default search action
Yanbin Pan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. IACR Commun. Cryptol. 1(3): 29 (2024) - [j13]Gengran Hu, Yanbin Pan, Renzhang Liu:
On the SVP for low-dimensional circulant lattices. J. Comb. Optim. 47(5): 81 (2024) - [j12]Zhen Liu, Yanbin Pan, Jinwei Zheng:
Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15. J. Syst. Sci. Complex. 37(3): 1308-1325 (2024) - [j11]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 200-223 (2024) - [j10]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Partial prime factor exposure attacks on some RSA variants. Theor. Comput. Sci. 999: 114549 (2024) - [c34]Jingting Xu, Yanbin Pan:
1-Out-of-N Oblivious Transfer from MLWE. CANS (1) 2024: 123-143 - [c33]Yihang Cheng, Yansong Feng, Yanbin Pan:
Embedding Integer Lattices as Ideals into Polynomial Rings. ISSAC 2024: 170-179 - [c32]Zhen Liu, Vishakha, Jintai Ding, Chi Cheng, Yanbin Pan:
An Improved Practical Key Mismatch Attack Against NTRU. PQCrypto (1) 2024: 322-342 - [i33]Yanan Wu, Tingting Pang, Nian Li, Yanbin Pan, Xiangyong Zeng:
Infinite families of optimal and minimal codes over rings using simplicial complexes. CoRR abs/2407.09783 (2024) - [i32]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2024: 70 (2024) - [i31]Yihang Cheng, Yansong Feng, Yanbin Pan:
Embedding Integer Lattices as Ideals into Polynomial Rings. IACR Cryptol. ePrint Arch. 2024: 1041 (2024) - [i30]Hengyi Luo, Kaijie Jiang, Yanbin Pan, Anyu Wang:
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. IACR Cryptol. ePrint Arch. 2024: 1173 (2024) - [i29]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA. IACR Cryptol. ePrint Arch. 2024: 1329 (2024) - [i28]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
New Results for Coppersmith's Method from the Perspective of Sumsets Theory. IACR Cryptol. ePrint Arch. 2024: 1330 (2024) - [i27]Yansong Feng, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan:
Practical Small Private Exponent Attacks against RSA. IACR Cryptol. ePrint Arch. 2024: 1331 (2024) - 2023
- [j9]Jinzheng Cao, Jian Weng, Yanbin Pan, Qingfeng Cheng:
Generalized attack on ECDSA: known bits in arbitrary positions. Des. Codes Cryptogr. 91(11): 3803-3823 (2023) - [j8]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [c31]Yanbin Pan, Haiwen Xu, Hao Yan, Yue Wang, Jide Qian:
Building Recognition Based on Improved U-Net Model. ICBAR 2023: 650-655 - [c30]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. SAC 2023: 369-384 - [i26]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. CoRR abs/2304.08718 (2023) - [i25]Yihang Cheng, Yanbin Pan:
A Coefficient-Embedding Ideal Lattice can be Embedded into Infinitely Many Polynomial Rings. CoRR abs/2307.12497 (2023) - [i24]Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. IACR Cryptol. ePrint Arch. 2023: 1562 (2023) - 2022
- [j7]Xiulan Li, Jingguo Bi, Chengliang Tian, Hanlin Zhang, Jia Yu, Yanbin Pan:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things. IEEE Internet Things J. 9(9): 6790-6802 (2022) - [j6]Haoyu Li, Renzhang Liu, Zhen Liu, Yanbin Pan, Tianyuan Xie:
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project. J. Syst. Sci. Complex. 35(3): 1173-1190 (2022) - [j5]Yingpu Deng, Lixia Luo, Yanbin Pan, Guanju Xiao:
On Some Computational Problems in Local Fields. J. Syst. Sci. Complex. 35(3): 1191-1200 (2022) - [c29]Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li:
Handle the Traces: Revisiting the Attack on ECDSA with EHNP. ACISP 2022: 147-167 - [c28]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [c27]Jinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan:
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices. ICICS 2022: 3-18 - [i23]Xiulan Li, Yansong Feng, Yanbin Pan:
On Rangasamy's outsourcing algorithm for solving quadratic congruence equations. CoRR abs/2203.10751 (2022) - [i22]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - 2021
- [c26]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. ASIACRYPT (4) 2021: 92-121 - [c25]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the Ideal Shortest Vector Problem over Random Rational Primes. EUROCRYPT (1) 2021: 559-583 - [c24]Yiming Zhu, Zhen Liu, Yanbin Pan:
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited. ICICS (2) 2021: 249-264 - [c23]Xiulan Li, Yanbin Pan, Chengliang Tian:
Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem. ISPEC 2021: 223-241 - [c22]Jinzheng Cao, Yanbin Pan, Qingfeng Cheng:
A Lattice Reduction Algorithm Based on Sublattice BKZ. ProvSec 2021: 174-189 - [i21]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2021: 123 (2021) - [i20]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the Ideal Shortest Vector Problem over Random Rational Primes. IACR Cryptol. ePrint Arch. 2021: 245 (2021) - [i19]Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao:
Public-key Cryptosystems and Signature Schemes from p-adic Lattices. IACR Cryptol. ePrint Arch. 2021: 522 (2021) - [i18]Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan:
P/poly Invalidity of the Agr17 Functional Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1442 (2021) - 2020
- [j4]Zhen Liu, Yanbin Pan, Tianyuan Xie:
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project. IET Inf. Secur. 14(3): 313-320 (2020) - [c21]Zhaomin Yang, Tianyuan Xie, Yanbin Pan:
Lattice Klepto Revisited. AsiaCCS 2020: 867-873 - [c20]Tianyuan Xie, Yanbin Pan:
It all Started with Compression: Another Look at Reconciliation Mechanism. AsiaCCS 2020: 874-885 - [i17]Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the ideal shortest vector problem over random rational primes. CoRR abs/2004.10278 (2020)
2010 – 2019
- 2019
- [c19]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. CRYPTO (1) 2019: 297-321 - [c18]Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, Tianyuan Xie:
Breaking HK17 in Practice. ISIT 2019: 1877-1881 - [c17]Renzhang Liu, Yanbin Pan:
Computing Hermite Normal Form Faster via Solving System of Linear Equations. ISSAC 2019: 283-290 - [c16]Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-Based Proxy Encryption Scheme from ASIACCS'15. PQCrypto 2019: 153-166 - [i16]Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. IACR Cryptol. ePrint Arch. 2019: 83 (2019) - [i15]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. IACR Cryptol. ePrint Arch. 2019: 604 (2019) - [i14]Yiming Zhu, Zhen Liu, Yanbin Pan:
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited. IACR Cryptol. ePrint Arch. 2019: 1079 (2019) - 2018
- [c15]Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan:
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. ACISP 2018: 455-466 - [c14]Zhen Liu, Yanbin Pan, Tianyuan Xie:
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project. CANS 2018: 344-356 - [c13]Abderrahmane Nitaj, Yanbin Pan, Joseph Tonien:
A Generalized Attack on Some Variants of the RSA Cryptosystem. SAC 2018: 421-433 - [i13]Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie:
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project. IACR Cryptol. ePrint Arch. 2018: 20 (2018) - 2017
- [c12]Haoyu Li, Yanbin Pan:
The Search Successive Minima Problem Is Equivalent to Its Optimization Version. WISA 2017: 39-50 - [i12]Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie:
Cryptanalysis of HK17. IACR Cryptol. ePrint Arch. 2017: 1259 (2017) - 2016
- [j3]Yingpu Deng, Yanbin Pan:
The Sum of Binomial Coefficients and Integer Factorization. Integers 16: A42 (2016) - [j2]Yanbin Pan, Feng Zhang:
Solving low-density multiple subset sum problems with SVP oracle. J. Syst. Sci. Complex. 29(1): 228-242 (2016) - [c11]Yanbin Pan:
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. CT-RSA 2016: 291-304 - 2015
- [c10]Yuyun Chen, Gengran Hu, Renzhang Liu, Yanbin Pan, Shikui Shang:
Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice. ICIG (3) 2015: 169-179 - [c9]Renzhang Liu, Yanbin Pan:
Two Types of Special Bases for Integral Lattices. WISA 2015: 87-95 - 2014
- [c8]Yanbin Pan, Yingpu Deng:
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. ACISP 2014: 148-161 - [c7]Gengran Hu, Yanbin Pan, Feng Zhang:
Solving Random Subset Sum Problem by l p -norm SVP Oracle. Public Key Cryptography 2014: 399-410 - [i11]Gengran Hu, Yanbin Pan, Feng Zhang:
Solving Random Subset Sum Problem by lp-norm SVP Oracle. IACR Cryptol. ePrint Arch. 2014: 23 (2014) - [i10]Yanbin Pan:
The Security of the Hanser-Slamanig Signature Scheme Revisited. IACR Cryptol. ePrint Arch. 2014: 915 (2014) - 2013
- [c6]Feng Zhang, Yanbin Pan, Gengran Hu:
A Three-Level Sieve Algorithm for the Shortest Vector Problem. Selected Areas in Cryptography 2013: 29-47 - [c5]Gengran Hu, Yanbin Pan:
Improvements on Reductions among Different Variants of SVP and CVP. WISA 2013: 39-51 - [i9]Feng Zhang, Yanbin Pan, Gengran Hu:
A Three-Level Sieve Algorithm for the Shortest Vector Problem. IACR Cryptol. ePrint Arch. 2013: 536 (2013) - 2012
- [c4]Jintai Ding, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. ACISP 2012: 124-137 - [c3]Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu:
An efficient broadcast attack against NTRU. AsiaCCS 2012: 22-23 - [i8]Gengran Hu, Yanbin Pan:
A New Reduction from Search SVP to Optimization SVP. CoRR abs/1204.2040 (2012) - [i7]Yingpu Deng, Yanbin Pan:
An algorithm for factoring integers. IACR Cryptol. ePrint Arch. 2012: 97 (2012) - 2011
- [j1]Yanbin Pan, Yingpu Deng:
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem. IEEE Trans. Inf. Theory 57(3): 1780-1785 (2011) - [c2]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. CANS 2011: 126-137 - [c1]Yanbin Pan, Yingpu Deng:
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems. WISA 2011: 109-120 - [i6]Yanbin Pan, Feng Zhang:
A Note on the Density of the Multiple Subset Sum Problems. IACR Cryptol. ePrint Arch. 2011: 525 (2011) - [i5]Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu:
An Efficient Broadcast Attack against NTRU. IACR Cryptol. ePrint Arch. 2011: 590 (2011) - 2010
- [i4]Yanbin Pan, Yingpu Deng:
A Broadcast Attack against NTRU Using Ding's Algorithm. IACR Cryptol. ePrint Arch. 2010: 598 (2010)
2000 – 2009
- 2009
- [i3]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Cryptosystem Mixed with a Knapsack. IACR Cryptol. ePrint Arch. 2009: 337 (2009) - [i2]Yupeng Jiang, Yingpu Deng, Yanbin Pan:
Covering Radius of Two-dimensional Lattices. IACR Cryptol. ePrint Arch. 2009: 539 (2009) - 2008
- [i1]Yanbin Pan, Yingpu Deng:
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem. IACR Cryptol. ePrint Arch. 2008: 204 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint