BibTeX records: Huaxiong Wang

download as .bib file

@article{DBLP:journals/csi/LiuQWMW24,
  author       = {Jinlu Liu and
                  Jing Qin and
                  Wenchao Wang and
                  Lin Mei and
                  Huaxiong Wang},
  title        = {Key-aggregate based access control encryption for flexible cloud data
                  sharing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {88},
  pages        = {103800},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103800},
  doi          = {10.1016/J.CSI.2023.103800},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiuQWMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChengLWZLWL24,
  author       = {Hang Cheng and
                  Xibin Li and
                  Huaxiong Wang and
                  Xinpeng Zhang and
                  Ximeng Liu and
                  Meiqing Wang and
                  Fengyong Li},
  title        = {DeepDIST: {A} Black-Box Anti-Collusion Framework for Secure Distribution
                  of Deep Models},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {1},
  pages        = {97--109},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3284914},
  doi          = {10.1109/TCSVT.2023.3284914},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChengLWZLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNPTWX24,
  author       = {San Ling and
                  Khoa Nguyen and
                  Duong Hieu Phan and
                  Khai Hanh Tang and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Fully Dynamic Attribute-Based Signatures for Circuits from Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/022},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNPTWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/XuTWAW23,
  author       = {Kexin Xu and
                  Benjamin Hong Meng Tan and
                  Li{-}Ping Wang and
                  Khin Mi Mi Aung and
                  Huaxiong Wang},
  title        = {Threshold Homomorphic Encryption From Provably Secure {NTRU}},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {12},
  pages        = {2861--2873},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac126},
  doi          = {10.1093/COMJNL/BXAC126},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/XuTWAW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingLLW23,
  author       = {Jian Ding and
                  Changlu Lin and
                  Fuchun Lin and
                  Huaxiong Wang},
  title        = {Full threshold change range of threshold changeable secret sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2421--2447},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01205-9},
  doi          = {10.1007/S10623-023-01205-9},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuTWAW23,
  author       = {Kexin Xu and
                  Benjamin Hong Meng Tan and
                  Li{-}Ping Wang and
                  Khin Mi Mi Aung and
                  Huaxiong Wang},
  title        = {Privacy-preserving outsourcing decision tree evaluation from homomorphic
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103582},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103582},
  doi          = {10.1016/J.JISA.2023.103582},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuTWAW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LibertLNW23,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size
                  Ring Signatures and Group Signatures Without Trapdoors},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {3},
  pages        = {23},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09470-6},
  doi          = {10.1007/S00145-023-09470-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LibertLNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/DingKLW23,
  author       = {Jian Ding and
                  Pinhui Ke and
                  Changlu Lin and
                  Huaxiong Wang},
  title        = {Ramp Scheme Based on {CRT} for Polynomial Ring over Finite Field},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {36},
  number       = {1},
  pages        = {129--150},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11424-022-1292-4},
  doi          = {10.1007/S11424-022-1292-4},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jossac/DingKLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/XueLDSZW23,
  author       = {Jingting Xue and
                  Shuqin Luo and
                  Qinfang Deng and
                  Lingjie Shi and
                  Xiaojun Zhang and
                  Huaxiong Wang},
  title        = {{KA:} Keyword-based auditing with frequency hiding and retrieval reliability
                  for smart government},
  journal      = {J. Syst. Archit.},
  volume       = {138},
  pages        = {102856},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102856},
  doi          = {10.1016/J.SYSARC.2023.102856},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/XueLDSZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HuWGWW23,
  author       = {Jingwei Hu and
                  Wen Wang and
                  Kris Gaj and
                  Liping Wang and
                  Huaxiong Wang},
  title        = {Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded
                  Hardware. {A} Case Study on {ROLLO}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {7},
  pages        = {2094--2110},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3225080},
  doi          = {10.1109/TC.2022.3225080},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HuWGWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/FengMWWXM23,
  author       = {Xiaoqin Feng and
                  Jianfeng Ma and
                  Huaxiong Wang and
                  Sheng Wen and
                  Yang Xiang and
                  Yinbin Miao},
  title        = {Space-Efficient Storage Structure of Blockchain Transactions Supporting
                  Secure Verification},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2631--2645},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3220664},
  doi          = {10.1109/TCC.2022.3220664},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/FengMWWXM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/XuTWAW23,
  author       = {Kexin Xu and
                  Benjamin Hong Meng Tan and
                  Li{-}Ping Wang and
                  Khin Mi Mi Aung and
                  Huaxiong Wang},
  title        = {Multi-key fully homomorphic encryption from {NTRU} and {(R)LWE} with
                  faster bootstrapping},
  journal      = {Theor. Comput. Sci.},
  volume       = {968},
