Volgen
Yang Cui
Yang Cui
Geverifieerd e-mailadres voor huawei.com
Titel
Geciteerd door
Geciteerd door
Jaar
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura
International Conference on Cryptology in India, 48-62, 2006
962006
Efficient hybrid encryption from ID-based encryption
M Abe, Y Cui, H Imai, E Kiltz
Designs, Codes and Cryptography 54 (3), 205-240, 2010
412010
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
Y Cui, K Kobara, K Matsuura, H Imai
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
372007
Relations among notions of security for identity based encryption schemes
N Attrapadung, Y Cui, D Galindo, G Hanaoka, I Hasuo, H Imai, ...
Latin American Symposium on Theoretical Informatics, 130-141, 2006
292006
Formal security treatments for signatures from identity-based encryption
Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang
International Conference on Provable Security, 218-227, 2007
202007
Large scale field experimental trial of downlink TDD Massive MIMO at the 4.5 GHz band
Y Saito, A Benjebbour, Y Kishiyama, X Wang, X Hou, H Jiang, L Lu, ...
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017
182017
Formal security treatments for IBE-to-signature transformation: Relations among security notions
Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang
IEICE transactions on fundamentals of electronics, communications and …, 2009
182009
Lightweight broadcast authentication protocols reconsidered
S Yamakawa, Y Cui, K Kobara, H Imai
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
152009
5G field experimental trial on frequency domain multiplexing of mixed numerology
M Iwabuchi, A Benjebbour, Y Kishiyama, D Wu, T Tian, L Gu, Y Cui, ...
2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017
112017
Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking
T Sekino, Y Cui, K Kobara, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
112010
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Field trial on millimeter wave integrated access and backhaul
T Tian, Y Dou, G Ren, L Gu, J Chen, Y Cui, T Takada, M Iwabuchi, ...
2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 1-5, 2019
92019
Evaluation of coverage and mobility for URLLC via outdoor experimental trials
M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ...
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
82018
The practicality of the keyword search using pir
R Yoshida, Y Cui, R Shigetomi, H Imai
2008 International Symposium on Information Theory and Its Applications, 1-6, 2008
82008
A generic conversion with optimal redundancy
Y Cui, K Kobara, H Imai
Cryptographers’ Track at the RSA Conference, 104-117, 2005
82005
Outdoor experimental trials of long range mobile communications using 39 GHz
A Benjebbour, M Iwabuchi, Y Kishiyama, W Guangjian, L Gu, Y Cui, ...
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
62018
5G experimental trials for ultra-reliable and low latency communications using new frame structure
M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ...
IEICE Transactions on Communications, 2018
62018
On the key-privacy issue of McEliece public-key encryption
S Yamakawa, Y Cui, K Kobara, M Hagiwara, H Imai
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007
62007
Lightweight privacy-preserving authentication protocols secure against active attack in an asymmetric way
Y Cui, K Kobara, K Matsuura, H Imai
IEICE TRANSACTIONS on Information and Systems 91 (5), 1457-1465, 2008
52008
Tag-KEM from set partial domain one-way permutations
M Abe, Y Cui, H Imai, K Kurosawa
Australasian Conference on Information Security and Privacy, 360-370, 2006
52006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20