(1)
Yunlei Zhao
(43)
Yutaka Kawai
(1)
Zeqing Guo
(1)
Zhe Liu
(2)
Zhenfu Cao
(2)
Zhengzhong Jin
(1)
Zhenhao Zhang
(1)
Zhenyu Song
(1)
Zhichuang Liang
(1)
Zongyang Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to