  pages        = {114026},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.114026},
  doi          = {10.1016/J.TCS.2023.114026},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/XuTWAW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FengMWMLJ23,
  author       = {Xiaoqin Feng and
                  Jianfeng Ma and
                  Huaxiong Wang and
                  Yinbin Miao and
                  Ximeng Liu and
                  Zhongyuan Jiang},
  title        = {An Accessional Signature Scheme With Unmalleable Transaction Implementation
                  to Securely Redeem Cryptocurrencies},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4144--4156},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3293402},
  doi          = {10.1109/TIFS.2023.3293402},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FengMWMLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/XuSHWP23,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  title        = {Revisiting Modular Inversion Hidden Number Problem and Its Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {8},
  pages        = {5337--5356},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3263485},
  doi          = {10.1109/TIT.2023.3263485},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/XuSHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhangHGZW23,
  author       = {Xiaojun Zhang and
                  Chao Huang and
                  Dawu Gu and
                  Jingwei Zhang and
                  Huaxiong Wang},
  title        = {{BIB-MKS:} Post-Quantum Secure Biometric Identity-Based Multi-Keyword
                  Search Over Encrypted Data in Cloud Storage Systems},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {122--133},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3112779},
  doi          = {10.1109/TSC.2021.3112779},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhangHGZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Non-interactive Zero-Knowledge Functional Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {236--268},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_8},
  doi          = {10.1007/978-981-99-8733-7\_8},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KruglikLKSKLW23,
  author       = {Stanislav Kruglik and
                  Gaojun Luo and
                  Wilton Kim and
                  Shubhransh Singhvi and
                  Han Mao Kiah and
                  San Ling and
                  Huaxiong Wang},
  title        = {Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {1003--1008},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206718},
  doi          = {10.1109/ISIT54713.2023.10206718},
  timestamp    = {Mon, 28 Aug 2023 17:20:14 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KruglikLKSKLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KruglikDKW23,
  author       = {Stanislav Kruglik and
                  Son Hoang Dau and
                  Han Mao Kiah and
                  Huaxiong Wang},
  title        = {Two-Server Private Information Retrieval with Optimized Download Rate
                  and Result Verification},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {1354--1359},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206529},
  doi          = {10.1109/ISIT54713.2023.10206529},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KruglikDKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KruglikDKW23a,
  author       = {Stanislav Kruglik and
                  Son Hoang Dau and
                  Han Mao Kiah and
                  Huaxiong Wang},
  title        = {k-server Byzantine-Resistant {PIR} Scheme with Optimal Download Rate
                  and Optimal File Size},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {1532--1537},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206768},
  doi          = {10.1109/ISIT54713.2023.10206768},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KruglikDKW23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/KiahKKLW23,
  author       = {Han Mao Kiah and
                  Wilton Kim and
                  Stanislav Kruglik and
                  San Ling and
                  Huaxiong Wang},
  title        = {Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded
                  Symbols},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {1973--1978},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206838},
  doi          = {10.1109/ISIT54713.2023.10206838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/KiahKKLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11730,
  author       = {Stanislav Kruglik and
                  Son Hoang Dau and
                  Han Mao Kiah and
                  Huaxiong Wang},
  title        = {Two-Server Private Information Retrieval with Optimized Download Rate
                  and Result Verification},
  journal      = {CoRR},
  volume       = {abs/2301.11730},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11730},
  doi          = {10.48550/ARXIV.2301.11730},
  eprinttype    = {arXiv},
  eprint       = {2301.11730},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11730.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-02230,
  author       = {Stanislav Kruglik and
                  Son Hoang Dau and
                  Han Mao Kiah and
                  Huaxiong Wang},
  title        = {k-server Byzantine-Resistant {PIR} Scheme with Optimal Download Rate
                  and Optimal File Size},
  journal      = {CoRR},
  volume       = {abs/2302.02230},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.02230},
  doi          = {10.48550/ARXIV.2302.02230},
  eprinttype    = {arXiv},
  eprint       = {2302.02230},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-02230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-03442,
  author       = {Stanislav Kruglik and
                  Gaojun Luo and
                  Wilton Kim and
                  Shubhransh Singhvi and
                  Han Mao Kiah and
                  San Ling and
                  Huaxiong Wang},
  title        = {Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes},
  journal      = {CoRR},
  volume       = {abs/2305.03442},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.03442},
  doi          = {10.48550/ARXIV.2305.03442},
  eprinttype    = {arXiv},
  eprint       = {2305.03442},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-03442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LamLZWWG23,
  author       = {Kwok{-}Yan Lam and
                  Xianhui Lu and
                  Linru Zhang and
                  Xiangning Wang and
                  Huaxiong Wang and
                  Si Qi Goh},
