Follow
Jiayu Xu
Jiayu Xu
Oregon State University
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
S Jarecki, H Krawczyk, J Xu
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
2402018
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
S Jarecki, A Kiayias, H Krawczyk, J Xu
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 276-291, 2016
1512016
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
S Jarecki, A Kiayias, H Krawczyk, J Xu
Applied Cryptography and Network Security: 15th International Conference …, 2017
902017
On the security of time-lock puzzles and timed commitments
J Katz, J Loss, J Xu
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
852020
On pairing-free blind signature schemes in the algebraic group model
J Kastner, J Loss, J Xu
IACR International Conference on Public-Key Cryptography, 468-497, 2022
532022
Universally composable relaxed password authenticated key exchange
M Abdalla, M Barbosa, T Bradley, S Jarecki, J Katz, J Xu
Annual International Cryptology Conference, 278-307, 2020
512020
Password-authenticated public-key encryption
T Bradley, J Camenisch, S Jarecki, A Lehmann, G Neven, J Xu
Applied Cryptography and Network Security: 17th International Conference …, 2019
322019
Strong asymmetric PAKE based on trapdoor CKEM
T Bradley, S Jarecki, J Xu
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
252019
Round-reduced modular construction of asymmetric password-authenticated key exchange
JY Hwang, S Jarecki, T Kwon, J Lee, JS Shin, J Xu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
232018
The Abe-Okamoto partially blind signature scheme revisited
J Kastner, J Loss, J Xu
International Conference on the Theory and Application of Cryptology and …, 2022
212022
Algebraic adversaries in the universal composability framework
M Abdalla, M Barbosa, J Katz, J Loss, J Xu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
202021
Spreading the privacy blanket: Differentially oblivious shuffling for differential privacy
D Gordon, J Katz, M Liang, J Xu
International Conference on Applied Cryptography and Network Security, 501-520, 2022
152022
On the (In) Security of the Diffie-Hellman oblivious PRF with multiplicative blinding
S Jarecki, H Krawczyk, J Xu
IACR International Conference on Public-Key Cryptography, 380-409, 2021
112021
An efficient strong asymmetric Pake compiler instantiable from group actions
I McQuoid, J Xu
International Conference on the Theory and Application of Cryptology and …, 2023
62023
Classical and quantum security of elliptic curve VRF, via relative indifferentiability
C Peikert, J Xu
Cryptographers’ Track at the RSA Conference, 84-112, 2023
62023
Threshold pake with security against compromise of all servers
Y Gu, S Jarecki, P Kedzior, P Nazarian, J Xu
International Conference on the Theory and Application of Cryptology and …, 2025
42025
Under What Conditions Is Encrypted Key Exchange Actually Secure?
J Januzelli, L Roy, J Xu
Cryptology ePrint Archive, 2024
32024
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure)
L Roy, J Xu
IACR International Conference on Public-Key Cryptography, 714-743, 2023
32023
How to obfuscate MPC inputs
I McQuoid, M Rosulek, J Xu
Theory of Cryptography Conference, 151-180, 2022
32022
Password-protected threshold signatures
S Dziembowski, S Jarecki, P Kedzior, H Krawczyk, CN Ngo, J Xu
International Conference on the Theory and Application of Cryptology and …, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20