Name
Papers
Collaborators
RUPENG YANG
22
31
Citations 
PageRank 
Referers 
21
7.66
89
Referees 
References 
501
331
Search Limit
100501
Title
Citations
PageRank
Year
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.00.342021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks00.342021
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting.00.342020
Collusion Resistant Watermarkable PRFs from Standard Assumptions.00.342020
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience00.342019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications00.342019
New Empirical Traceability Analysis of CryptoNote-Style Blockchains.10.352019
Public-Key Encryption With Keyword Search via Obfuscation.00.342019
Position based cryptography with location privacy: A step for Fog Computing.00.342018
Towards leakage-resilient fine-grained access control in fog computing.70.422018
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.00.342018
Unforgeable Watermarking Schemes with Public Extraction.00.342018
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.00.342018
Decentralized Blacklistable Anonymous Credentials with Reputation.00.342018
Lattice-Based Universal Accumulator With Nonmembership Arguments00.342018
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.00.342017
Leakage-Resilient Functional Encryption via Pair Encodings.40.372016
Public-key encryption with keyword search secure against continual memory attacks10.352016
Weak Leakage Resilient Extractable Hash Proof System And Construction For Weak Leakage Resilient Cca-Secure Public-Key Encryption00.342015
Updatable Hash Proof System and Its Applications.80.422015
Weak-Key Leakage Resilient Cryptography.00.342014
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System.00.342013