  title        = {Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/647},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LamLZWWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuCDW23,
  author       = {Jingwei Hu and
                  Junyan Chen and
                  Wangchen Dai and
                  Huaxiong Wang},
  title        = {Fully Homomorphic Encryption-Based Protocols for Enhanced Private
                  Set Intersection Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1407},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1407},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuCDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  title        = {Non-Interactive Zero-Knowledge Functional Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1759},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1759},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/JiangCLWX22,
  author       = {Shaoquan Jiang and
                  Yeow Meng Chee and
                  San Ling and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {A new framework for deniable secure key exchange},
  journal      = {Inf. Comput.},
  volume       = {285},
  number       = {Part},
  pages        = {104866},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ic.2022.104866},
  doi          = {10.1016/J.IC.2022.104866},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/JiangCLWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HuangZCWZCWL22,
  author       = {Chenyu Huang and
                  Yongjun Zhao and
                  Huangxun Chen and
                  Xu Wang and
                  Qian Zhang and
                  Yanjiao Chen and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam},
  title        = {ZkRep: {A} Privacy-Preserving Scheme for Reputation-Based Blockchain
                  System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {6},
  pages        = {4330--4342},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3105273},
  doi          = {10.1109/JIOT.2021.3105273},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HuangZCWZCWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DingKLW22,
  author       = {Jian Ding and
                  Pinhui Ke and
                  Changlu Lin and
                  Huaxiong Wang},
  title        = {Bivariate polynomial-based secret sharing schemes with secure secret
                  reconstruction},
  journal      = {Inf. Sci.},
  volume       = {593},
  pages        = {398--414},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.02.005},
  doi          = {10.1016/J.INS.2022.02.005},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/DingKLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XuSNW22,
  author       = {Yanhong Xu and
                  Reihaneh Safavi{-}Naini and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Traceable policy-based signatures and instantiation from lattices},
  journal      = {Inf. Sci.},
  volume       = {607},
  pages        = {1286--1310},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.06.031},
  doi          = {10.1016/J.INS.2022.06.031},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XuSNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ZhangHGZXW22,
  author       = {Xiaojun Zhang and
                  Chao Huang and
                  Dawu Gu and
                  Jingwei Zhang and
                  Jingting Xue and
                  Huaxiong Wang},
  title        = {Privacy-preserving statistical analysis over multi-dimensional aggregated
                  data in edge computing-based smart grid systems},
  journal      = {J. Syst. Archit.},
  volume       = {127},
  pages        = {102508},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102508},
  doi          = {10.1016/J.SYSARC.2022.102508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ZhangHGZXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChengLWFWZ22,
  author       = {Hang Cheng and
                  Ximeng Liu and
                  Huaxiong Wang and
                  Yan Fang and
                  Meiqing Wang and
                  Xiaopeng Zhao},
  title        = {SecureAD: {A} Secure Video Anomaly Detection Framework on Convolutional
                  Neural Network in Edge Computing Environment},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1413--1427},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2990946},
  doi          = {10.1109/TCC.2020.2990946},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ChengLWFWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangWTXW22,
  author       = {Chenyu Wang and
                  Ding Wang and
                  Yi Tu and
                  Guoai Xu and
                  Huaxiong Wang},
  title        = {Understanding Node Capture Attacks in User Authentication Schemes
                  for Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {507--523},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2974220},
  doi          = {10.1109/TDSC.2020.2974220},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangWTXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangSQW22,
  author       = {Haining Yang and
                  Ye Su and
                  Jing Qin and
                  Huaxiong Wang},
  title        = {Privacy-Preserving Outsourced Inner Product Computation on Encrypted
                  Database},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1320--1337},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3001345},
  doi          = {10.1109/TDSC.2020.3001345},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangSQW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuYWNWKL22,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Xiaorong Ke and
                  Yining Liu},
  title        = {Secure Deterministic Wallet and Stealth Address: Key-Insulated and
                  Privacy-Preserving Signature Scheme With Publicly Derived Public Key},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {2934--2951},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3078463},
  doi          = {10.1109/TDSC.2021.3078463},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuYWNWKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DingLWX22,
  author       = {Jian Ding and
                  Changlu Lin and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Communication Efficient Secret Sharing With Small Share Size},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {68},
  number       = {1},
  pages        = {659--669},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIT.2021.3123692},
  doi          = {10.1109/TIT.2021.3123692},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DingLWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhangZXWZ22,
