Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Generalized splitting-ring number theoretic transform

    In this paper, we propose GSR-NTT and demonstrate that K-NTT, H-NTT, and G3-NTT are specific instances of GSR-NTT. We introduce a succinct methodology for complexity analysis, and utilize our GSR-NTT to accele...

    Zhichuang Liang, Yunlei Zhao, Zhenfeng Zhang in Frontiers of Computer Science (2024)

  2. No Access

    Chapter and Conference Paper

    Research on Route Planning Method Based on Rescue-Helicopter

    During rescue missions, Rescue helicopters usually fly at low altitudes and in a mountainous area. The pilots must have been blocked by mountains and clouds when they are cruising at low altitude. In order to ...

    Fei Yu, Yunlei Zhao, Renzhong Wang in 2023 Asia-Pacific International Symposium … (2024)

  3. No Access

    Chapter and Conference Paper

    Net-Kill Opportunity Created by Smash in Badminton Doubles

    Badminton is one of the most popular sports in the world. In this paper, we examined the assumption that smash in the badminton double discipline is tactically different from the single discipline and that the...

    Lejun Shen, Yunlei Zhao, Yongming Chen in Proceedings of the 14th International Symp… (2024)

  4. Article

    Open Access

    A bZIP transcription factor GhVIP1 increased drought tolerance in upland cotton

    Cotton is extremely affected by severe natural stresses. Drought is one of the most serious abiotic stress that adversely influences cotton growth, productivity, and fiber quality. Previous studies indicate th...

    Pei Zhao, Yuewei Xu, Wei Chen, **aohui Sang, Yunlei Zhao in Journal of Cotton Research (2023)

  5. No Access

    Chapter and Conference Paper

    Tight Analysis of Decryption Failure Probability of Kyber in Reality

    Kyber is a candidate in the third round of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) Standardization. However, because of the protocol’s independence assumption,...

    Boyue Fang, Weize Wang, Yunlei Zhao in Information and Communications Security (2022)

  6. No Access

    Chapter and Conference Paper

    Half-Aggregation of Schnorr Signatures with Tight Reductions

    An aggregate signature (AS) scheme allows an unspecified aggregator to compress many signatures into a short aggregation. AS schemes can save storage costs and accelerate verification. They are desirable for a...

    Yanbo Chen, Yunlei Zhao in Computer Security – ESORICS 2022 (2022)

  7. No Access

    Article

    Detection of candidate genes and development of KASP markers for Verticillium wilt resistance by combining genome-wide association study, QTL-seq and transcriptome sequencing in cotton

    Combining GWAS, QTL-seq and transcriptome sequencing detected basal defense-related genes showing gDNA sequence variation and expression difference in diverse cotton lines, which might be the molecular mechani...

    Yunlei Zhao, Wei Chen, Yanli Cui, **aohui Sang in Theoretical and Applied Genetics (2021)

  8. No Access

    Chapter and Conference Paper

    Identity-Based Identity-Concealed Authenticated Key Exchange

    Identity-based authenticated key exchange (ID-AKE) allows two parties (whose identities are just their public keys) to agree on a shared session key over open channels. At ESORICS 2019, Tomida et al. proposed ...

    Huanhuan Lian, Tianyu Pan, Huige Wang, Yunlei Zhao in Computer Security – ESORICS 2021 (2021)

  9. No Access

    Chapter and Conference Paper

    Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications

    Number theoretic transform (NTT) is a basic mathematic operation, and is particularly fundamental to the practical implementations of cryptographic algorithms based on lattices with algebraic structures. In th...

    Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun in Information Security and Cryptology (2021)

  10. No Access

    Article

    Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions

    Functional encryption (FE) and predicate encryption (PE) can be utilized in deploying and executing machine learning (ML) algorithms to improve efficiency. However, most of existing FE and PE algorithms only c...

    Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao in Peer-to-Peer Networking and Applications (2020)

  11. No Access

    Chapter and Conference Paper

    SKCN: Practical and Flexible Digital Signature from Module Lattice

    The lattice-based signature scheme Dilithium is one of the most promising signature candidates for the post-quantum era, for its simplicity, efficiency, small public key size, and resistance against side chann...

    Boru Gong, Leixiao Cheng, Yunlei Zhao in Information Security and Privacy (2020)

  12. No Access

    Chapter and Conference Paper

    Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC

    In the certificateless cryptography, users generate their partial private key and the Key Generation Centre (KGC) generates the other partial private key of users. In some certificateless application scenarios...

    Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen in Information Security and Cryptology (2020)

  13. No Access

    Chapter and Conference Paper

    Identity-Based Authenticated Encryption with Identity Confidentiality

    Identity-based cryptography (IBC) is fundamental to security and privacy protection. Identity-based authenticated encryption (i.e., signcryption) is an important IBC primitive, which has numerous and promising...

    Yunlei Zhao in Computer Security – ESORICS 2020 (2020)

  14. Article

    Open Access

    Isolation and characterization of the GbVIP1 gene and response to Verticillium wilt in cotton and tobacco

    Verticillium wilt is a serious soil-borne vascular disease that causes major losses to upland cotton (Gossypium hirutum L.) worldwidely every year. The protein VIP1 (VirE2 interaction protein 1), a bZIP transcrip...

    Kai ZHANG, Pei ZHAO, Hongmei WANG, Yunlei ZHAO, Wei CHEN in Journal of Cotton Research (2019)

  15. Chapter and Conference Paper

    Generic and Practical Key Establishment from Lattice

    In this work, we abstract some key ingredients in previous key establishment and public-key encryption schemes from LWE and its variants. Specifically, we explicitly formalize the building tool, referred to as...

    Zhengzhong **, Yunlei Zhao in Applied Cryptography and Network Security (2019)

  16. Chapter and Conference Paper

    Order-Revealing Encryption: File-Injection Attack and Forward Security

    Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted databases (EDBs). In this work, we study the leakage of OPE and ORE and their forward security.

    **ngchen Wang, Yunlei Zhao in Computer Security (2018)

  17. Article

    Open Access

    Regional association analysis-based fine map** of three clustered QTL for verticillium wilt resistance in cotton (G. hirsutum. L)

    Verticillium wilt is one of the most destructive diseases affecting global cotton production. The most effective way to control wilt disease has been the development of new cotton varieties that are resistant ...

    Yunlei Zhao, Hongmei Wang, Wei Chen, Pei Zhao, Haiyan Gong, **aohui Sang in BMC Genomics (2017)

  18. No Access

    Chapter and Conference Paper

    Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange

    Authenticated key exchange (AKE) plays a fundamental role in modern cryptography. Up to now, the HMQV protocol family is among the most efficient provably secure AKE protocols, which has been widely standardiz...

    Boru Gong, Yunlei Zhao in Post-Quantum Cryptography (2017)

  19. No Access

    Chapter and Conference Paper

    Compact Lossy and All-but-One Trapdoor Functions from Lattice

    Lossy trapdoor functions (LTDF) and all-but-one trapdoor functions (ABO-TDF) are fundamental cryptographic primitives. And given the recent advances in quantum computing, it would be much desirable to develop ...

    Leixiao Cheng, Quanshui Wu, Yunlei Zhao in Information Security Practice and Experience (2017)

  20. No Access

    Chapter and Conference Paper

    Efficient Tag Path Authentication Protocol with Less Tag Memory

    Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues,...

    Hongbing Wang, Yingjiu Li, Zongyang Zhang in Information Security Practice and Experien… (2016)

previous disabled Page of 3