• Publications
  • Influence
Molecular MIMO: From Theory to Prototype
In diffusion-based molecular communication, information transport is governed by diffusion through a fluid medium. The achievable data rates for these channels are very low compared to theExpand
  • 113
  • 8
Cryptanalysis of the Multilinear Map over the Integers
We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron, Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing attack against theExpand
  • 220
  • 6
Securing smart home: Technologies, security challenges, and security requirements
Smart homes are gaining vast popularity as the most promising application of the emerging Internet of Things (IoT) technology. Exploiting the high level of connectivity present in current electronicExpand
  • 69
  • 6
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero
Let h and g be polynomials of bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given polynomial [h/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with small Euclidean norm such thatExpand
  • 29
  • 3
Boosting CUDA Applications with CPU–GPU Hybrid Computing
This paper presents a cooperative heterogeneous computing framework which enables the efficient utilization of available computing resources of host CPU cores for CUDA kernels, which are designed toExpand
  • 23
  • 2
Cryptanalysis of the New CLT Multilinear Map over the Integers
Multilinear maps serve as a basis for a wide range of cryptographic applications. The first candidate construction of multilinear maps was proposed by Garg, Gentry, and Halevi in 2013, and soonExpand
  • 189
  • 1
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
Let f and g be polynomials of a bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given the polynomial [f/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with a small Euclidean normExpand
  • 75
  • 1
Atomically Thin Transition-Metal Dinitrides: High-Temperature Ferromagnetism and Half-Metallicity.
High-temperature ferromagnetic two-dimensional (2D) materials with flat surfaces have been a long-sought goal due to their potential in spintronics applications. Through comprehensiveExpand
  • 74
  • 1
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting theExpand
  • 13
  • 1
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE
The Learning with Errors (LWE) problem has been widely used as a hardness assumption to construct public-key primitives. In this paper, we propose an efficient instantiation of a PKE scheme based onExpand
  • 24
  • 1