  author       = {Xiaojun Zhang and
                  Jie Zhao and
                  Chunxiang Xu and
                  Huaxiong Wang and
                  Yuan Zhang},
  title        = {{DOPIV:} Post-Quantum Secure Identity-Based Data Outsourcing with
                  Public Integrity Verification in Cloud Storage},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {334--345},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2942297},
  doi          = {10.1109/TSC.2019.2942297},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhangZXWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangWW22,
  author       = {Liang Feng Zhang and
                  Huaxiong Wang and
                  Li{-}Ping Wang},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Byzantine-Robust Private Information Retrieval with Low Communication
                  and Efficient Decoding},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1079--1085},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3497773},
  doi          = {10.1145/3488932.3497773},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XuSWH22,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Huaxiong Wang and
                  Lei Hu},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH}
                  Key Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {771--799},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_26},
  doi          = {10.1007/978-3-031-22969-5\_26},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XuSWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AungLJTWY22,
  author       = {Khin Mi Mi Aung and
                  Enhui Lim and
                  Sim Jun Jie and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang and
                  Sze Ling Yeo},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Field Instruction Multiple Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {611--641},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_21},
  doi          = {10.1007/978-3-031-06944-4\_21},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AungLJTWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangW22,
  author       = {Liang Feng Zhang and
                  Huaxiong Wang},
  title        = {Multi-Server Verifiable Computation of Low-Degree Polynomials},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {596--613},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833792},
  doi          = {10.1109/SP46214.2022.9833792},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03251,
  author       = {Han Mao Kiah and
                  Wilton Kim and
                  Stanislav Kruglik and
                  San Ling and
                  Huaxiong Wang},
  title        = {Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded
                  Symbols},
  journal      = {CoRR},
  volume       = {abs/2209.03251},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03251},
  doi          = {10.48550/ARXIV.2209.03251},
  eprinttype    = {arXiv},
  eprint       = {2209.03251},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03251.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AungLJTWY22,
  author       = {Khin Mi Mi Aung and
                  Enhui Lim and
                  Sim Jun Jie and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang and
                  Sze Ling Yeo},
  title        = {Field Instruction Multiple Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {771},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/771},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AungLJTWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuWGCW22,
  author       = {Jingwei Hu and
                  Wen Wang and
                  Kris Gaj and
                  Donglong Chen and
                  Huaxiong Wang},
  title        = {Universal Gaussian Elimination Hardware for Cryptographic Purposes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/928},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuWGCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00220WH22,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Huaxiong Wang and
                  Lei Hu},
  title        = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH}
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1239},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00220WH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangHXZZW21,
  author       = {Xiaojun Zhang and
                  Chao Huang and
                  Chunxiang Xu and
                  Yuan Zhang and
                  Jingwei Zhang and
                  Huaxiong Wang},
  title        = {Key-Leakage Resilient Encrypted Data Aggregation With Lightweight
                  Verification in Fog-Assisted Smart Grids},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {8234--8245},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3047958},
  doi          = {10.1109/JIOT.2020.3047958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangHXZZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ChangEFLSW21,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  Adamas Aqsa Fahreza and
                  San Ling and
                  Janusz Szmidt and
                  Huaxiong Wang},
  title        = {Binary de Bruijn Sequences via Zech's Logarithms},
  journal      = {{SN} Comput. Sci.},
  volume       = {2},
  number       = {4},
  pages        = {314},
  year         = {2021},
  url          = {https://doi.org/10.1007/s42979-021-00683-9},
  doi          = {10.1007/S42979-021-00683-9},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/ChangEFLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhangZXLWZ21,
  author       = {Xiaojun Zhang and
                  Jie Zhao and
                  Chunxiang Xu and
                  Hongwei Li and
                  Huaxiong Wang and
                  Yuan Zhang},
  title        = {{CIPPPA:} Conditional Identity Privacy-Preserving Public Auditing
                  for Cloud-Based WBANs Against Malicious Auditors},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1362--1375},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2927219},
  doi          = {10.1109/TCC.2019.2927219},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhangZXLWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertLMNW21,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Adaptive oblivious transfer with access control from lattice assumptions},
  journal      = {Theor. Comput. Sci.},
  volume       = {891},
  pages        = {210--229},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.09.001},
