default search action
Lin Lyu 0001
Person information
- affiliation: University of Wuppertal, School of Electrical, Information and Media Engineering, Germany
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Other persons with the same name
- Lin Lyu — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c7]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption Under Corruptions. ASIACRYPT (3) 2022: 423-453 - [c6]Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten:
On Fingerprinting Attacks and Length-Hiding Encryption. CT-RSA 2022: 345-369 - [i8]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption under Corruptions. IACR Cryptol. ePrint Arch. 2022: 1176 (2022) - 2021
- [c5]Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting. ASIACRYPT (4) 2021: 403-433 - [c4]Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
More Efficient Digital Signatures with Tight Multi-user Security. Public Key Cryptography (2) 2021: 1-31 - [i7]Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
More Efficient Digital Signatures with Tight Multi-User Security. IACR Cryptol. ePrint Arch. 2021: 235 (2021) - [i6]Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten:
On Fingerprinting Attacks and Length-Hiding Encryption. IACR Cryptol. ePrint Arch. 2021: 1027 (2021) - [i5]Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2021: 1220 (2021)
2010 – 2019
- 2019
- [j6]Shuai Han, Shengli Liu, Lin Lyu:
QANIZK for adversary-dependent languages and their applications. Theor. Comput. Sci. 779: 47-71 (2019) - [j5]Lin Lyu, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. Theor. Comput. Sci. 795: 57-80 (2019) - [c3]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. CRYPTO (2) 2019: 417-447 - [i4]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. IACR Cryptol. ePrint Arch. 2019: 512 (2019) - 2018
- [j4]Lin Lyu, Shengli Liu, Shuai Han:
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security. Comput. J. 61(2): 288-318 (2018) - [j3]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. Comput. J. 61(12): 1825-1844 (2018) - [j2]Shuai Han, Shengli Liu, Lin Lyu:
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Des. Codes Cryptogr. 86(7): 1411-1449 (2018) - [c2]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Public Key Cryptography (1) 2018: 62-92 - [i3]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 30 (2018) - 2017
- [j1]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. Secur. Commun. Networks 2017: 2148534:1-2148534:27 (2017) - 2016
- [c1]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions. ASIACRYPT (2) 2016: 307-338 - [i2]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions. IACR Cryptol. ePrint Arch. 2016: 829 (2016) - [i1]Shuai Han, Shengli Liu, Lin Lyu:
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System. IACR Cryptol. ePrint Arch. 2016: 1051 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint