Follow
Yilei Chen
Yilei Chen
Verified email at mail.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Fiat-Shamir: from practice to theory
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ...
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
2042019
Fiat-Shamir and correlation intractability from strong KDM-secure encryption
R Canetti, Y Chen, L Reyzin, RD Rothblum
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1082018
Constraint-hiding constrained PRFs for NC from LWE
R Canetti, Y Chen
Annual International Conference on the Theory and Applications of …, 2017
1012017
GGH15 beyond permutation branching programs: proofs, attacks, and candidates
Y Chen, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
922018
Cryptanalyses of candidate branching program obfuscators
Y Chen, C Gentry, S Halevi
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
792017
Fiat-Shamir From Simpler Assumptions.
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum
IACR Cryptol. ePrint Arch. 2018, 1004, 2018
672018
Approximate trapdoors for lattices and smaller hash-and-sign signatures
Y Chen, N Genise, P Mukherjee
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
632019
Adaptive succinct garbled RAM or: How to delegate your database
R Canetti, Y Chen, J Holmgren, M Raykova
Theory of Cryptography Conference, 61-90, 2016
52*2016
On the correlation intractability of obfuscated pseudorandom functions
R Canetti, Y Chen, L Reyzin
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
522016
Traitor-tracing from LWE made simple and attribute-based
Y Chen, V Vaikuntanathan, B Waters, H Wee, D Wichs
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
422018
Does Fiat-Shamir require a cryptographic hash function?
Y Chen, A Lombardi, F Ma, W Quach
Annual International Cryptology Conference, 334-363, 2021
402021
Quantum algorithms for lattice problems
Y Chen
Cryptology ePrint Archive, 2024
232024
Matrix PRFs: constructions, attacks, and applications to obfuscation
Y Chen, M Hhan, V Vaikuntanathan, H Wee
Theory of Cryptography Conference, 55-80, 2019
182019
Quantum algorithms for variants of average-case lattice problems via filtering
Y Chen, Q Liu, M Zhandry
Annual international conference on the theory and applications of …, 2022
162022
Continuous space-bounded non-malleable codes from stronger proofs-of-space
B Chen, Y Chen, K Hostáková, P Mukherjee
Annual International Cryptology Conference, 467-495, 2019
92019
On removing rejection conditions in practical lattice-based signatures
R Behnia, Y Chen, D Masny
Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021
62021
Hard isogeny problems over RSA moduli and groups with infeasible inversion
SA Altuğ, Y Chen
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
6*2019
QSETH strikes again: finer quantum lower bounds for lattice problem, strong simulation, hitting set problem, and more
Y Chen, Y Chen, R Kumar, S Patro, F Speelman
arXiv preprint arXiv:2309.16431, 2023
42023
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
S Agrawal, EA Bock, Y Chen, GJ Watson
IACR Cryptol. ePrint Arch. 2021, 767, 2021
42021
Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography
Y Chen, J Li
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 620-629, 2024
32024
The system can't perform the operation now. Try again later.
Articles 1–20