  doi          = {10.1016/J.TCS.2021.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertLMNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangXWZW21,
  author       = {Xiaojun Zhang and
                  Chunxiang Xu and
                  Huaxiong Wang and
                  Yuan Zhang and
                  Shixiong Wang},
  title        = {{FS-PEKS:} Lattice-Based Forward Secure Public-Key Encryption with
                  Keyword Search for Cloud-Assisted Industrial Internet of Things},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1019--1032},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2914117},
  doi          = {10.1109/TDSC.2019.2914117},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangXWZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChengWLFWZ21,
  author       = {Hang Cheng and
                  Huaxiong Wang and
                  Ximeng Liu and
                  Yan Fang and
                  Meiqing Wang and
                  Xiaojun Zhang},
  title        = {Person Re-Identification over Encrypted Outsourced Surveillance Videos},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1456--1473},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2923653},
  doi          = {10.1109/TDSC.2019.2923653},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChengWLFWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TanLWRA21,
  author       = {Benjamin Hong Meng Tan and
                  Hyung Tae Lee and
                  Huaxiong Wang and
                  Shu Qin Ren and
                  Khin Mi Mi Aung},
  title        = {Efficient Private Comparison Queries Over Encrypted Databases Using
                  Fully Homomorphic Encryption With Finite Fields},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2861--2874},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2967740},
  doi          = {10.1109/TDSC.2020.2967740},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TanLWRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21,
  author       = {Khoa Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang and
                  Yanhong Xu and
                  Neng Zeng},
  editor       = {Juan A. Garay},
  title        = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based
                  Instantiation},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {678--708},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_24},
  doi          = {10.1007/978-3-030-75248-4\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/LingNPTW21,
  author       = {San Ling and
                  Khoa Nguyen and
                  Duong Hieu Phan and
                  Hanh Tang and
                  Huaxiong Wang},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Zero-Knowledge Proofs for Committed Symmetric Boolean Functions},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {339--359},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_18},
  doi          = {10.1007/978-3-030-81293-5\_18},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/LingNPTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-1,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3},
  doi          = {10.1007/978-3-030-92062-3},
  isbn         = {978-3-030-92061-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-2,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3},
  doi          = {10.1007/978-3-030-92075-3},
  isbn         = {978-3-030-92074-6},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-3,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4},
  doi          = {10.1007/978-3-030-92078-4},
  isbn         = {978-3-030-92077-7},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-4,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5},
  doi          = {10.1007/978-3-030-92068-5},
  isbn         = {978-3-030-92067-8},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-04194,
  author       = {Jenn{-}Bing Ong and
                  Wee Keong Ng and
                  Ivan Tjuawinata and
                  Chao Li and
                  Jielin Yang and
                  Sai None Myne and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam and
                  C.{-}C. Jay Kuo},
  title        = {Protecting Big Data Privacy Using Randomized Tensor Network Decomposition
                  and Dispersed Tensor Computation},
  journal      = {CoRR},
  volume       = {abs/2101.04194},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.04194},
  eprinttype    = {arXiv},
  eprint       = {2101.04194},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-04194.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSSWXZ21,
  author       = {Khoa Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang and
                  Yanhong Xu and
                  Neng Zeng},
  title        = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based
                  Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/226},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSSWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWL21,
  author       = {Yongjun Zhao and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam},
  title        = {Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward
                  and Backward Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/786},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZuoLYLSW21,
  author       = {Cong Zuo and
                  Shangqi Lai and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Jun Shao and
                  Huaxiong Wang},
  title        = {Searchable Encryption for Conjunctive Queries with Extended Forward
                  and Backward Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1585},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1585},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZuoLYLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaLCSCW20,
  author       = {Jinhua Ma and
                  Shih{-}Ya Lin and
                  Xin Chen and
                  Hung{-}Min Sun and
                  Yeh{-}Cheng Chen and
                  Huaxiong Wang},
  title        = {A Blockchain-Based Application System for Product Anti-Counterfeiting},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {77642--77652},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2972026},
  doi          = {10.1109/ACCESS.2020.2972026},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaLCSCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WenZWMG20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Yinbin Miao and
                  Zheng Gong},
  title        = {Intersection-policy private mutual authentication from authorized
