Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yanbin Pan is active.

Publication


Featured researches published by Yanbin Pan.


selected areas in cryptography | 2013

A Three-Level Sieve Algorithm for the Shortest Vector Problem

Feng Zhang; Yanbin Pan; Gengran Hu

In AsiaCCS 2011, Wang et al. proposed a two-level heuristic sieve algorithm for the shortest vector problem in lattices, which improves the Nguyen-Vidick sieve algorithm. Inspired by their idea, we present a three-level sieve algorithm in this paper, which is shown to have better time complexity. More precisely, the time complexity of our algorithm is


computer and communications security | 2012

An efficient broadcast attack against NTRU

Jianwei Li; Yanbin Pan; Mingjie Liu; Guizhen Zhu


australasian conference on information security and privacy | 2012

An algebraic broadcast attack against NTRU

Jintai Ding; Yanbin Pan; Yingpu Deng

2^{0.3778n+on}


workshop on information security applications | 2011

A general NTRU-Like framework for constructing lattice-based public-key cryptosystems

Yanbin Pan; Yingpu Deng


Journal of Systems Science & Complexity | 2016

Solving low-density multiple subset sum problems with SVP oracle

Yanbin Pan; Feng Zhang

polynomial-time operations and the corresponding space complexity is


australasian conference on information security and privacy | 2014

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012

Yanbin Pan; Yingpu Deng


australasian conference on information security and privacy | 2018

Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC’08

Haoyu Li; Renzhang Liu; Abderrahmane Nitaj; Yanbin Pan

2^{0.2833n+on}


the cryptographers track at the rsa conference | 2016

Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014

Yanbin Pan


cryptology and network security | 2018

Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project.

Zhen Liu; Yanbin Pan; Tianyuan Xie

polynomially many bits.


workshop on information security applications | 2017

The Search Successive Minima Problem Is Equivalent to Its Optimization Version

Haoyu Li; Yanbin Pan

The NTRU cryptosystem is the most practical scheme known to date and has drawn considerable interest, which depends on three integer parameters (<i>N, p, q</i>) and four sets <i>L</i><sub><i>f</i></sub>, <i>L</i><sub><i>g</i></sub>, <i>L</i><sub><i>r</i></sub>, <i>L</i><sub><i>m</i></sub> of polynomials of degree <i>N</i> − 1 with small integer coefficients. We choose <i>p, q</i> such that <i>gcd</i>(<i>p, q</i>) = 1 and <i>p</i> is much smaller than <i>q</i>, denote the ring Z[<i>x</i>]/(<i>x</i><sup><i>N</i></sup> -- 1) by <i>R</i> and the multiplication in <i>R</i> by *.

Collaboration


Dive into the Yanbin Pan's collaboration.

Top Co-Authors

Avatar

Yingpu Deng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Renzhang Liu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Gengran Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Haoyu Li

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Feng Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yupeng Jiang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ziran Tu

Henan University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge