-
Article
Generalized splitting-ring number theoretic transform
In this paper, we propose GSR-NTT and demonstrate that K-NTT, H-NTT, and G3-NTT are specific instances of GSR-NTT. We introduce a succinct methodology for complexity analysis, and utilize our GSR-NTT to accele...
-
Chapter and Conference Paper
Research on Route Planning Method Based on Rescue-Helicopter
During rescue missions, Rescue helicopters usually fly at low altitudes and in a mountainous area. The pilots must have been blocked by mountains and clouds when they are cruising at low altitude. In order to ...
-
Chapter and Conference Paper
Net-Kill Opportunity Created by Smash in Badminton Doubles
Badminton is one of the most popular sports in the world. In this paper, we examined the assumption that smash in the badminton double discipline is tactically different from the single discipline and that the...
-
Article
Open AccessA bZIP transcription factor GhVIP1 increased drought tolerance in upland cotton
Cotton is extremely affected by severe natural stresses. Drought is one of the most serious abiotic stress that adversely influences cotton growth, productivity, and fiber quality. Previous studies indicate th...
-
Chapter and Conference Paper
Tight Analysis of Decryption Failure Probability of Kyber in Reality
Kyber is a candidate in the third round of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) Standardization. However, because of the protocol’s independence assumption,...
-
Chapter and Conference Paper
Half-Aggregation of Schnorr Signatures with Tight Reductions
An aggregate signature (AS) scheme allows an unspecified aggregator to compress many signatures into a short aggregation. AS schemes can save storage costs and accelerate verification. They are desirable for a...
-
Article
Detection of candidate genes and development of KASP markers for Verticillium wilt resistance by combining genome-wide association study, QTL-seq and transcriptome sequencing in cotton
Combining GWAS, QTL-seq and transcriptome sequencing detected basal defense-related genes showing gDNA sequence variation and expression difference in diverse cotton lines, which might be the molecular mechani...
-
Chapter and Conference Paper
Identity-Based Identity-Concealed Authenticated Key Exchange
Identity-based authenticated key exchange (ID-AKE) allows two parties (whose identities are just their public keys) to agree on a shared session key over open channels. At ESORICS 2019, Tomida et al. proposed ...
-
Chapter and Conference Paper
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications
Number theoretic transform (NTT) is a basic mathematic operation, and is particularly fundamental to the practical implementations of cryptographic algorithms based on lattices with algebraic structures. In th...
-
Article
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
Functional encryption (FE) and predicate encryption (PE) can be utilized in deploying and executing machine learning (ML) algorithms to improve efficiency. However, most of existing FE and PE algorithms only c...
-
Chapter and Conference Paper
SKCN: Practical and Flexible Digital Signature from Module Lattice
The lattice-based signature scheme Dilithium is one of the most promising signature candidates for the post-quantum era, for its simplicity, efficiency, small public key size, and resistance against side chann...
-
Chapter and Conference Paper
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC
In the certificateless cryptography, users generate their partial private key and the Key Generation Centre (KGC) generates the other partial private key of users. In some certificateless application scenarios...
-
Chapter and Conference Paper
Identity-Based Authenticated Encryption with Identity Confidentiality
Identity-based cryptography (IBC) is fundamental to security and privacy protection. Identity-based authenticated encryption (i.e., signcryption) is an important IBC primitive, which has numerous and promising...
-
Article
Open AccessIsolation and characterization of the GbVIP1 gene and response to Verticillium wilt in cotton and tobacco
Verticillium wilt is a serious soil-borne vascular disease that causes major losses to upland cotton (Gossypium hirutum L.) worldwidely every year. The protein VIP1 (VirE2 interaction protein 1), a bZIP transcrip...
-
Chapter and Conference Paper
Generic and Practical Key Establishment from Lattice
In this work, we abstract some key ingredients in previous key establishment and public-key encryption schemes from LWE and its variants. Specifically, we explicitly formalize the building tool, referred to as...
-
Chapter and Conference Paper
Order-Revealing Encryption: File-Injection Attack and Forward Security
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted databases (EDBs). In this work, we study the leakage of OPE and ORE and their forward security.
-
Article
Open AccessRegional association analysis-based fine map** of three clustered QTL for verticillium wilt resistance in cotton (G. hirsutum. L)
Verticillium wilt is one of the most destructive diseases affecting global cotton production. The most effective way to control wilt disease has been the development of new cotton varieties that are resistant ...
-
Chapter and Conference Paper
Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange
Authenticated key exchange (AKE) plays a fundamental role in modern cryptography. Up to now, the HMQV protocol family is among the most efficient provably secure AKE protocols, which has been widely standardiz...
-
Chapter and Conference Paper
Compact Lossy and All-but-One Trapdoor Functions from Lattice
Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop ...
-
Chapter and Conference Paper
Efficient Tag Path Authentication Protocol with Less Tag Memory
Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues,...