Chen, Rongmao
141  Ergebnisse:
Personensuche X
?
1

Hardware Acceleration of NTT-Based Polynomial Multiplicatio..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
Yang, Hang ; Chen, Rongmao ; Wang, Qiong.. - p. 111-129 , 2024
 
?
3

Parameter-Hiding Order-Revealing Encryption Without Pairing:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
Peng, Cong ; Chen, Rongmao ; Wang, Yi.. - p. 227-256 , 2024
 
?
4

REEDS: An Efficient Revocable End-to-End Encrypted Message ..:

Li, Cui ; Chen, Rongmao ; Wang, Yi..
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
5

Subversion-Resilient Signatures Without Random Oracles:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
6

Secure Approximate Nearest Neighbor Search with Locality-Se..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Song, Shang ; Liu, Lin ; Chen, Rongmao.. - p. 411-430 , 2024
 
?
8

Sender-Anamorphic Encryption Reformulated: Achieving Robust..:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
Wang, Yi ; Chen, Rongmao ; Huang, Xinyi. - p. 135-167 , 2023
 
?
9

Module-LWE-Based Key Exchange Protocol Using Error Reconcil..:

Jia, Wenjuan ; Xue, Guanhao ; Wang, Baocang..
Security and Communication Networks.  2022 (2022)  - p. 1-7 , 2022
 
?
10

Message-Locked Searchable Encryption: A New Versatile Tool ..:

Liu, Xueqiao ; Yang, Guomin ; Susilo, Willy...
IEEE Transactions on Services Computing.  15 (2022)  3 - p. 1664-1677 , 2022
 
?
11

Secure Anonymous Communication on Corrupted Machines With R..:

Wang, Yi ; Chen, Rongmao ; Huang, Xinyi.
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  6 - p. 3837-3854 , 2022
 
?
12

Substitution Attacks Against Sigma Protocols:

, In: Cyberspace Safety and Security; Lecture Notes in Computer Science,
Lin, Yuliang ; Chen, Rongmao ; Wang, Yi.. - p. 192-208 , 2022
 
?
13

SecRec: A Privacy-Preserving Method for the Context-Aware R..:

Chen, Jinrong ; Liu, Lin ; Chen, Rongmao..
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 3168-3182 , 2022
 
?
15

Practical SM2-Based Multisignature Scheme with Applications..:

Hou, Lin ; Liu, Wei ; Yao, Lisha...
Security and Communication Networks.  2021 (2021)  - p. 1-8 , 2021
 
1-15