Yanbin Pan
40  Ergebnisse:
Personensuche X
?
1

An Improved Practical Key Mismatch Attack Against NTRU:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
Liu, Zhen ; Vishakha ; Ding, Jintai.. - p. 322-342 , 2024
 
?
2

Embedding Integer Lattices as Ideals into Polynomial Rings:

, In: Proceedings of the 2024 International Symposium on Symbolic and Algebraic Computation,
Cheng, Yihang ; Feng, Yansong ; Pan, Yanbin - p. 170-179 , 2024
 
?
3

Generalized Implicit Factorization Problem:

, In: Selected Areas in Cryptography – SAC 2023; Lecture Notes in Computer Science,
 
?
4

Building Recognition Based on Improved U-Net Model:

, In: Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management,
Pan, Yanbin ; Xu, Haiwen ; Yan, Hao.. - p. 650-655 , 2023
 
?
5

Handle the Traces: Revisiting the Attack on ECDSA with EHNP:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Cao, Jinzheng ; Pan, Yanbin ; Cheng, Qingfeng. - p. 147-167 , 2022
 
?
6

BS: Blockwise Sieve Algorithm for Finding Short Vectors fro..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Cao, Jinzheng ; Cheng, Qingfeng ; Li, Xinghua. - p. 3-18 , 2022
 
?
7

Light the Signal: Optimization of Signal Leakage Attacks Ag..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Qin, Yue ; Ding, Ruoyu ; Cheng, Chi... - p. 677-697 , 2022
 
?
8

When NTT Meets Karatsuba: Preprocess-then-NTT Technique Rev..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
Zhu, Yiming ; Liu, Zhen ; Pan, Yanbin - p. 249-264 , 2021
 
?
9

A Systematic Approach and Analysis of Key Mismatch Attacks ..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021,
Qin, Yue ; Cheng, Chi ; Zhang, Xiaohan... - p. 92-121 , 2021
 
?
10

On the Ideal Shortest Vector Problem over Random Rational P..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
Pan, Yanbin ; Xu, Jun ; Wadleigh, Nick. - p. 559-583 , 2021
 
?
11

A Lattice Reduction Algorithm Based on Sublattice BKZ:

, In: Provable and Practical Security; Lecture Notes in Computer Science,
Cao, Jinzheng ; Pan, Yanbin ; Cheng, Qingfeng - p. 174-189 , 2021
 
?
12

Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algo..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Li, Xiulan ; Pan, Yanbin ; Tian, Chengliang - p. 223-241 , 2021
 
?
13

Lattice Klepto Revisited:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Yang, Zhaomin ; Xie, Tianyuan ; Pan, Yanbin - p. 867-873 , 2020
 
?
14

It all Started with Compression: Another Look at Reconcilia..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Xie, Tianyuan ; Pan, Yanbin - p. 874-885 , 2020
 
?
15

Computing Hermite Normal Form Faster via Solving System of ..:

, In: Proceedings of the 2019 International Symposium on Symbolic and Algebraic Computation,
Liu, Renzhang ; Pan, Yanbin - p. 283-290 , 2019
 
1-15