发表论文
(1) Double-Base Chains for Scalar Multiplications on Elliptic Curves, Eurocrypt 2020, 2020, 第 3 作者(2) IBE with tight security against selective opening and chosen-ciphertext attacks., Des. Codes Cryptogr. 88(7): 1371-1400 (2020), 2020, 第 3 作者(3) Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy, Security and Communication Networks 2019, 2019, 第 3 作者(4) Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates, ACISP 2019, 2019, 第 3 作者(5) Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields, ACISP 2019, 2019, 第 3 作者(6) (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy, Cybersecurity, 2019, 第 4 作者(7) Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes, IEEE Access, 2019, 第 5 作者(8) Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism, Advances in Cryptology – ASIACRYPT 2018, 2018, 第 3 作者(9) Cover attacks for elliptic curves with cofactor two., Des. Codes Cryptography 86(11), 2018, 第 2 作者(10) Lattice-Based Dual Receiver Encryption and More., ACISP 2018, 2018, 第 3 作者(11) Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE, Inscrypt 2018, 2018, 第 6 作者(12) Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks, CT-RSA 2017, 2017, 第 3 作者(13) KDM and Selective Opening Secure IBE based on the LWE problem, APKC 2017, 2017, 第 2 作者(14) New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption, ProvSec 2017, 2017, 第 2 作者(15) Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters, IWSEC 2017, 2017, 第 3 作者(16) Dual-Mode Cryptosystem Based on the Learning with Errors Problem, ACISP (2) 2017, 2017, 第 3 作者(17) IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange, IWSEC 2017, 2017, 第 2 作者(18) Lossy Key Encapsulation Mechanism and Its Applications., ICISC 2016, 2016, 第 3 作者(19) Approximate-Deterministic Public Key Encryption from Hard Learning Problems, INDOCRYPT 2016,, 2016, 第 3 作者(20) (Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus, AsiaCCS 2016, 2016, 第 2 作者(21) Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, Inscrypt 2016., 2016, 第 3 作者(22) Receiver Selective Opening Security from Indistinguishability Obfuscation, INDOCRYPT 2016, 2016, 第 3 作者(23) KDM-CCA Security from RKA Secure Authenticated Encryption, Eurocrypt 2015, 2015, 第 2 作者(24) Cryptanalysis of Reduced-Round Whirlwind, ACISP 2015, 2015, 第 2 作者(25) Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Gr?stl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions, IWSEC 2015, 2015, 第 2 作者(26) Models of Curves from GHS Attack in Odd Characteristics, ISPEC2015, 2015, 第 3 作者(27) Some Elliptic Subcovers of Genus 3 Hyperelliptic curves, ISPEC 2015, 2015, 第 3 作者(28) Algebraic Fault Attack on the SHA-256 Compression Function, International Journal of Research in Computer Science, 2014, 第 2 作者(29) Improved Preimage Attacks against Reduced HAS-160, ISPEC 2014, 2014, 第 2 作者(30) 对GOST和Whirlpool杂凑函数的改进分析, Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function, ACNS 2014, 2014, 第 2 作者(31) 关于Diem的证明的一点注记, NSCRYPT 2014, 2014, 第 2 作者(32) On the Lossiness of 2k-th Power and the Instantiability of Rabin-OAEP, CANS 2014, 2014, 第 3 作者(33) Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation, ProvSec 2014, 2014, 第 3 作者(34) 对HTBC 杂凑函数的碰撞和第二原像攻击, 计算机研究与发展, 2014, 第 2 作者(35) 混合加密方案的RKA安全性, ISC 2014, 2014, 第 2 作者(36) 基于哈希证明系统的RKA安全公钥加密, IWSEC 2014, 2014, 第 2 作者(37) Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Scheme, Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Scheme, ISPEC 2013, LNCS 7863, 2013, 第 2 作者(38) How to Remove the Exponent GCD in HK09, How to Remove the Exponent GCD in HK09, ProvSec 2013, 2013, 第 2 作者(39) Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions, Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions, CANS2013, 2013, 第 2 作者(40) First Multidimensional Cryptanalysis on Reduced-round PRINCEcore, First Multidimensional Cryptanalysis on Reduced-round PRINCEcore, ICISC 2013, 2013, 第 2 作者(41) Improved efficiency of chosen ciphertext secure encryption from factoring, Improved efficiency of chosen ciphertext secure encryption from factoring, ISPEC 2012, LNCS 7232, 2012, 第 2 作者(42) Non-malleable instance-dependent commitment in the standard model, Non-malleable instance-dependent commitment in the standard model, ACISP 2012,LNCS 7372, 2012, 第 3 作者(43) Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key, Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key, ACISP, 2011, 第 2 作者(44) 因子分解假设的复合模广义迪菲赫尔曼问题的伪随机提取, Pseudo-randomness Extraction for Generalized Diffie-Hellman Problem over Composite Modulus under Factoring Assumption, 计算机学报, 2011, 第 2 作者(45) Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited, Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited, Public Key Cryptography 2011: 210-227. LNCS 6571, 2011, 第 2 作者(46) 可否认群密钥协商协议的一般化构造方式, Generic construction of deniable group key establishment from group key establishment, 通信学报, Vol. 32 No. 3,pp. 143-149, March, 2011, 2011, 第 3 作者(47) A New Efficient Construction for Non-Malleable Zero-Knowledge Sets, A New Efficient Construction for Non-Malleable Zero-Knowledge Sets, WISA 2010, LNCS 6513, pp. 31–43, 2011.Springer-Verlag Berlin Heidelberg 2011, 2011, 第 3 作者(48) Encryption Simulatability Reconsidered, Encryption Simulatability Reconsidered, ISPEC 2011, LNCS 6672, pp. 14-23, Springer-Verlag Berlin Heidelberg, 2011, 第 2 作者(49) A Deniable Group Key Establishment Protocol in the Standard Model , A Deniable Group Key Establishment Protocol in the Standard Model , ISPEC 2010, LNCS 6047, pp. 308–323, 2010. Springer-Verlag Berlin Heidelberg, 2010, 第 3 作者(50) On constant-round zero-knowledge proofs of knowledge for NP-relation, On constant-round zero-knowledge proofs of knowledge for NP-relation, SCIENCE CHINA Information Sciences, April 2010,Vol. 53,No. 4: 788–799, 2010, 第 3 作者(51) PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples, PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples, IWSEC 2010, LNCS 6434, pp. 40-54, Springer-Verlag Berlin Heidelberg, 2010, 第 2 作者(52) Instantiate Random Oracles in OAEP with Pseudorandom Functions, Wuhan University Journal of Natural Sciences, 2008, (53) 特征3有限域上椭圆曲线的Montgomery算法, 通讯学报, 2008, (54) 公平的知识签名, 武汉大学学报, 2008, (55) 标准模型下可否认的群密钥协商协议, 武汉大学学报, 2008,