Follow
Huijing Gong
Huijing Gong
Intel Labs
Verified email at intel.com
Title
Cited by
Cited by
Year
LWE with Side Information: Attacks and Concrete Security Estimation.
D Dachman-Soled, L Ducas, H Gong, M Rossi
Advances in Cryptology – CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer …, 2020
1372020
Constant-round group key exchange from the ring-LWE assumption
D Apon, D Dachman-Soled, H Gong, J Katz
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
282019
Towards a Ring Analogue of the Leftover Hash Lemma
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Journal of Mathematical Cryptology 15 (1), 87-110, 2020
18*2020
(In) Security of Ring-LWE Under Partial Key Exposure
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Journal of Mathematical Cryptology 15 (1), 72-86, 2020
12*2020
Revisiting Security Estimation for LWE with Hints from a Geometric Perspective
D Dachman-Soled, H Gong, T Hanson, H Kippen
Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer …, 2023
62023
BKW Meets Fourier New Algorithms for LPN with Sparse Parities
D Dachman-Soled, H Gong, H Kippen, A Shahverdi
Theory of Cryptography Conference (TCC), 2021
42021
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application
R Agrawal, JH Ahn, F Bergamaschi, R Cammarota, JH Cheon, ...
Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023
22023
Security of NewHope Under Partial Key Exposure
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Research in Mathematics and Public Policy, 93-125, 2020
12020
Improved Robustness and Versatility of Lattice-Based Cryptography
H Gong
University of Maryland, College Park, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–9