


Остановите войну!
for scientists:


default search action
Hoeteck Wee
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c96]Hoeteck Wee, David J. Wu:
Succinct Vector, Polynomial, and Functional Commitments from Lattices. EUROCRYPT (3) 2023: 385-416 - [c95]Junqing Gong, Ji Luo
, Hoeteck Wee:
Traitor Tracing with N1/3-Size Ciphertexts and O(1)-Size Keys from k-Lin. EUROCRYPT (3) 2023: 637-668 - [i75]Junqing Gong, Ji Luo, Hoeteck Wee:
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin. IACR Cryptol. ePrint Arch. 2023: 256 (2023) - [i74]Dimitris Kolonelos, Giulio Malavolta, Hoeteck Wee:
Distributed Broadcast Encryption from Bilinear Groups. IACR Cryptol. ePrint Arch. 2023: 874 (2023) - [i73]Hoeteck Wee:
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions. IACR Cryptol. ePrint Arch. 2023: 906 (2023) - 2022
- [c94]Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Witness Encryption and Null-IO from Evasive LWE. ASIACRYPT (1) 2022: 195-221 - [c93]Doreen Riepel
, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. CCS 2022: 2491-2504 - [c92]Hoeteck Wee:
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions. EUROCRYPT (2) 2022: 217-241 - [c91]Brent Waters, Hoeteck Wee, David J. Wu:
Multi-authority ABE from Lattices Without Random Oracles. TCC (1) 2022: 651-679 - [i72]Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Witness Encryption and Null-IO from Evasive LWE. IACR Cryptol. ePrint Arch. 2022: 1140 (2022) - [i71]Brent Waters, Hoeteck Wee, David J. Wu:
Multi-Authority ABE from Lattices without Random Oracles. IACR Cryptol. ePrint Arch. 2022: 1194 (2022) - [i70]Hoeteck Wee:
ABE for DFA from LWE against Bounded Collusions, Revisited. IACR Cryptol. ePrint Arch. 2022: 1348 (2022) - [i69]Doreen Riepel, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. IACR Cryptol. ePrint Arch. 2022: 1415 (2022) - [i68]Hoeteck Wee, David J. Wu:
Succinct Vector, Polynomial, and Functional Commitments from Lattices. IACR Cryptol. ePrint Arch. 2022: 1515 (2022) - 2021
- [c90]Hoeteck Wee:
Broadcast Encryption with Size N1/3 and More from k-Lin. CRYPTO (4) 2021: 155-178 - [c89]Hoeteck Wee, Daniel Wichs:
Candidate Obfuscation via Oblivious LWE Sampling. EUROCRYPT (3) 2021: 127-156 - [c88]Lalita Devadas
, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Succinct LWE Sampling, Random Polynomials, and Obfuscation. TCC (2) 2021: 256-287 - [c87]Hoeteck Wee:
ABE for DFA from LWE Against Bounded Collusions, Revisited. TCC (2) 2021: 288-309 - [i67]Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee:
Inaccessible Entropy II: IE Functions and Universal One-Way Hashing. CoRR abs/2105.01459 (2021) - [i66]Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Succinct LWE Sampling, Random Polynomials, and Obfuscation. IACR Cryptol. ePrint Arch. 2021: 1226 (2021) - 2020
- [j10]Lucas Kowalczyk, Hoeteck Wee:
Compact Adaptively Secure ABE for sf NC1 from k-Lin. J. Cryptol. 33(3): 954-1002 (2020) - [j9]Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee:
Inaccessible Entropy II: IE Functions and Universal One-Way Hashing. Theory Comput. 16: 1-55 (2020) - [c86]Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. CCS 2020: 2007-2023 - [c85]Akshima, David Cash, Andrew Drucker, Hoeteck Wee:
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions. CRYPTO (1) 2020: 157-186 - [c84]Michel Abdalla
, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. CRYPTO (1) 2020: 685-716 - [c83]Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. EUROCRYPT (3) 2020: 278-308 - [c82]Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. EUROCRYPT (3) 2020: 410-441 - [c81]Naty Peter, Rotem Tsabary, Hoeteck Wee:
One-One Constrained Pseudorandom Functions. ITC 2020: 13:1-13:22 - [c80]Hoeteck Wee:
Functional Encryption for Quadratic Functions from k-Lin, Revisited. TCC (1) 2020: 210-228 - [c79]Huijia Lin, Tianren Liu, Hoeteck Wee:
Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More. TCC (2) 2020: 502-531 - [c78]Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:
Pixel: Multi-signatures for Consensus. USENIX Security Symposium 2020: 2093-2110 - [i65]Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee:
