default search action
Shi Bai 0001
Person information
- affiliation: Florida Atlantic University, Department of Mathematical Sciences, USA
Other persons with the same name
- Shi Bai — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Tianyou Bao, Pengzhou He, Shi Bai, Jiafeng Xie:
TINA: TMVP-Initiated Novel Accelerator for Lightweight Ring-LWE-Based PQC. IEEE Trans. Very Large Scale Integr. Syst. 32(5): 870-882 (2024) - [c15]Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng:
Compact Encryption Based on Module-NTRU Problems. PQCrypto (1) 2024: 371-405 - [i19]Shi Bai, Hansraj Jangir, Hao Lin, Tran Ngo, Weiqiang Wen, Jinwei Zheng:
Compact Encryption based on Module-NTRU problems. IACR Cryptol. ePrint Arch. 2024: 732 (2024) - 2023
- [c14]Shi Bai, Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo:
Concrete Analysis of Quantum Lattice Enumeration. ASIACRYPT (3) 2023: 131-166 - [i18]Shi Bai, Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo:
Concrete Analysis of Quantum Lattice Enumeration. IACR Cryptol. ePrint Arch. 2023: 1623 (2023) - 2022
- [c13]Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo:
Fiat-Shamir Signatures Based on Module-NTRU. ACISP 2022: 289-308 - 2021
- [c12]Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell:
Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance. CRYPTO (2) 2021: 732-759 - 2020
- [c11]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k). CRYPTO (2) 2020: 186-212 - [c10]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. Public Key Cryptography (2) 2020: 66-93 - [i17]Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang:
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 198 (2020) - [i16]Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen:
Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k)). IACR Cryptol. ePrint Arch. 2020: 707 (2020) - [i15]Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell:
Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance. IACR Cryptol. ePrint Arch. 2020: 1260 (2020)
2010 – 2019
- 2019
- [j6]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. J. Cryptol. 32(1): 35-83 (2019) - [c9]Shi Bai, Shaun Miller, Weiqiang Wen:
A Refined Analysis of the Cost for Solving LWE via uSVP. AFRICACRYPT 2019: 181-205 - [c8]Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and Its Applications. ASIACRYPT (1) 2019: 55-81 - [i14]Shi Bai, Shaun Miller, Weiqiang Wen:
A refined analysis of the cost for solving LWE via uSVP. IACR Cryptol. ePrint Arch. 2019: 502 (2019) - [i13]Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang:
Middle-Product Learning with Rounding Problem and its Applications. IACR Cryptol. ePrint Arch. 2019: 1001 (2019) - 2018
- [j5]Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. J. Cryptol. 31(2): 610-640 (2018) - [c7]Shi Bai, Damien Stehlé, Weiqiang Wen:
Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ. ASIACRYPT (1) 2018: 369-404 - [i12]Jinming Wen, Chao Tong, Shi Bai:
Effects of Some Lattice Reductions on the Success Probability of the Zero-Forcing Decoder. CoRR abs/1807.03872 (2018) - [i11]Shi Bai, Damien Stehlé, Weiqiang Wen:
Measuring, simulating and exploiting the head concavity phenomenon in BKZ. IACR Cryptol. ePrint Arch. 2018: 856 (2018) - 2016
- [j4]Jinming Wen, Chao Tong, Shi Bai:
Effects of Some Lattice Reductions on the Success Probability of the Zero-Forcing Decoder. IEEE Commun. Lett. 20(10): 2031-2034 (2016) - [j3]Shi Bai, Thijs Laarhoven, Damien Stehlé:
Tuple lattice sieving. LMS J. Comput. Math. 19(A): 146-162 (2016) - [j2]Shi Bai, Cyril Bouvier, Alexander Kruppa, Paul Zimmermann:
Better polynomials for GNFS. Math. Comput. 85(298): 861-873 (2016) - [c6]Martin R. Albrecht, Shi Bai, Léo Ducas:
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. CRYPTO (1) 2016: 153-178 - [c5]Shi Bai, Damien Stehlé, Weiqiang Wen:
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices. ICALP 2016: 76:1-76:12 - [i10]Martin R. Albrecht, Shi Bai, Léo Ducas:
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. IACR Cryptol. ePrint Arch. 2016: 127 (2016) - [i9]Shi Bai, Thijs Laarhoven, Damien Stehlé:
Tuple lattice sieving. IACR Cryptol. ePrint Arch. 2016: 713 (2016) - [i8]Shi Bai, Damien Stehlé, Weiqiang Wen:
Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices. IACR Cryptol. ePrint Arch. 2016: 753 (2016) - 2015
- [j1]Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root optimization of polynomials in the number field sieve. Math. Comput. 84(295): 2447-2457 (2015) - [c4]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance. ASIACRYPT (1) 2015: 3-24 - [i7]Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. IACR Cryptol. ePrint Arch. 2015: 483 (2015) - 2014
- [c3]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. ACISP 2014: 322-337 - [c2]Shi Bai, Steven D. Galbraith:
An Improved Compression Technique for Signatures Based on Learning with Errors. CT-RSA 2014: 28-47 - [i6]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Exponential-time Algorithms for Inhomogeneous-SIS. IACR Cryptol. ePrint Arch. 2014: 593 (2014) - 2013
- [i5]Shi Bai, Steven D. Galbraith:
An improved compression technique for signatures based on learning with errors. IACR Cryptol. ePrint Arch. 2013: 838 (2013) - [i4]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. IACR Cryptol. ePrint Arch. 2013: 839 (2013) - 2012
- [i3]Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root optimization of polynomials in the number field sieve. CoRR abs/1212.1958 (2012) - [i2]Shi Bai, Emmanuel Thomé, Paul Zimmermann:
Factorisation of RSA-704 with CADO-NFS. IACR Cryptol. ePrint Arch. 2012: 369 (2012) - [i1]Shi Bai, Richard P. Brent, Emmanuel Thomé:
Root Optimization of Polynomials in the Number Field Sieve. IACR Cryptol. ePrint Arch. 2012: 691 (2012)
2000 – 2009
- 2008
- [c1]Shi Bai, Richard P. Brent:
On the Efficiency of Pollard's Rho Method for Discrete Logarithms. CATS 2008: 125-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint