One-Round Deniable Key Exchange with Perfect Forward Security.

Weiqiang Wen , Min Xie , Libin Wang
IACR Cryptology ePrint Archive 2014 661

2
2014
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices.

Damien Stehlé , Shi Bai , Weiqiang Wen
IACR Cryptology ePrint Archive 2016 753

2016
Towards Classical Hardness of Module-LWE: The Linear Rank Case.

Weiqiang Wen , Adeline Roux-Langlois , Katharina Boudgoust , Corentin Jeudy
IACR Cryptology ePrint Archive 2020 1020

2020
On the Hardness of Module-LWE with Binary Secret.

Weiqiang Wen , Adeline Roux-Langlois , Katharina Boudgoust , Corentin Jeudy
IACR Cryptology ePrint Archive 2021 265

2021
A Refined Analysis of the Cost for Solving LWE via uSVP

Shi Bai , Shaun Miller , Weiqiang Wen
international conference on cryptology in africa 181 -205

2
2019
Middle-Product Learning with Rounding Problem and its Applications

Shi Bai , Katharina Boudgoust , Dipayan Das , Adeline Roux-Langlois
international conference on the theory and application of cryptology and information security 2019 55 -81

2
2019
Unified security model of authenticated key exchange with specific adversarial capabilities

Weiqiang Wen , Jiaxin Pan , Libin Wang
Iet Information Security 10 ( 1) 8 -17

2
2016
Learning With Errors and Extrapolated Dihedral Cosets

Zvika Brakerski , Elena Kirshanova , Damien Stehlé , Weiqiang Wen
public key cryptography 702 -727

5
2018
Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ

Shi Bai , Damien Stehlé , Weiqiang Wen
international conference on the theory and application of cryptology and information security 369 -404

6
2018
Faster enumeration-based lattice reduction: root Hermite factor Time

Martin R Albrecht , Shi Bai , Pierre-Alain Fouque , Paul Kirchner
Springer International Publishing 186 -212

34
2020
A Generic Transform from Multi-Round Interactive Proof to NIZK

Pierre-Alain Fouque , Adela Georgescu , Chen Qian , Adeline Roux-Langlois
Springer Nature Switzerland 461 -481

1
2023
On the hardness of module learning with errors with short distributions

Katharina Boudgoust , Corentin Jeudy , Adeline Roux-Langlois , Weiqiang Wen
Journal of Cryptology 36 ( 1) 1 -1

23
2023
Entropic hardness of module-LWE from module-NTRU

Katharina Boudgoust , Corentin Jeudy , Adeline Roux-Langlois , Weiqiang Wen
Springer International Publishing 78 -99

8
2022
Compact Encryption based on Module-NTRU problems

Shi Bai , Hansraj Jangir , Hao Lin , Tran Ngo
Cryptology ePrint Archive

1
2024
Partial key exposure attacks on BIKE, Rainbow and NTRU

Andre Esser , Alexander May , Javier Verbel , Weiqiang Wen
Springer Nature Switzerland 346 -375

15
2022
Post-quantum κ-to-1 trapdoor claw-free functions from extrapolated dihedral cosets

Xingyu Yan , Licheng Wang , Lize Gu , Ziyi Li
Quantum Information Processing 23 ( 5) 188 -188

2024