Volgen
Jiaxin Guan
Jiaxin Guan
Geverifieerd e-mailadres voor nyu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Return of GGH15: provable security against zeroizing attacks
J Bartusek, J Guan, F Ma, M Zhandry
Theory of Cryptography Conference, 544-574, 2018
46*2018
Simple Schemes in the Bounded Storage Model
J Guan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2019
152019
Incompressible cryptography
J Guan, D Wichs, M Zhandry
Annual International Conference on the Theory and Applications of …, 2022
132022
Disappearing cryptography in the bounded storage model
J Guan, M Zhandry
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
102021
A lower bound on the length of signatures based on group actions and generic isogenies
D Boneh, J Guan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2023
62023
Streaming functional encryption
J Guan, A Korb, A Sahai
Annual International Cryptology Conference, 433-463, 2023
12023
Adaptively Secure Streaming Functional Encryption
P Datta, J Guan, A Korb, A Sahai
Cryptology ePrint Archive, 2024
2024
Cryptography against Space-Bounded Adversaries
J Guan
Princeton University, 2023
2023
Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance
J Guan, D Wichs, M Zhandry
Cryptology ePrint Archive, 2023
2023
Iterated Inhomogeneous Polynomials
J Guan, M Zhandry
Cryptology ePrint Archive, 2021
2021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–10