基本信息
浏览量:25
职业迁徙
个人简介
Research interests
Applied cryptography: block/stream ciphers and pseudorandom generators, s–box
design, boolean functions, statistical cryptanalysis, blockchain
Modern cryptography: weak and strong pseudorandom functions (PRFs), semantic
security, cryptographic applications of statistical learning (LPN, LWE, etc.), game–
theoretic cryptography
Post–quantum cryptography: code–based cryptosystems, general decoding attacks
(ISD), lattice–based cryptosystems, quantum algorithms
Information security: statistical database security, anonymity protocols and systems,
biometric security, multimedia security
Cyber–security: IoT security, network security protocols, wireless security, security in
M2M communications
PHY layer security: information–theoretic security, cooperative protocols (DF, AF, CJ),
game–theoretic security, partner selection schemes
Trust management: trust models, reputation management, game theory and trust,
information–theoretic trust notions
Error correcting codes: random codes, probabilistic (list) decoding and complexity
issues, codes for the wiretap channel, joint error correction and encryption
Applied cryptography: block/stream ciphers and pseudorandom generators, s–box
design, boolean functions, statistical cryptanalysis, blockchain
Modern cryptography: weak and strong pseudorandom functions (PRFs), semantic
security, cryptographic applications of statistical learning (LPN, LWE, etc.), game–
theoretic cryptography
Post–quantum cryptography: code–based cryptosystems, general decoding attacks
(ISD), lattice–based cryptosystems, quantum algorithms
Information security: statistical database security, anonymity protocols and systems,
biometric security, multimedia security
Cyber–security: IoT security, network security protocols, wireless security, security in
M2M communications
PHY layer security: information–theoretic security, cooperative protocols (DF, AF, CJ),
game–theoretic security, partner selection schemes
Trust management: trust models, reputation management, game theory and trust,
information–theoretic trust notions
Error correcting codes: random codes, probabilistic (list) decoding and complexity
issues, codes for the wiretap channel, joint error correction and encryption
研究兴趣
论文共 118 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
ELECTRONICSno. 10 (2023): 2278-2278
INTERNET OF THINGS (2023): 100968-100968
CSRpp.496-502, (2023)
Analysis, Cryptography and Information Science Series on Computers and Operations Researchpp.237-266, (2023)
引用0浏览0引用
0
0
ELECTRONICSno. 5 (2023): 1247-1247
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn