Follow
Yu-Hsuan Huang
Title
Cited by
Cited by
Year
On the compressed-oracle technique, and post-quantum security of proofs of sequential work
KM Chung, S Fehr, YH Huang, TN Liao
Annual International Conference on the Theory and Applications of …, 2021
392021
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium
M Barbosa, G Barthe, C Doczkal, J Don, S Fehr, B Grégoire, YH Huang, ...
Annual International Cryptology Conference, 358-389, 2023
182023
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM
KM Chung, YC Hsieh, MY Huang, YH Huang, T Lange, BY Yang
arXiv preprint arXiv:2110.04795, 2021
9*2021
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF
J Don, S Fehr, YH Huang
Theory of Cryptography Conference, 33-51, 2022
32022
On the (In) Security of the BUFF Transform
J Don, S Fehr, YH Huang, P Struck
Cryptology ePrint Archive, 2023
22023
HAPKIDO Project Report D5. 2
S Fehr, YH Huang, A Amadori
2023
On the Quantum Security of HAWK
S Fehr, YH Huang
International Conference on Post-Quantum Cryptography, 405-416, 2023
2023
Quadrangle Inequality Improvement for CSIDH Strategy
YH Huang, CK Yang, RJ Chen
Cryptology and Information Security Conference, 2020
2020
Constructing Smooth-Degree Isogenies in Isogeny-Based Cryptography
YH Huang
https://etd.lib.nctu.edu.tw/cgi-bin/gs32/tugsweb.cgi?o=dnctucdr&s=id …, 2020
2020
Simulating Quantum Algorithm by Using Singular Value Decomposition
YH Huang, RJ Chen
Cryptology and Information Security Conference, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–10