                  private set intersection},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {2},
  pages        = {122101},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-9907-x},
  doi          = {10.1007/S11432-019-9907-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LeeLSWY20,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang and
                  Taek{-}Young Youn},
  title        = {Public key encryption with equality test in the standard model},
  journal      = {Inf. Sci.},
  volume       = {516},
  pages        = {89--108},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.12.023},
  doi          = {10.1016/J.INS.2019.12.023},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LeeLSWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WenZWGMD20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Zheng Gong and
                  Yinbin Miao and
                  Yuqiao Deng},
  title        = {A new secret handshake scheme with multi-symptom intersection for
                  mobile healthcare social networks},
  journal      = {Inf. Sci.},
  volume       = {520},
  pages        = {142--154},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.02.007},
  doi          = {10.1016/J.INS.2020.02.007},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangSQWS20,
  author       = {Haining Yang and
                  Ye Su and
                  Jing Qin and
                  Huaxiong Wang and
                  Yongcheng Song},
  title        = {Verifiable inner product computation on outsourced database for authenticated
                  multi-user data sharing},
  journal      = {Inf. Sci.},
  volume       = {539},
  pages        = {295--311},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.05.118},
  doi          = {10.1016/J.INS.2020.05.118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangSQWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HuBSZLW20,
  author       = {Jingwei Hu and
                  Marco Baldi and
                  Paolo Santini and
                  Neng Zeng and
                  San Ling and
                  Huaxiong Wang},
  title        = {Lightweight Key Encapsulation Using {LDPC} Codes on FPGAs},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {3},
  pages        = {327--341},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2019.2948323},
  doi          = {10.1109/TC.2019.2948323},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/HuBSZLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/HuLCBLW20,
  author       = {Jingwei Hu and
                  Yao Liu and
                  Ray C. C. Cheung and
                  Shivam Bhasin and
                  San Ling and
                  Huaxiong Wang},
  title        = {Compact Code-Based Signature for Reconfigurable Devices With Side
                  Channel Resilience},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {67-I},
  number       = {7},
  pages        = {2305--2316},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSI.2020.2984026},
  doi          = {10.1109/TCSI.2020.2984026},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/HuLCBLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SongHMWW20,
  author       = {Yongcheng Song and
                  Xinyi Huang and
                  Yi Mu and
                  Wei Wu and
                  Huaxiong Wang},
  title        = {A code-based signature scheme from the Lyubashevsky framework},
  journal      = {Theor. Comput. Sci.},
  volume       = {835},
  pages        = {15--30},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.05.011},
  doi          = {10.1016/J.TCS.2020.05.011},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SongHMWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/EzermanLLNW20,
  author       = {Martianus Frederic Ezerman and
                  Hyung Tae Lee and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Provably Secure Group Signature Schemes From Code-Based Assumptions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {9},
  pages        = {5754--5773},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2976073},
  doi          = {10.1109/TIT.2020.2976073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/EzermanLLNW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhaoTLWLX20,
  author       = {Jun Zhao and
                  Jing Tang and
                  Zengxiang Li and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam and
                  Kaiping Xue},
  title        = {An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving
                  a Neat Bound},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {179--189},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00039},
  doi          = {10.1109/ICDCS47774.2020.00039},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhaoTLWLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/LinCGSW20,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Leakage-Resilient Secret Sharing in Non-Compartmentalized Models},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {7:1--7:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.7},
  doi          = {10.4230/LIPICS.ITC.2020.7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icits/LinCGSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/YangS0MW20,
  author       = {Haining Yang and
                  Ye Su and
                  Jing Qin and
                  Jinhua Ma and
                  Huaxiong Wang},
  editor       = {Xiaofeng Chen and
                  Hongyang Yan and
                  Qiben Yan and
                  Xiangliang Zhang},
  title        = {An Efficient Public Batch Auditing Scheme for Data Integrity in Standard
                  Model},
  booktitle    = {Machine Learning for Cyber Security - Third International Conference,
                  {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12486},
  pages        = {578--592},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62223-7\_51},
  doi          = {10.1007/978-3-030-62223-7\_51},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/YangS0MW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JiangGHNW20,
  author       = {Shaoquan Jiang and
                  Guang Gong and
                  Jingnan He and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based
                  Constructions in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {396--427},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_14},
  doi          = {10.1007/978-3-030-45374-9\_14},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/JiangGHNW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2020-1,
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4},
  doi          = {10.1007/978-3-030-64837-4},