Inaccessible Entropy I: Inaccessible Entropy Generators and Statistically Hiding Commitments from One-Way Functions. CoRR abs/2010.05586 (2020) - [i64]Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. IACR Cryptol. ePrint Arch. 2020: 194 (2020) - [i63]Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. IACR Cryptol. ePrint Arch. 2020: 265 (2020) - [i62]Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, Zhenfei Zhang:
Pointproofs: Aggregating Proofs for Multiple Vector Commitments. IACR Cryptol. ePrint Arch. 2020: 419 (2020) - [i61]Naty Peter, Rotem Tsabary, Hoeteck Wee:
One-One Constrained Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2020: 714 (2020) - [i60]Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. IACR Cryptol. ePrint Arch. 2020: 762 (2020) - [i59]Akshima, David Cash, Andrew Drucker, Hoeteck Wee:
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions. IACR Cryptol. ePrint Arch. 2020: 770 (2020) - [i58]Hoeteck Wee, Daniel Wichs:
Candidate Obfuscation via Oblivious LWE Sampling. IACR Cryptol. ePrint Arch. 2020: 1042 (2020) - [i57]Hoeteck Wee:
Functional Encryption for Quadratic Functions from k-Lin, Revisited. IACR Cryptol. ePrint Arch. 2020: 1420 (2020) - [i56]Huijia Lin, Tianren Liu, Hoeteck Wee:
Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More. IACR Cryptol. ePrint Arch. 2020: 1431 (2020)
2010 – 2019
- 2019
- [c77]Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. CRYPTO (2) 2019: 732-764 - [c76]Lucas Kowalczyk, Hoeteck Wee:
Compact Adaptively Secure ABE for \mathsf NC^1 from k-Lin. EUROCRYPT (1) 2019: 3-33 - [c75]Ward Beullens, Hoeteck Wee:
Obfuscating Simple Functionalities from Knowledge Assumptions. Public Key Cryptography (2) 2019: 254-283 - [c74]Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. TCC (1) 2019: 55-80 - [i55]Ward Beullens, Hoeteck Wee:
Obfuscating simple functionalities from knowledge assumptions. IACR Cryptol. ePrint Arch. 2019: 56 (2019) - [i54]Lucas Kowalczyk, Hoeteck Wee:
Compact Adaptively Secure ABE for NC1 from k-Lin. IACR Cryptol. ePrint Arch. 2019: 224 (2019) - [i53]Sergey Gorbunov, Hoeteck Wee:
Digital Signatures for Consensus. IACR Cryptol. ePrint Arch. 2019: 269 (2019) - [i52]Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee:
Pixel: Multi-signatures for Consensus. IACR Cryptol. ePrint Arch. 2019: 514 (2019) - [i51]Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. IACR Cryptol. ePrint Arch. 2019: 630 (2019) - [i50]Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. IACR Cryptol. ePrint Arch. 2019: 1085 (2019) - 2018
- [j8]Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
Improved, black-box, non-malleable encryption from semantic security. Des. Codes Cryptogr. 86(3): 641-663 (2018) - [j7]Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption. J. Cryptol. 31(1): 172-201 (2018) - [c73]Jie Chen, Junqing Gong, Hoeteck Wee:
Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding. ASIACRYPT (2) 2018: 673-702 - [c72]Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee:
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates. CRYPTO (2) 2018: 577-607 - [c71]Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. EUROCRYPT (1) 2018: 503-534 - [c70]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. EUROCRYPT (1) 2018: 567-596 - [c69]Willy Quach, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and Applications. FOCS 2018: 859-870 - [c68]Balthazar Bauer, Jevgenijs Vihrovs, Hoeteck Wee:
On the Inner Product Predicate and a Generalization of Matching Vector Families. FSTTCS 2018: 41:1-41:13 - [c67]Romain Gay
, Lucas Kowalczyk, Hoeteck Wee:
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys. SCN 2018: 123-139 - [c66]Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:
Traitor-Tracing from LWE Made Simple and Attribute-Based. TCC (2) 2018: 341-369 - [i49]Balthazar Bauer, Jevgenijs Vihrovs, Hoeteck Wee:
On the Inner Product Predicate and a Generalization of Matching Vector Families. CoRR abs/1810.02396 (2018) - [i48]Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. IACR Cryptol. ePrint Arch. 2018: 116 (2018) - [i47]Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee:
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates. IACR Cryptol. ePrint Arch. 2018: 360 (2018) - [i46]Romain Gay, Lucas Kowalczyk, Hoeteck Wee:
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys. IACR Cryptol. ePrint Arch. 2018: 391 (2018) - [i45]Willy Quach, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and Applications. IACR Cryptol. ePrint Arch. 2018: 409 (2018) - [i44]Jie Chen, Junqing Gong, Hoeteck Wee:
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding. IACR Cryptol. ePrint Arch. 2018: 833 (2018) - [i43]Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:
Traitor-Tracing from LWE Made Simple and Attribute-Based. IACR Cryptol. ePrint Arch. 2018: 897 (2018) - [i42]Balthazar Bauer, Jevgenijs Vihrovs, Hoeteck Wee:
On the Inner Product Predicate and a Generalization of Matching Vector Families. IACR Cryptol. ePrint Arch. 2018: 945 (2018) - 2017
- [c65]Miguel Ambrona
, Gilles Barthe
, Romain Gay
, Hoeteck Wee:
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. CCS 2017: 647-664 - [c64]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Conditional Disclosure of Secrets via Non-linear Reconstruction. CRYPTO (1) 2017: 758-790 - [c63]Michel Abdalla
, Romain Gay
, Mariana Raykova, Hoeteck Wee:
Multi-input Inner-Product Functional Encryption from Pairings. EUROCRYPT (1) 2017: 601-626 - [c62]Hoeteck Wee:
Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited. TCC (1) 2017: 206-233 - [c61]Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee:
Private Constrained PRFs (and More) from LWE. TCC (1) 2017: 264-302 - [i41]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). Electron. Colloquium Comput. Complex. TR17 (2017) - [i40]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). IACR Cryptol. ePrint Arch. 2017: 359 (2017) - [i39]Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee:
Private Constrained PRFs (and More) from LWE. IACR Cryptol. ePrint Arch. 2017: 795 (2017) - [i38]Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee:
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. IACR Cryptol. ePrint Arch. 2017: 983 (2017) - [i37]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. IACR Cryptol. ePrint Arch. 2017: 1062 (2017) - 2016
- [b1]Hoeteck Wee:
Advances in Functional Encryption. École Normale Supérieure, Paris, France, 2016 - [j6]Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:
Leakage-Resilient Cryptography from Minimal Assumptions. J. Cryptol. 29(3): 514-551 (2016) - [c60]Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee:
FHE Circuit Privacy Almost for Free. CRYPTO (2) 2016: 62-89 - [c59]Romain Gay
, Dennis Hofheinz, Eike Kiltz
, Hoeteck Wee:
Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27 - [c58]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. EuroS&P 2016: 81-96 - [c57]Zvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Obfuscating Conjunctions under Entropic Ring LWE. ITCS 2016: 147-156 - [c56]Hoeteck Wee:
KDM-Security via Homomorphic Smooth Projective Hashing. Public Key Cryptography (2) 2016: 159-179 - [c55]Hoeteck Wee:
Déjà Q: Encore! Un Petit IBE. TCC (A2) 2016: 237-258 - [c54]Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:
Targeted Homomorphic Attribute-Based Encryption. TCC (B2) 2016: 330-360 - [i36]Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly Secure CCA-Secure Encryption without Pairings. IACR Cryptol. ePrint Arch. 2016: 94 (2016) - [i35]Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee:
FHE Circuit Privacy Almost For Free. IACR Cryptol. ePrint Arch. 2016: 381 (2016) - [i34]Michel Abdalla, Mariana Raykova, Hoeteck Wee:
Multi-Input Inner-Product Functional Encryption from Pairings. IACR Cryptol. ePrint Arch. 2016: 425 (2016) - [i33]Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:
Targeted Homomorphic Attribute Based Encryption. IACR Cryptol. ePrint Arch. 2016: 691 (2016) - [i32]Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption. IACR Cryptol. ePrint Arch. 2016: 720 (2016) - [i31]Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
