Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Weiqiang Wen
@article{DBLP:journals/joc/BoudgoustJRW23, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {On the Hardness of Module Learning with Errors with Short Distributions}, journal = {J. Cryptol.}, volume = {36}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.1007/s00145-022-09441-3}, doi = {10.1007/S00145-022-09441-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BoudgoustJRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FouqueGQRW23, author = {Pierre{-}Alain Fouque and Adela Georgescu and Chen Qian and Adeline Roux{-}Langlois and Weiqiang Wen}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {A Generic Transform from Multi-round Interactive Proof to {NIZK}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {461--481}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_16}, doi = {10.1007/978-3-031-31371-4\_16}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FouqueGQRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueGQRW23, author = {Pierre{-}Alain Fouque and Adela Georgescu and Chen Qian and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {A Generic Transform from Multi-Round Interactive Proof to {NIZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2023}, url = {https://eprint.iacr.org/2023/334}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueGQRW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsserMVW22, author = {Andre Esser and Alexander May and Javier A. Verbel and Weiqiang Wen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {346--375}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_12}, doi = {10.1007/978-3-031-15982-4\_12}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsserMVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BoudgoustJRW22, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Entropic Hardness of Module-LWE from Module-NTRU}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {78--99}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_4}, doi = {10.1007/978-3-031-22912-1\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BoudgoustJRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-16993, author = {Xingyu Yan and Licheng Wang and Weiqiang Wen and Ziyi Li and Jingwen Suo and Lize Gu}, title = {Post-Quantum {\(\kappa\)}-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets}, journal = {CoRR}, volume = {abs/2211.16993}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.16993}, doi = {10.48550/ARXIV.2211.16993}, eprinttype = {arXiv}, eprint = {2211.16993}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-16993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudgoustJRW22, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {Entropic Hardness of Module-LWE from Module-NTRU}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2022}, url = {https://eprint.iacr.org/2022/245}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsserMVW22, author = {Andre Esser and Alexander May and Javier A. Verbel and Weiqiang Wen}, title = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2022}, url = {https://eprint.iacr.org/2022/259}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsserMVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudgoustJRW22a, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {On the Hardness of Module Learning With Errors with Short Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2022}, url = {https://eprint.iacr.org/2022/472}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoudgoustJRW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BoudgoustJRW21, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, editor = {Kenneth G. Paterson}, title = {On the Hardness of Module-LWE with Binary Secret}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {503--526}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_21}, doi = {10.1007/978-3-030-75539-3\_21}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BoudgoustJRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudgoustJRW21, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {On the Hardness of Module-LWE with Binary Secret}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2021}, url = {https://eprint.iacr.org/2021/265}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoudgoustJRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoudgoustJRW20, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Towards Classical Hardness of Module-LWE: The Linear Rank Case}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {289--317}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_10}, doi = {10.1007/978-3-030-64834-3\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoudgoustJRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtBFKSW20, author = {Martin R. Albrecht and Shi Bai and Pierre{-}Alain Fouque and Paul Kirchner and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k\({}^{\mbox{1/(2k)}}\) Time k\({}^{\mbox{k/8+o(k)}}\)}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {186--212}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_7}, doi = {10.1007/978-3-030-56880-1\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtBFKSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtBFKSW20, author = {Martin R. Albrecht and Shi Bai and Pierre{-}Alain Fouque and Paul Kirchner and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Faster Enumeration-based Lattice Reduction: Root Hermite Factor k{\^{}}(1/(2k)) in Time k{\^{}}(k/8 + o(k))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2020}, url = {https://eprint.iacr.org/2020/707}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtBFKSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoudgoustJRW20, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux{-}Langlois and Weiqiang Wen}, title = {Towards Classical Hardness of Module-LWE: The Linear Rank Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2020}, url = {https://eprint.iacr.org/2020/1020}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoudgoustJRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BaiMW19, author = {Shi Bai and Shaun Miller and Weiqiang Wen}, editor = {Johannes Buchmann and Abderrahmane Nitaj and Tajje{-}eddine Rachidi}, title = {A Refined Analysis of the Cost for Solving {LWE} via uSVP}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11627}, pages = {181--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23696-0\_10}, doi = {10.1007/978-3-030-23696-0\_10}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BaiMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaiBDRWZ19, author = {Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux{-}Langlois and Weiqiang Wen and Zhenfei Zhang}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Middle-Product Learning with Rounding Problem and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {55--81}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_3}, doi = {10.1007/978-3-030-34578-5\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaiBDRWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiMW19, author = {Shi Bai and Shaun Miller and Weiqiang Wen}, title = {A refined analysis of the cost for solving {LWE} via uSVP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2019}, url = {https://eprint.iacr.org/2019/502}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiBDRWZ19, author = {Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux{-}Langlois and Weiqiang Wen and Zhenfei Zhang}, title = {Middle-Product Learning with Rounding Problem and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2019}, url = {https://eprint.iacr.org/2019/1001}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiBDRWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Wen18, author = {Weiqiang Wen}, title = {Contributions to the hardness foundations of lattice-based cryptography. (Contributions aux fondements de complexit{\'{e}} de la cryptographie sur r{\'{e}}seaux)}, school = {University of Lyon, France}, year = {2018}, url = {https://tel.archives-ouvertes.fr/tel-01949339}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Wen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaiSW18, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Measuring, Simulating and Exploiting the Head Concavity Phenomenon in {BKZ}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, pages = {369--404}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2\_13}, doi = {10.1007/978-3-030-03326-2\_13}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaiSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrakerskiKSW18, author = {Zvika Brakerski and Elena Kirshanova and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Learning with Errors and Extrapolated Dihedral Cosets}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {702--727}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_24}, doi = {10.1007/978-3-319-76581-5\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrakerskiKSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiSW18, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Measuring, simulating and exploiting the head concavity phenomenon in {BKZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2018}, url = {https://eprint.iacr.org/2018/856}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-08223, author = {Zvika Brakerski and Elena Kirshanova and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Learning With Errors and Extrapolated Dihedral Cosets}, journal = {CoRR}, volume = {abs/1710.08223}, year = {2017}, url = {http://arxiv.org/abs/1710.08223}, eprinttype = {arXiv}, eprint = {1710.08223}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-08223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WenWP16, author = {Weiqiang Wen and Libin Wang and Jiaxin Pan}, title = {Unified security model of authenticated key exchange with specific adversarial capabilities}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {8--17}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2014.0234}, doi = {10.1049/IET-IFS.2014.0234}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WenWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BaiSW16, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {76:1--76:12}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.76}, doi = {10.4230/LIPICS.ICALP.2016.76}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BaiSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiSW16, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2016}, url = {http://eprint.iacr.org/2016/753}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WenWX14a, author = {Weiqiang Wen and Libin Wang and Min Xie}, title = {One-Round Deniable Key Exchange with Perfect Forward Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2014}, url = {http://eprint.iacr.org/2014/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WenWX14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WenWP13, author = {Weiqiang Wen and Libin Wang and Jiaxin Pan}, title = {A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2013}, url = {http://eprint.iacr.org/2013/871}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WenWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.