


default search action
Yu Chen 0003
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation: Peking University, Beijing, China
Other persons with the same name
- Yu Chen — disambiguation page
- Yu Chen 0001
— Wuhan University of Technology, School of Science, China
- Yu Chen 0002
— Binghamton University, New York, NY, USA (and 1 more)
- Yu Chen 0004
— Tsinghua University, Department of Computer Science and Technology, Beijing, China
- Yu Chen 0005 — University of California, Los Angeles, CA, USA
- Yu Chen 0006
— Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beiing, China (and 1 more)
- Yu Chen 0007 — University of Tokyo, Japan
- Yu Chen 0008
— San Jose State University, School of Information Systems and Technology, CA, USA (and 3 more)
- Yu Chen 0009 — University of Cambridge, UK (and 1 more)
- Yu Chen 0010
— State Key Laboratory of Transmission Equipment and System Safety and Electrical New Technology, Chongqing, China
- Yu Chen 0011
— Wayne State University, Detroit, MI, USA
- Yu Chen 0012 — DFKI, Saarbrücken, Germany (and 1 more)
- Yu Chen 0013
— Columbia University, Department of Electrical Engineering, New York, NY, USA
- Yu Chen 0014
— China University of Mining and Technology, Key Laboratory for Land Environment and Disaster Monitoring of NASG, Xuzhou, China (and 1 more)
- Yu Chen 0015 — Sichuan University, Business School, Chengdu, China
- Yu Chen 0016 — University of Waterloo, Ontario, Canada
- Yu Chen 0017 — Texas A&M University, College Station, USA
- Yu Chen 0018
— University of Science and Technology of China, School of Management, Hefei, China
- Yu Chen 0019
— Carnegie Mellon University, Pittsburgh, PA, USA
- Yu Chen 0020 — China University of Mining and Technology, Xuzhou, China
- Yu Chen 0021 — Wuhan University, School of Computer Science, National Engineering Research Center for Multimedia Software, China
- Yu Chen 0022
— Rensselaer Polytechnic Institute, Computer Science Department, Troy, NY, USA
- Yu Chen 0023
— Zhengzhou University of Aeronautics, School of Electronics and Communication Engineering, China
- Yu Chen 0024
— University of Liverpool, Institute for Risk and Uncertainty, UK (and 1 more)
- Yu Chen 0025
— Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0026
— Central South University, School of Life Sciences, Center for Medical Genetics / Hunan Key Laboratory of Medical Genetics, Changsha, China
- Yu Chen 0027
— Central South University, School of Resources and Safety Engineering, Changsha, China (and 1 more)
- Yu Chen 0028
— University of Electronic Science and Technology, School of Automation Engineering, Chengdu, China
- Yu Chen 0029
— Wuhan University, School of Geodesy and Geomatics, China
- Yu Chen 0030
— Huazhong University of Science and Technology, School of Electrical and Electronic Engineering, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0031
— Harbin Institute of Technology, School of Electrical Engineering and Automation, China
- Yu Chen 0032 — Shenzhen University, College of Architecture and Urban Planning, China
- Yu Chen 0033
— Yancheng Teachers University, School of Information Engineering, China (and 2 more)
- Yu Chen 0034
— Beijing Polytechnic, School of Telecommunication Engineering, China (and 1 more)
- Yu Chen 0035
— Shenyang Pharmaceutical University, School of Business Administration, China
- Yu Chen 0036
— College of William and Mary, Williamsburg, VA, USA
- Yu Chen 0037
— Motovis Inc. (and 1 more)
- Yu Chen 0038
— Nanjing University, China
- Yu Chen 0039
— École Polytechnique Fédérale de Lausanne, Switzerland (and 2 more)
- Yu Chen 0040 — Xi'an Jiaotong University, Department of Electrical and Information Engineering, Institute of Artificial Intelligence and Robotics, Xi'an, China
- Yu Chen 0041
— Chinese Academie of Sciences, Institute of Geographical Sciences and Natural Resources Research, State Key Laboratory of Resources and Environmental Information System, Beijing, China
- Yu Chen 0042
— Tianjin University of Technology, China (and 2 more)
- Yu Chen 0043
— University of California, San Diego, CA, USA
- Yu Chen 0044
— University of Edinburgh, School of Engineering, Institute for Digital Communication, UK
- Yu Chen 0045
— Yale University, School of Medicine, Department of Psychiatry, New Haven, CT, USA
- Yu Chen 0046
— Kunming University of Science and Technology, Faculty of Information Engineering and Automation, China
- Yu Chen 0047
— Central South University, School of Automation, Changsha, China
- Yu Chen 0048
— Donghua University, Shanghai, China
