Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kewei
    Last name: Lv
    DBLP: 02/3497
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 10  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Kewei Lv, Wenjie Qin, Ke Wang.
    Improved Security Proof for Modular Exponentiation Bits.
    Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Wenwen Wang, Kewei Lv, Jianing Liu.
    The Variant of Remote Set Problem on Lattices.
    Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kewei Lv, Si-Wei Ren, Wenjie Qin.
    The Security of Individual Bit for XTR.
    Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings 2016 (0) 2016
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Wenwen Wang, Kewei Lv.
    On Promise Problem of the Generalized Shortest Vector Problem.
    Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Yao Wang, Kewei Lv.
    The Security of Polynomial Information of Diffie-Hellman Key.
    Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Dong Su, Kewei Lv.
    Paillier's trapdoor function hides ?
    SCIENCE CHINA Information Sciences 2011, Volume 54 (0) 2011
    Conference paper
    Dong Su, Kewei Lv.
    A New Hard-Core Predicate of Paillier's Trapdoor Function.
    Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Dong Su, Kewei Lv.
    Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem.
    Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, CSO 2009, Sanya, Hainan, China, 24-26 April 2009, Volume 2 2009 (0) 2009
    Conference paper
    Kewei Lv.
    Revised Fischlin's (Blind) Signature Schemes.
    Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II 2005 (0) 2005
    Show item 1 to 10 of 10  

    Your query returned 10 matches in the database.