Follow
Weiqiang Wen
Weiqiang Wen
Telecom Paris, Institut Polytechnique de Paris
Verified email at telecom-paris.fr - Homepage
Title
Cited by
Cited by
Year
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
S Bai, D StehlÚ, W Wen
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on theá…, 2018
472018
Faster enumeration-based lattice reduction: root Hermite factor Time
MR Albrecht, S Bai, PA Fouque, P Kirchner, D StehlÚ, W Wen
Annual International Cryptology Conference, 186-212, 2020
342020
Towards classical hardness of module-LWE: the linear rank case
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on the Theory and Application of Cryptology andá…, 2020
272020
A refined analysis of the cost for solving LWE via uSVP
S Bai, S Miller, W Wen
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference oná…, 2019
242019
On the hardness of module learning with errors with short distributions
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Journal of Cryptology 36 (1), 1, 2023
232023
Improved reduction from the bounded distance decoding problem to the unique shortest vector problem in lattices
S Bai, D StehlÚ, W Wen
Cryptology ePrint Archive, 2016
212016
On the hardness of module-LWE with binary secret
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
Cryptographers’ Track at the RSA Conference, 503-526, 2021
192021
Partial key exposure attacks on BIKE, Rainbow and NTRU
A Esser, A May, J Verbel, W Wen
Annual International Cryptology Conference, 346-375, 2022
162022
Learning with errors and extrapolated dihedral cosets
Z Brakerski, E Kirshanova, D StehlÚ, W Wen
IACR International Workshop on Public Key Cryptography, 702-727, 2018
162018
Middle-product learning with rounding problem and its applications
S Bai, K Boudgoust, D Das, A Roux-Langlois, W Wen, Z Zhang
International Conference on the Theory and Application of Cryptology andá…, 2019
102019
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
92016
Entropic hardness of module-LWE from module-NTRU
K Boudgoust, C Jeudy, A Roux-Langlois, W Wen
International Conference on Cryptology in India, 78-99, 2022
82022
One-round deniable key exchange with perfect forward security
W Wen, L Wang, M Xie
Cryptology ePrint Archive, 2014
32014
Compact Encryption based on Module-NTRU problems
S Bai, H Jangir, H Lin, T Ngo, W Wen, J Zheng
Cryptology ePrint Archive, 2024
12024
A Generic Transform from Multi-Round Interactive Proof to NIZK
PA Fouque, A Georgescu, C Qian, A Roux-Langlois, W Wen
IACR International Conference on Public-Key Cryptography, 461-481, 2023
12023
Post-quantum -to-1 trapdoor claw-free functions from extrapolated dihedral cosets
X Yan, L Wang, L Gu, Z Li, J Suo
Quantum Information Processing 23 (5), 188, 2024
2024
Quantum computation capability verification protocol for noisy intermediate-scale quantum devices with the dihedral coset problem
R Lin, W Wen
Physical Review A 106 (1), 012430, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–17