- Yu Chen 0049
— North China Electric Power University, School of Control and Computer Engineering, Baoding, China
- Yu Chen 0050
— China University of Geosciences, School of Geography and Information Engineering, Wuhan, China
- Yu Chen 0051
— University of Technology Sydney, Faculty of Engineering and IT, Australia
- Yu Chen 0052
— Tsinghua University, BNRist, RIIT, Institute of Internet Industry, Beijing, China
- Yu Chen 0053
— National University of Defense Technology, College of Electronic Engineering, Hefei, China
- Yu Chen 0054
— Shandong University of Technology, School of Electrical and Electronic Engineering, Zibo, China
- Yu Chen 0055
— Jiangxi Normal University, School of Software, Nanchang, China
- Yu Chen 0056
— Hubei University of Technology, School of Computers, Wuhan, China
- Yu Chen 0057
— Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China
- Yu Chen 0058
— Wuhan University of Technology, School of Transportation, China
- Yu Chen 0059
— Delft University of Technology, Faculty of Civil Engineering and Geosciences, The Netherlands
- Yu Chen 0060
— Northeast Forestry University, College of Information and Computer Engineering, Harbin, China (and 1 more)
- Yu Chen 0061
— Huazhong University of Science and Technology, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Yu Chen 0062
— Xidian University, State Key Laboratory of Integrated Services Network, Xi'an, China
- Yu Chen 0063
— Xi'an Jiaotong University, School of Electrical Engineering, China
- Yu Chen 0064
— Soochow University, School of Computer Science and Technology, Suzhou, China
- Yu Chen 0065
— University of Strathclyde, Department of Physics, Glasgow, UK
- Yu Chen 0066
— University of Glasgow, James Watt School of Engineering, UK (and 1 more)
- Yu Chen 0067
— Ningbo University, China
- Yu Chen 0068 — Rensselaer Polytechnic Institute, USA
- Yu Chen 0069 — Swansea University, UK
- Yu Chen 0070
— University of Michigan, Electrical Engineering and Computer Science, Ann Arbor, MI, USA (and 1 more)
- Yu Chen 0071
— University of Illinois at Urbana-Champaign, Department of Mechanical Science and Engineering, IL, US
- Yu Chen 0072 — Department of Automation and Key Laboratory of System Control and Information Processing, Shanghai Jiao Tong University, Shanghai, China
- Yu Chen 0073 — Tianjin University of Technology, School of Chinese Language and Culture, Tianjin, China
- Yu Chen 0074
— Institute for Interdisciplinary Information Sciences (IIIS), Tsinghua University, Beijing, China
Other persons with a similar name
- Pin-Yu Chen
- Xiaoyu Chen (aka: Xiao-Yu Chen, Xiao-yu Chen) — disambiguation page
- Xinyu Chen (aka: XinYu Chen, Xin-Yu Chen) — disambiguation page
- Yue Chen — disambiguation page
- Yuxin Chen (aka: Yu-Xin Chen, Yu-xin Chen) — disambiguation page
- Yue Chen 0002 — Queen Mary University of London, School of Electronic Engineering and Computer Science, UK
- Bing-Yu Chen 0004
(aka: Bingyu Chen 0004, Robin Bing-Yu Chen 0004) — National Taiwan University, Taipei, Taiwan (and 1 more)
- Yuchen Liu (aka: YuChen Liu, Yu-Chen Liu) — disambiguation page
- Chenyu Wang (aka: Chen-Yu Wang, Chen-yu Wang) — disambiguation page
- Yuchen Wang (aka: YuChen Wang, Yu-Chen Wang) — disambiguation page
- show all similar names
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Binbin Tu
, Yu Chen, Hongrui Cui, Xianfang Wang:
Fast two-party signature for upgrading ECDSA to two-party scenario easily. Theor. Comput. Sci. 986: 114325 (2024) - [c38]Cong Zhang
, Yu Chen
, Weiran Liu
, Liqiang Peng
, Meng Hao
, Anyu Wang
, Xiaoyun Wang
:
Unbalanced Private Set Union with Reduced Computation and Communication. CCS 2024: 1434-1447 - [c37]Yu Chen, Fei Gao, Yanguang Zhang, Maoying Qiao, Nannan Wang:
Generating Handwritten Mathematical Expressions From Symbol Graphs: An End-to-End Pipeline. CVPR 2024: 15675-15685 - [c36]Yu Chen
, Min Zhang
, Cong Zhang
, Minglang Dong
, Weiran Liu
:
Private Set Operations from Multi-query Reverse Private Membership Test. Public Key Cryptography (3) 2024: 387-416 - [i26]Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai:
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions. IACR Cryptol. ePrint Arch. 2024: 1146 (2024) - 2023
- [j13]Yuyu Wang
, Jiaxin Pan
, Yu Chen
:
Fine-Grained Secure Attribute-Based Encryption. J. Cryptol. 36(4): 33 (2023) - [c35]Yuyu Wang
, Chuanjie Su
, Jiaxin Pan
, Yu Chen
:
A Simple and Efficient Framework of Proof Systems for NP. ASIACRYPT (2) 2023: 174-207 - [c34]Min Zhang
, Yu Chen
, Chuanzhou Yao, Zhichao Wang
:
Sigma Protocols from Verifiable Secret Sharing and Their Applications. ASIACRYPT (2) 2023: 208-242 - [c33]Binbin Tu
, Yu Chen
, Qi Liu
, Cong Zhang
:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. CCS 2023: 2959-2973 - [c32]Cong Zhang
, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Linear Private Set Union from Multi-Query Reverse Private Membership Test. USENIX Security Symposium 2023: 337-354 - [i25]Binbin Tu, Xiangling Zhang, Yujie Bai, Yu Chen:
Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality. IACR Cryptol. ePrint Arch. 2023: 1015 (2023) - [i24]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2023: 1327 (2023) - [i23]Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. IACR Cryptol. ePrint Arch. 2023: 1857 (2023) - 2022
- [j12]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [c31]Min Zhang, Binbin Tu, Yu Chen:
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature. Inscrypt 2022: 67-86 - [i22]Hu Yang, Yi Huang, Haijun Wang, Yu Chen:
Temporal-Spatial dependencies ENhanced deep learning model (TSEN) for household leverage series forecasting. CoRR abs/2210.08668 (2022) - [i21]Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin:
Optimal Private Set Union from Multi-Query Reverse Private Membership Test. IACR Cryptol. ePrint Arch. 2022: 358 (2022) - [i20]Binbin Tu, Yu Chen, Qi Liu, Cong Zhang:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 653 (2022) - [i19]Min Zhang, Binbin Tu, Yu Chen:
You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature. IACR Cryptol. ePrint Arch. 2022: 1772 (2022) - 2021
- [c30]Yu Chen
, Qiang Tang
, Yuyu Wang
:
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds). ASIACRYPT (2) 2021: 514-543 - [c29]Yuyu Wang
, Jiaxin Pan
, Yu Chen
:
Fine-Grained Secure Attribute-Based Encryption. CRYPTO (4) 2021: 179-207 - [c28]Hongrui Cui
, Kaiyi Zhang
, Yu Chen
, Zhen Liu
, Yu Yu
:
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK). ESORICS (2) 2021: 332-351 - [i18]Yu Chen, Qiang Tang, Yuyu Wang:
Hierarchical Integrated Signature and Encryption. IACR Cryptol. ePrint Arch. 2021: 1237 (2021) - 2020
- [j11]Binbin Tu
, Yu Chen, Xueli Wang:
Threshold trapdoor functions and their applications. IET Inf. Secur. 14(2): 220-231 (2020) - [j10]Baodong Qin
, Yu Chen, Qiong Huang
, Ximeng Liu
, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516: 515-528 (2020)
2010 – 2019
- 2019
- [j9]Yu Chen
, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM security for identity-based encryption: Constructions and separations. Inf. Sci. 486: 450-473 (2019) - [c27]Xueli Wang, Yu Chen, Xuecheng Ma:
Adding Linkability to Ring Signatures with One-Time Signatures. ISC 2019: 445-464 - 2018
- [j8]Yu Chen
, Baodong Qin, Haiyang Xue
:
Regular lossy functions and their applications in leakage-resilient cryptography. Theor. Comput. Sci. 739: 13-38 (2018) - [c26]Yu Chen, Yuyu Wang
, Hong-Sheng Zhou
:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. ASIACRYPT (2) 2018: 575-606 - [c25]Zheng Yang
, Yu Chen
, Song Luo
:
Two-Message Key Exchange with Strong Security from Ideal Lattices. CT-RSA 2018: 98-115 - [c24]Yu Chen, Baodong Qin, Haiyang Xue
:
Regularly Lossy Functions and Applications. CT-RSA 2018: 491-511 - [c23]Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen:
On the Security of Classic Protocols for Unique Witness Relations. Public Key Cryptography (2) 2018: 589-615 - [i17]Binbin Tu, Yu Chen, Xueli Wang:
Threshold and Revocation Encryptions via Threshold Trapdoor Function. CoRR abs/1804.03783 (2018) - [i16]Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Their Applications. IACR Cryptol. ePrint Arch. 2018: 21 (2018) - [i15]Zheng Yang, Yu Chen, Song Luo:
Two-message Key Exchange with Strong Security from Ideal Lattices. IACR Cryptol. ePrint Arch. 2018: 361 (2018) - [i14]Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. IACR Cryptol. ePrint Arch. 2018: 781 (2018) - 2017
- [c22]Jingyue Yu
, Yi Deng, Yu Chen
:
From Attack on Feige-Shamir to Construction of Oblivious Transfer. Inscrypt 2017: 44-64 - [i13]Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen:
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations. IACR Cryptol. ePrint Arch. 2017: 390 (2017) - 2016
- [j7]Yu Chen, Jiang Zhang
, Dongdai Lin, Zhenfeng Zhang:
Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 78(2): 493-526 (2016) - [j6]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. Int. J. Inf. Sec. 15(1): 15-33 (2016) - [j5]Yu Chen, Zongyang Zhang:
