Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Andrew Chi-Chih
    Last name: Yao
    DBLP: y/AndrewChiChihYao
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 148  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Privacy-Preserving Authenticated Key-Exchange Over Internet.
    IEEE Transactions on Information Forensics and Security 2014, Volume 9 (0) 2014
    Journal article
    Andrew Chi-Chih Yao.
    An n-to-1 Bidder Reduction for Multi-item Auctions and its Applications.
    CoRR 2014, Volume 0 (0) 2014
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Online/Offline Signatures for Low-Power Devices.
    IEEE Transactions on Information Forensics and Security 2013, Volume 8 (0) 2013
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    OAKE: a new family of implicitly authenticated diffie-hellman protocols.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Andrew Chi-Chih Yao.
    Quantum Computing: A Great Science in the Making.
    Theory and Applications of Models of Computation - 9th Annual Conference, TAMC 2012, Beijing, China, May 16-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Computationally-Fair Group and Identity-Based Key-Exchange.
    Theory and Applications of Models of Computation - 9th Annual Conference, TAMC 2012, Beijing, China, May 16-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao.
    Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
    J. Cryptology 2012, Volume 25 (0) 2012
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Computationally-Fair Group and Identity-Based Key-Exchange.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Digital Signatures from Challenge-Divided Sigma-Protocols.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Mingyu Xiao, Leizhen Cai, Andrew Chi-Chih Yao.
    Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum
    Algorithmica 2011, Volume 59 (0) 2011
    Journal article
    Andrew Chi-Chih Yao, Yunlei Zhao.
    A New Family of Practical Non-Malleable Diffie-Hellman Protocols
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Andrew Chi-Chih Yao, Yunlei Zhao.
    A New Family of Practical Non-Malleable Protocols.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Andrew Chi-Chih Yao, Yunlei Zhao.
    Deniable Internet Key Exchange.
    Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings 2010 (0) 2010
    Journal article
    Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao.
    Adaptive Concurrent Non-Malleability with Bare Public-Keys.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Journal article
    Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao.
    Concurrent Knowledge Extraction in the Public-Key Model.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Journal article
    Robert H. Deng, Yingjiu Li, Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao.
    A New Framework for RFID Privacy.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Andrew Chi-Chih Yao.
    Communication Complexity and Its Applications.
    Frontiers in Algorithmics, Third International Workshop, FAW 2009, Hefei, China, June 20-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Xiaoming Sun, Andrew Chi-Chih Yao.
    On the Quantum Query Complexity of Local Search in Two and Three Dimensions.
    Algorithmica 2009, Volume 55 (0) 2009
    Conference paper
    Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao.
    Concurrent Knowledge-Extraction in the Public-Key Model
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao.
    Adaptive Concurrent Non-Malleability with Bare Public-Keys
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Andrew Chi-Chih Yao, F. Frances Yao, Yunlei Zhao.
    A note on the feasibility of generalised universal composability.
    Mathematical Structures in Computer Science 2009, Volume 19 (0) 2009
    Conference paper
    Andrew Chi-Chih Yao, F. Frances Yao, Yunlei Zhao.
    A note on universal composable zero-knowledge in the common reference string model.
    Theor. Comput. Sci. 2009, Volume 410 (0) 2009
    Conference paper
    Andrew Chi-Chih Yao.
    Some Perspectives on Complexity-Based Cryptography.
    Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tartary.
    Graph Design for Secure Multiparty Computation over Non-Abelian Groups.
    Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xiaoming Sun, Andrew Chi-Chih Yao.
    Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems.
    Proceedings of the 23rd Annual IEEE Conference on Computational Complexity, CCC 2008, 23-26 June 2008, College Park, Maryland, USA 2008 (0) 2008
    Show item 1 to 25 of 148  

    Your query returned 148 matches in the database.