Name
Affiliation
Papers
YANBIN PAN
Key Lab. of Math. Mechanization, Chinese Acad. of Sci., Beijing, China
37
Collaborators
Citations 
PageRank 
42
35
13.29
Referers 
Referees 
References 
65
163
187
Search Limit
100163
Title
Citations
PageRank
Year
On Some Computational Problems in Local Fields00.342022
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project00.342022
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange.00.342022
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited00.342021
It all Started with Compression: Another Look at Reconciliation Mechanism00.342020
Lattice Klepto Revisited00.342020
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NISTPQC Project00.342020
Key Encapsulation Mechanism From Modular Multivariate Linear Equations.00.342019
Computing Hermite Normal Form Faster via Solving System of Linear Equations00.342019
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator00.342019
Breaking Hk17 In Practice00.342019
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project.00.342018
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project.00.342018
A Generalized Attack on Some Variants of the RSA Cryptosystem.00.342018
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08.00.342018
The Search Successive Minima Problem Is Equivalent to Its Optimization Version.00.342017
Cryptanalysis of HK17.00.342017
Solving low-density multiple subset sum problems with SVP oracle.20.392016
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014.10.342016
Two Types of Special Bases for Integral Lattices.00.342015
Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice.00.342015
Solving Random Subset Sum Problem by lp-norm SVP Oracle.00.342014
A Three-Level Sieve Algorithm for the Shortest Vector Problem.180.702013
Improvements on Reductions among Different Variants of SVP and CVP10.362013
An efficient broadcast attack against NTRU10.362012
A New Reduction from Search SVP to Optimization SVP00.342012
An algebraic broadcast attack against NTRU30.442012
An algorithm for factoring integers.00.342012
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem40.432011
Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem.00.342011
A Note on the Density of the Multiple Subset Sum Problems.00.342011
A new lattice-based public-key cryptosystem mixed with a knapsack20.402011
A general NTRU-Like framework for constructing lattice-based public-key cryptosystems10.362011
A Broadcast Attack against NTRU Using Ding's Algorithm.20.392010
A New Lattice for Implicit Factoring.00.342009
A New Lattice-Based Cryptosystem Mixed with a Knapsack.00.342009
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem.00.342008