Follow
Yilei Chen
Yilei Chen
Verified email at mail.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Fiat-Shamir: from practice to theory
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ...
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
1822019
Fiat-Shamir and correlation intractability from strong KDM-secure encryption
R Canetti, Y Chen, L Reyzin, RD Rothblum
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1022018
Constraint-hiding constrained PRFs for NC from LWE
R Canetti, Y Chen
Annual International Conference on the Theory and Applications of …, 2017
952017
GGH15 beyond permutation branching programs: proofs, attacks, and candidates
Y Chen, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
832018
Cryptanalyses of candidate branching program obfuscators
Y Chen, C Gentry, S Halevi
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
782017
Fiat-Shamir From Simpler Assumptions.
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum
IACR Cryptol. ePrint Arch. 2018, 1004, 2018
582018
Approximate trapdoors for lattices and smaller hash-and-sign signatures
Y Chen, N Genise, P Mukherjee
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
532019
On the correlation intractability of obfuscated pseudorandom functions
R Canetti, Y Chen, L Reyzin
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
522016
Adaptive succinct garbled RAM or: How to delegate your database
R Canetti, Y Chen, J Holmgren, M Raykova
Theory of Cryptography Conference, 61-90, 2016
51*2016
Traitor-tracing from LWE made simple and attribute-based
Y Chen, V Vaikuntanathan, B Waters, H Wee, D Wichs
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
362018
Does Fiat-Shamir require a cryptographic hash function?
Y Chen, A Lombardi, F Ma, W Quach
Annual International Cryptology Conference, 334-363, 2021
342021
Matrix PRFs: constructions, attacks, and applications to obfuscation
Y Chen, M Hhan, V Vaikuntanathan, H Wee
Theory of Cryptography Conference, 55-80, 2019
152019
Quantum algorithms for variants of average-case lattice problems via filtering
Y Chen, Q Liu, M Zhandry
Annual International Conference on the Theory and Applications of …, 2022
132022
Continuous space-bounded non-malleable codes from stronger proofs-of-space
B Chen, Y Chen, K Hostáková, P Mukherjee
Annual International Cryptology Conference, 467-495, 2019
92019
On removing rejection conditions in practical lattice-based signatures
R Behnia, Y Chen, D Masny
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021
62021
Hard isogeny problems over RSA moduli and groups with infeasible inversion
SA Altuğ, Y Chen
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
6*2019
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
S Agrawal, EA Bock, Y Chen, GJ Watson
IACR Cryptol. ePrint Arch. 2021, 767, 2021
42021
An alternative view of the graph-induced multilinear maps
Y Chen
Cryptology ePrint Archive, 2016
32016
Cryptanalysis of candidate obfuscators for affine determinant programs
L Yao, Y Chen, Y Yu
Annual International Conference on the Theory and Applications of …, 2022
22022
On the Hardness of with Gaussian and Other Amplitudes
Y Chen, Z Hu, Q Liu, H Luo, Y Tu
arXiv preprint arXiv:2310.00644, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20