Cryptographers' World
 

Chi-Jen Lu


Author's Web Page Link

8 papers in database with 111 citations 

H-number: 5

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Yan-Cheng Chang,  Chun-Yuan Hsiao,  Chi-Jen Lu,  The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives, Journal of Cryptology, Volume 19(1), pp. 97 - 114, Springer, 2006.

[Cited 1 times ]

2. Chi-Jen Lu,  Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors, Journal of Cryptology, Volume 17(1), pp. 27 - 42, Springer, 2004.

[Cited 31 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Chi-Jen Lu,  On the Security Loss in Cryptographic Reductions, pp. 72 - 87, EUROCRYPT 2009.

[Electronic Edition][Cited 5 times ]

2. Chun-Yuan Hsiao,  Chi-Jen Lu,  Leonid Reyzin,  Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility, pp. 169 - 186, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

3. Chi-Jen Lu,  On the Complexity of Parallel Hardness Amplification for One-Way Functions, pp. 462 - 481, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

4. Yan-Cheng Chang,  Chun-Yun Hsiao,  Chi-Jen Lu,  On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives, pp. 110 - 124, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

5. Chi-Jen Lu,  Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors, pp. 257 - 271, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

6. Yan-Cheng Chang,  Chi-Jen Lu,  Oblivious Polynomial Evaluation and Oblivious Neural Learning, pp. 369 - 384, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...