Improved, Black-Box, Non-Malleable Encryption from Semantic Security. IACR Cryptol. ePrint Arch. 2016: 842 (2016) - 2015
- [j5]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Attribute-Based Encryption for Circuits. J. ACM 62(6): 45:1-45:33 (2015) - [c53]Fabrice Benhamouda
, Geoffroy Couteau
, David Pointcheval
, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. CRYPTO (2) 2015: 107-129 - [c52]Eike Kiltz
, Jiaxin Pan
, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. CRYPTO (2) 2015: 275-295 - [c51]Romain Gay
, Iordanis Kerenidis, Hoeteck Wee:
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. CRYPTO (2) 2015: 485-502 - [c50]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. CRYPTO (2) 2015: 503-523 - [c49]Eike Kiltz
, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. EUROCRYPT (2) 2015: 101-128 - [c48]Jie Chen, Romain Gay
, Hoeteck Wee:
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. EUROCRYPT (2) 2015: 595-624 - [c47]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IMACC 2015: 23-40 - [c46]Romain Gay
, Pierrick Méaux, Hoeteck Wee:
Predicate Encryption for Multi-dimensional Range Queries from Lattices. Public Key Cryptography 2015: 752-776 - [i30]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. IACR Cryptol. ePrint Arch. 2015: 29 (2015) - [i29]Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR Cryptol. ePrint Arch. 2015: 216 (2015) - [i28]Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. IACR Cryptol. ePrint Arch. 2015: 246 (2015) - [i27]Hoeteck Wee:
Dual System Encryption via Predicate Encodings. IACR Cryptol. ePrint Arch. 2015: 273 (2015) - [i26]Jie Chen, Romain Gay, Hoeteck Wee:
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. IACR Cryptol. ePrint Arch. 2015: 409 (2015) - [i25]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptol. ePrint Arch. 2015: 604 (2015) - [i24]Romain Gay, Iordanis Kerenidis, Hoeteck Wee:
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2015: 665 (2015) - [i23]Hoeteck Wee:
KDM-Security via Homomorphic Smooth Projective Hashing. IACR Cryptol. ePrint Arch. 2015: 721 (2015) - [i22]Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. IACR Cryptol. ePrint Arch. 2015: 892 (2015) - [i21]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. IACR Cryptol. ePrint Arch. 2015: 978 (2015) - [i20]Hoeteck Wee:
Déjà Q: Encore! Un Petit IBE. IACR Cryptol. ePrint Arch. 2015: 1064 (2015) - 2014
- [j4]Jie Chen, Hoon Wei Lim, San Ling
, Huaxiong Wang, Hoeteck Wee:
Shorter identity-based encryption via asymmetric pairings. Des. Codes Cryptogr. 73(3): 911-947 (2014) - [j3]Jie Chen, Hoeteck Wee:
Doubly spatial encryption from DBDH. Theor. Comput. Sci. 543: 79-89 (2014) - [c45]Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee:
On the Complexity of UC Commitments. EUROCRYPT 2014: 677-694 - [c44]Yuval Ishai, Hoeteck Wee:
Partial Garbling Schemes and Their Applications. ICALP (1) 2014: 650-662 - [c43]Jie Chen, Hoeteck Wee:
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. SCN 2014: 277-297 - [c42]Hoeteck Wee:
Functional Encryption and Its Impact on Cryptography. SCN 2014: 318-323 - [c41]Hoeteck Wee:
Dual System Encryption via Predicate Encodings. TCC 2014: 616-637 - [i19]Jie Chen, Hoeteck Wee:
Doubly Spatial Encryption from DBDH. IACR Cryptol. ePrint Arch. 2014: 199 (2014) - [i18]Jie Chen, Hoeteck Wee:
Dual System Groups and its Applications - Compact HIBE and More. IACR Cryptol. ePrint Arch. 2014: 265 (2014) - [i17]Jie Chen, Hoeteck Wee:
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula. IACR Cryptol. ePrint Arch. 2014: 465 (2014) - [i16]Romain Gay, Pierrick Méaux, Hoeteck Wee:
Predicate Encryption for Multi-Dimensional Range Queries from Lattices. IACR Cryptol. ePrint Arch. 2014: 965 (2014) - [i15]Yuval Ishai, Hoeteck Wee:
Partial Garbling Schemes and Their Applications. IACR Cryptol. ePrint Arch. 2014: 995 (2014) - 2013
- [c40]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [c39]Jie Chen, Hoeteck Wee:
Fully, (Almost) Tightly Secure IBE and Dual System Groups. CRYPTO (2) 2013: 435-460 - [c38]