Publicly evaluable pseudorandom functions and their applications. J. Comput. Secur. 24(2): 289-320 (2016) - [j4]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
:
Generalized (identity-based) hash proof system and its applications. Secur. Commun. Networks 9(12): 1698-1716 (2016) - [c21]Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. Inscrypt 2016: 150-165 - [c20]Jiang Zhang
, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. CRYPTO (3) 2016: 303-332 - [c19]Yu Chen, Baodong Qin, Jiang Zhang
, Yi Deng, Sherman S. M. Chow
:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - [i12]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. IACR Cryptol. ePrint Arch. 2016: 523 (2016) - [i11]Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptol. ePrint Arch. 2016: 1020 (2016) - 2015
- [c18]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka
, Zhenfu Cao
, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [i10]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [j3]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. Comput. J. 57(10): 1537-1556 (2014) - [j2]Jiang Zhang
, Zhenfeng Zhang, Yu Chen:
PRE: Stronger security notions and efficient construction with non-interactive opening. Theor. Comput. Sci. 542: 1-16 (2014) - [c17]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. ACISP 2014: 274-289 - [c16]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka, Zhenfu Cao
, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c15]Jiang Zhang
, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang:
Black-Box Separations for One-More (Static) CDH and Its Generalization. ASIACRYPT (2) 2014: 366-385 - [c14]Yu Chen, Zongyang Zhang:
Publicly Evaluable Pseudorandom Functions and Their Applications. SCN 2014: 115-134 - [i9]Yu Chen, Zongyang Zhang:
Publicly Evaluable Pseudorandom Functions and Their Applications. IACR Cryptol. ePrint Arch. 2014: 306 (2014) - [i8]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited. IACR Cryptol. ePrint Arch. 2014: 310 (2014) - 2013
- [i7]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. IACR Cryptol. ePrint Arch. 2013: 2 (2013) - [i6]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. IACR Cryptol. ePrint Arch. 2013: 33 (2013) - 2012
- [j1]Liqun Chen
, Yu Chen:
The n-Diffie-Hellman problem and multiple-key encryption. Int. J. Inf. Sec. 11(5): 305-320 (2012) - [c13]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
:
Identity-Based Extractable Hash Proofs and Their Applications. ACNS 2012: 153-170 - [c12]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
:
Anonymous Identity-Based Hash Proof System and Its Applications. ProvSec 2012: 143-160 - [i5]Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE - Stronger Security Notion and Efficient Construction with New Property. IACR Cryptol. ePrint Arch. 2012: 664 (2012) - [i4]Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:
Integrated PKE and PEKS - Stronger Security Notions and New Constructions. IACR Cryptol. ePrint Arch. 2012: 692 (2012) - 2011
- [c11]Yu Chen, Song Luo, Zhong Chen:
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. DBSec 2011: 263-270 - [c10]Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:
A Novel Commutative Blinding Identity Based Encryption Scheme. FPS 2011: 73-89 - [c9]Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing:
A Variant of Boyen-Waters Anonymous IBE Scheme. ICICS 2011: 42-56 - [c8]Yu Chen, Liqun Chen
, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ICISC 2011: 275-301 - [c7]Yu Chen, Liqun Chen
, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - [c6]Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 - [c5]Liqun Chen
, Yu Chen:
The n-Diffie-Hellman Problem and Its Applications. ISC 2011: 119-134 - [i3]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - [i2]Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and its Applications. IACR Cryptol. ePrint Arch. 2011: 397 (2011) - [i1]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 593 (2011) - 2010
- [c4]Yu Chen, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen:
Identity-based encryption based on DHIES. AsiaCCS 2010: 82-88 - [c3]Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen:
When ABE Meets RSS. DBSec 2010: 319-326 - [c2]Yu Chen, Liqun Chen
:
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. ICISC 2010: 113-132
2000 – 2009
- 2008
- [c1]Yong Liu, Zhong Chen, Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. AINA Workshops 2008: 608-614
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-25 23:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint