发表论文
(1) Subfield Attack on NTRU by using symmetric function map, 2023 IEEE International Symposium on Information Theory, 2023, 第 3 作者(2) Hash-based signature revisited, CYBERSECURITY, 2022, 第 3 作者(3) Hybrid dual attack on LWE with arbitrary secrets, CYBERSECURITY, 2022, 第 4 作者(4) 全同态加密自举技术的研究现状及发展趋势, Research and Development Trend of Bootstrapping in FHE, 密码学报, 2021, 第 4 作者(5) SecureBP from Homomorphic Encryption, SECURITY AND COMMUNICATION NETWORKS, 2020, 第 6 作者(6) Fully homomorphic encryption based on the ring learning with rounding problem, IET INFORMATION SECURITY, 2019, 第 3 作者(7) Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes, IEEE ACCESS, 2019, 第 4 作者(8) Montgomery Algorithm over a Prime Field, CHINESE JOURNAL OF ELECTRONICS, 2019, 第 2 作者(9) Strongly Secure Authenticated Key Exchange from Supersingular Isogenies, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 第 3 作者(10) Montgomery Algorithm over a Prime Field, 电子学报(英文), 2019, 第 2 作者(11) A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, INFORMATION SCIENCES, 2019, 第 3 作者(12) Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings, INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 第 5 作者(13) Verifiable Decryption for Fully Homomorphic Encryption, INFORMATION SECURITY (ISC 2018), 2018, 第 2 作者(14) Probability Preservation Property with Relative Error and Its Applications, ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 第 2 作者(15) 从有限域到椭圆曲线上的编码映射构造与应用综述, On Construction and Application of Deterministic Encoding Functions into Elliptic Curves, 密码学报, 2018, 第 3 作者(16) Cover attacks for elliptic curves with cofactor two, Designs, Codes and Cryptography, 2018, 第 3 作者(17) Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 第 2 作者(18) LWR-Based Fully Homomorphic Encryption, Revisited, SECURITY AND COMMUNICATION NETWORKS, 2018, 第 3 作者(19) Compact (Targeted Homomorphic) Inner Product Encryption from LWE, INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 第 4 作者(20) 基于超奇异同源的认证密钥交换, Authenticated Key Exchange from Supersingular Isogeny, 密码学报, 2018, 第 3 作者(21) Hashing into twisted Jacobian intersection curves, Inscrypt 2017, 2017, 第 1 作者(22) 特征2有限域上椭圆曲线的co-Z Montgomery算法, 计算机学报, 2017, 第 1 作者(23) 特征3有限域上椭圆曲线的co-Z Montgomery算法, co-Z Montgomery Algorithm on Elliptic Curves Over Finite Fields of Characteristic Three, 计算机学报, 2017, 第 3 作者(24) Hashing into Generalized Huff Curves, INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 第 3 作者(25) Constructing Isogenies on Extended Jacobi Quartic Curves, Inscrypt 2016, 2016, 第 1 作者(26) 扭曲雅可比相交曲线上的斜-Frobenius映射, Skew-Frobenius Mapping on Twisted Jacobi Intersection Curve, 计算机工程, 2015, 第 2 作者(27) 椭圆曲线离散对数问题的研究进展, On the Progress of Elliptic Curve Discrete Logarithm Problem, 密码学报, 2015, 第 3 作者(28) Hashing into Jacobi Quartic Curves, INFORMATION SECURITY, ISC 2015, 2015, 第 2 作者(29) Six subfamilies of implementation-friendly Barreto-Naehrig curves, CHINESE JOURNAL OF ELECTRONICS, 2014, 第 3 作者(30) 构造从字符串到Huff曲线的散列函数, Constructing hash function from plaintext to Huff curves, 中国科学技术大学学报, 2014, 第 2 作者(31) Joint Triple Base Number System for Multi-Scalar Multiplications, The 9th International Conference on Information Security Practice and Experience, 2013, 第 1 作者 通讯作者(32) About Hash into Montgomery Form Elliptic Curves, The 9th International Conference on Information Security Practice and Experience, 2013, 第 1 作者 通讯作者(33) Unified and Complete Point Addition Formula for Elliptic Curves, CHINESE JOURNAL OF ELECTRONICS, 2012, 第 2 作者(34) ax+b mod p比特安全的列表译码证明, 系统科学与数学, 2012, 第 3 作者(35) 构造从字符串到C34曲线的散列函数, Construct Hash Function from Plaintext to C34 Curves, 计算机学报, 2012, 第 2 作者(36) 基于椭圆曲线的KDM安全公钥加密方案, Public Key Encryption Scheme with KDM Security Based on Elliptic Curves, 计算机工程, 2012, 第 2 作者(37) 环Z_n上椭圆曲线的群法则及其在Paillier系统中的应用, Group Law of Elliptic Curves over Z_n and Its Application in Paillier Schemes, 电子学报, 2011, 第 2 作者(38) 环Z/nZ上椭圆曲线的群法则及其在Paillier系统中的应用, 电子学报, 2011, 第 1 作者(39) Pairing Computation on Elliptic Curves of Jacobi Quartic Form, CHINESE JOURNAL OF ELECTRONICS, 2011, 第 2 作者(40) A Deniable Group Key Establishment Protocol in the Standard Model, INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 第 2 作者(41) 求解双基链的改进型贪心算法, Greedy Algorithm of Convert Integers into Double-Base Chains, 微电子学与计算机, 2010, 第 2 作者(42) New Greedy Algorithm for Computing Double-Base Chains, FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, 第 2 作者(43) 局部环Z/pnZ上椭圆曲线密码系统, 中国科学院研究生院学报, 2009, (44) 局部环Z/p^nZ上的椭圆曲线密码系统, Cryptosystem based on elliptic curve over local ring Z/p^nZ, 中国科学院研究生院学报, 2009, 第 2 作者(45) 构造有限域上具有给定阶点的椭圆曲线, Construction of Elliptic Curves over Finite Fields with a Point of Given Order, 软件学报, 2007, 第 1 作者(46) On optimal simultaneous rational approximation to (omega, omega(2))(tau) with omega being some kind of cubic algebraic function, JOURNALOFAPPROXIMATIONTHEORY, 2007, 第 2 作者(47) Multi-continued fraction algorithm onmulti-formal Laurent series, ACTA ARITHMETICA, 2006, 第 2 作者(48) 实二次代数函数域的单位群, Unit Group of Algebraic Real Quadratic Function Fields, 中国科学院研究生院学报, 2003, 第 1 作者(49) 实二次代数函数域的单位群, Unit Group of Algebraic Real Quadratic Function Fields, 中国科学院研究生院学报, 2003, 第 1 作者(50) 实二次代数函数域理想类群的子群, 中国科学:A辑, 2002, 第 1 作者(51) 实二次代数函数域理想类群的子群, 中国科学:A辑, 2002, 第 1 作者(52) Continued Fractions of Functions Connected With Real Quadratic Function Fields, 数学进展, 2000, 第 2 作者(53) CYBERSECURITY, 第 4 作者