Yilei Chen
Yilei Chen
Verified email at mail.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Fiat-Shamir: from practice to theory
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ...
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
782019
Fiat-Shamir and correlation intractability from strong KDM-secure encryption
R Canetti, Y Chen, L Reyzin, RD Rothblum
Annual international conference on the theory and applications of …, 2018
722018
Constraint-Hiding Constrained PRFs for NC from LWE
R Canetti, Y Chen
Annual International Conference on the Theory and Applications of …, 2017
692017
Cryptanalyses of candidate branching program obfuscators
Y Chen, C Gentry, S Halevi
Annual International Conference on the Theory and Applications of …, 2017
652017
GGH15 beyond permutation branching programs: proofs, attacks, and candidates
Y Chen, V Vaikuntanathan, H Wee
Annual International Cryptology Conference, 577-607, 2018
482018
Adaptive succinct garbled RAM or: How to delegate your database
R Canetti, Y Chen, J Holmgren, M Raykova
Theory of Cryptography Conference, 61-90, 2016
37*2016
Fiat-Shamir From Simpler Assumptions.
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum
IACR Cryptol. ePrint Arch. 2018, 1004, 2018
362018
On the correlation intractability of obfuscated pseudorandom functions
R Canetti, Y Chen, L Reyzin
Theory of cryptography conference, 389-415, 2016
342016
Approximate trapdoors for lattices and smaller hash-and-sign signatures
Y Chen, N Genise, P Mukherjee
International Conference on the Theory and Application of Cryptology and …, 2019
172019
Traitor-tracing from LWE made simple and attribute-based
Y Chen, V Vaikuntanathan, B Waters, H Wee, D Wichs
Theory of Cryptography Conference, 341-369, 2018
172018
Does Fiat-Shamir Require a Cryptographic Hash Function?
Y Chen, A Lombardi, F Ma, W Quach
Annual International Cryptology Conference, 334-363, 2021
52021
Continuous space-bounded non-malleable codes from stronger proofs-of-space
B Chen, Y Chen, K Hostáková, P Mukherjee
Annual International Cryptology Conference, 467-495, 2019
52019
Hard Isogeny Problems over RSA Moduli and Groups with Infeasible Inversion
SA Altuğ, Y Chen
International Conference on the Theory and Application of Cryptology and …, 2019
42019
Matrix PRFs: Constructions, attacks, and applications to obfuscation
Y Chen, M Hhan, V Vaikuntanathan, H Wee
Theory of Cryptography Conference, 55-80, 2019
42019
An Alternative View of the Graph-Induced Multilinear Maps.
Y Chen
IACR Cryptol. ePrint Arch. 2016, 200, 2016
32016
On Removing Rejection Conditions in Practical Lattice-Based Signatures
R Behnia, Y Chen, D Masny
International Conference on Post-Quantum Cryptography, 380-398, 2021
2021
Hiding secrets in public random functions
Y Chen
Boston University, 2018
2018
White-box Cryptography with Device Binding from Token-based Obfuscation and more
S Agrawal, EA Bock, Y Chen, G Watson
The system can't perform the operation now. Try again later.
Articles 1–18