Privacy preserving keyword searches on remote encrypted data YC Chang, M Mitzenmacher Applied Cryptography and Network Security, 442-455, 2005 | 1579 | 2005 |
Single database private information retrieval with logarithmic communication YC Chang Information Security and Privacy, 50-61, 2004 | 190 | 2004 |
Oblivious polynomial evaluation and oblivious neural learning YC Chang, CJ Lu Advances in Cryptology—Asiacrypt 2001, 369-384, 2001 | 97 | 2001 |
Oblivious polynomial evaluation and oblivious neural learning YC Chang, CJ Lu Theoretical Computer Science 341 (1-3), 39-54, 2005 | 27 | 2005 |
The impossibility of basing one-way permutations on central cryptographic primitives YC Chang, CY Hsiao, CJ Lu Journal of cryptology 19, 97-114, 2006 | 9 | 2006 |
On the impossibilities of basing one-way permutations on central cryptographic primitives YC Chang, CY Hsiao, CJ Lu Advances in Cryptology—ASIACRYPT 2002, 110-124, 2002 | 9 | 2002 |