Skip to main content

Algebraic Methods for Stronger Crypto

Searching for OpenAIRE data...

Publications

Subspace Designs based on Algebraic Function Fields

Author(s): Venkatesan Guruswami, Chaoping Xing, Chen Yuan
Published in: Transactions of the American Mathematical Society, Issue 370 (2018), 2018, Page(s) 8757-8775, ISSN 0002-9947

How Long Can Optimal Locally Repairable Codes Be?

Author(s): Venkatesan Guruswami, Chaoping Xing, Chen Yuan
Published in: IEEE Transactions on Information Theory, Issue 65/6, 2019, Page(s) 3662-3670, ISSN 0018-9448
DOI: 10.1109/tit.2019.2891765

List Decodability of Symbol-Pair Codes

Author(s): Shu Liu, Chaoping Xing, Chen Yuan
Published in: IEEE Transactions on Information Theory, Issue 14 March 2019, 2019, Page(s) 1-1, ISSN 0018-9448
DOI: 10.1109/tit.2019.2904998

Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes

Author(s): Yuan Luo, Chaoping Xing, Chen Yuan
Published in: IEEE Transactions on Information Theory, Issue 65/2, 2019, Page(s) 1048-1053, ISSN 0018-9448
DOI: 10.1109/tit.2018.2854717

Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex

Author(s): Ronald Cramer, Chaoping Xing, Chen Yuan
Published in: IEEE Transactions on Information Theory, Issue 66/1, 2020, Page(s) 263-272, ISSN 0018-9448
DOI: 10.1109/tit.2019.2939135

Asymptotic Gilbert–Varshamov Bound on Frequency Hopping Sequences

Author(s): Xianhua Niu, Chaoping Xing, Chen Yuan
Published in: IEEE Transactions on Information Theory, Issue 66/2, 2020, Page(s) 1213-1218, ISSN 0018-9448
DOI: 10.1109/tit.2019.2951383

Attacks on the AJPS Mersenne-based cryptosystem

Author(s): Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
Published in: PQCRYPTO 2018, Issue 8th Annual, 2018, Page(s) 101-120

Construction of optimal locally recoverable codes and connection with hypergraph

Author(s): Chaoping Xing, Chen Yuan
Published in: ICALP 2019, Issue 46th Annual, 2019

SPD$$\mathbb {Z}_{2^k}$$: Efficient MPC mod $$2^k$$ for Dishonest Majority

Author(s): Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 769-798
DOI: 10.1007/978-3-319-96881-0_26

Amortized Complexity of Information-Theoretically Secure MPC Revisited

Author(s): Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 395-426
DOI: 10.1007/978-3-319-96878-0_14

Efficient Verifiable Delay Functions

Author(s): Benjamin Wesolowski
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part III, Issue 11478, 2019, Page(s) 379-407
DOI: 10.1007/978-3-030-17659-4_13

On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm

Author(s): Léo Ducas, Maxime Plançon, Benjamin Wesolowski
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Issue 11692, 2019, Page(s) 322-351
DOI: 10.1007/978-3-030-26948-7_12

On the Quantum Complexity of the Continuous Hidden Subgroup Problem

Author(s): Koen de Boer, Léo Ducas, Serge Fehr
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 341-370
DOI: 10.1007/978-3-030-45724-2_12

Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary

Author(s): Serge Fehr, Chen Yuan
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part III, Issue 11478, 2019, Page(s) 472-499
DOI: 10.1007/978-3-030-17659-4_16

Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes

Author(s): Ronald Cramer, Chaoping Xing
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 499-528
DOI: 10.1007/978-3-030-45721-1_18

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model

Author(s): Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II, Issue 11693, 2019, Page(s) 356-383
DOI: 10.1007/978-3-030-26951-7_13

Efficient Information-Theoretic Secure Multiparty Computation over $$\mathbb {Z}/p^k\mathbb {Z}$$ via Galois Rings

Author(s): Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
Published in: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I, Issue 11891, 2019, Page(s) 471-501
DOI: 10.1007/978-3-030-36030-6_19