Follow
Jiayu Xu
Jiayu Xu
Oregon State University
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
S Jarecki, H Krawczyk, J Xu
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1782018
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)
S Jarecki, A Kiayias, H Krawczyk, J Xu
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 276-291, 2016
1252016
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
S Jarecki, A Kiayias, H Krawczyk, J Xu
Applied Cryptography and Network Security: 15th International Conference …, 2017
712017
On the security of time-lock puzzles and timed commitments
J Katz, J Loss, J Xu
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
582020
On pairing-free blind signature schemes in the algebraic group model
J Kastner, J Loss, J Xu
IACR International Conference on Public-Key Cryptography, 468-497, 2022
392022
Universally composable relaxed password authenticated key exchange
M Abdalla, M Barbosa, T Bradley, S Jarecki, J Katz, J Xu
Annual International Cryptology Conference, 278-307, 2020
392020
Password-authenticated public-key encryption
T Bradley, J Camenisch, S Jarecki, A Lehmann, G Neven, J Xu
Applied Cryptography and Network Security: 17th International Conference …, 2019
212019
Strong asymmetric PAKE based on trapdoor CKEM
T Bradley, S Jarecki, J Xu
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
192019
Round-reduced modular construction of asymmetric password-authenticated key exchange
JY Hwang, S Jarecki, T Kwon, J Lee, JS Shin, J Xu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
192018
The abe-okamoto partially blind signature scheme revisited
J Kastner, J Loss, J Xu
International Conference on the Theory and Application of Cryptology and …, 2022
142022
Algebraic adversaries in the universal composability framework
M Abdalla, M Barbosa, J Katz, J Loss, J Xu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
142021
Spreading the privacy blanket: Differentially oblivious shuffling for differential privacy
D Gordon, J Katz, M Liang, J Xu
International Conference on Applied Cryptography and Network Security, 501-520, 2022
102022
On the (In) Security of the Diffie-Hellman oblivious PRF with multiplicative blinding
S Jarecki, H Krawczyk, J Xu
IACR International Conference on Public-Key Cryptography, 380-409, 2021
92021
Highly efficient and composable password-protected secret sharing
S Jarecki, A Kiayias, H Krawczyk, J Xu
1st IEEE European Symposium on Security and Privacy (EuroS&P), 2015
82015
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure)
L Roy, J Xu
IACR International Conference on Public-Key Cryptography, 714-743, 2023
22023
How to obfuscate MPC inputs
I McQuoid, M Rosulek, J Xu
Theory of Cryptography Conference, 151-180, 2022
22022
An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions
I McQuoid, J Xu
International Conference on the Theory and Application of Cryptology and …, 2023
12023
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability
C Peikert, J Xu
Cryptographers’ Track at the RSA Conference, 84-112, 2023
12023
Under What Conditions Is Encrypted Key Exchange Actually Secure?
J Januzelli, L Roy, J Xu
Cryptology ePrint Archive, 2024
2024
On the Non-Malleability of ECVRF in the Algebraic Group Model
W Barkan-Vered, F Harding, J Keller, J Xu
Cryptology ePrint Archive, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20