  isbn         = {978-3-030-64836-7},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2020-2,
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3},
  doi          = {10.1007/978-3-030-64834-3},
  isbn         = {978-3-030-64833-6},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2020-3,
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4},
  doi          = {10.1007/978-3-030-64840-4},
  isbn         = {978-3-030-64839-8},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2020-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2020,
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4},
  doi          = {10.1007/978-3-030-62576-4},
  isbn         = {978-3-030-62575-7},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00033,
  author       = {Yanhong Xu and
                  Reihaneh Safavi{-}Naini and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Traceable Policy-Based Signatures and Instantiation from Lattices},
  journal      = {CoRR},
  volume       = {abs/2007.00033},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00033},
  eprinttype    = {arXiv},
  eprint       = {2007.00033},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangGHNW20,
  author       = {Shaoquan Jiang and
                  Guang Gong and
                  Jingnan He and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based
                  Constructions in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/140},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangGHNW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLSW20,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang},
  title        = {Insecurity of the Public Key Encryption with Filtered Equality Test
                  Proposed by Huang et al},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/749},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimLLRTW19,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Shu Qin Ren and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Search Condition-Hiding Query Evaluation on Encrypted Databases},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {161283--161295},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2951695},
  doi          = {10.1109/ACCESS.2019.2951695},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimLLRTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/WangQLW19,
  author       = {Shixiong Wang and
                  Longjiang Qu and
                  Chao Li and
                  Huaxiong Wang},
  title        = {Further improvement of factoring {N} = p\({}^{\mbox{r}}\) q\({}^{\mbox{s}}\)
                  with partial known bits},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {1},
  pages        = {121--135},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019007},
  doi          = {10.3934/AMC.2019007},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/WangQLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LingNWZ19,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  title        = {Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based
                  Instantiation},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1849--1862},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz079},
  doi          = {10.1093/COMJNL/BXZ079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LingNWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChangELW19,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {On binary de Bruijn sequences from LFSRs with arbitrary characteristic
                  polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1137--1160},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0509-y},
  doi          = {10.1007/S10623-018-0509-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChangELW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuEW19,
  author       = {Yali Liu and
                  Martianus Frederic Ezerman and
                  Huaxiong Wang},
  title        = {Double verification protocol via secret sharing for low-cost {RFID}
                  tags},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {90},
  pages        = {118--128},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.07.004},
  doi          = {10.1016/J.FUTURE.2018.07.004},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuEW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/YuYW19,
  author       = {Yong Yu and
                  Guomin Yang and
                  Huaxiong Wang},
  title        = {Preface: Special Issue Cryptography and Provable Security},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {30},
  number       = {4},
  pages        = {489--492},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0129054119020027},
  doi          = {10.1142/S0129054119020027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/YuYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangWX19,
  author       = {Xiaojun Zhang and
                  Huaxiong Wang and
                  Chunxiang Xu},
  title        = {Identity-based key-exposure resilient cloud storage public auditing
                  scheme from lattices},
  journal      = {Inf. Sci.},
  volume       = {472},
  pages        = {223--234},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.013},
  doi          = {10.1016/J.INS.2018.09.013},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangTWXMC19,
  author       = {Xiaojun Zhang and
                  Yao Tang and
                  Huaxiong Wang and
                  Chunxiang Xu and
                  Yinbin Miao and
                  Hang Cheng},
  title        = {Lattice-based proxy-oriented identity-based encryption with keyword
                  search for cloud storage},
  journal      = {Inf. Sci.},
  volume       = {494},
  pages        = {193--207},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.04.051},
  doi          = {10.1016/J.INS.2019.04.051},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangTWXMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LeeLSW19,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang},
  title        = {Public key encryption with equality test from generic assumptions
                  in the random oracle model},
  journal      = {Inf. Sci.},
  volume       = {500},
  pages        = {15--33},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.05.026},
  doi          = {10.1016/J.INS.2019.05.026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LeeLSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhangCLQW19,
  author       = {Kai Zhang and
                  Jie Chen and
                  Hyung Tae Lee and
                  Haifeng Qian and
                  Huaxiong Wang},
  title        = {Efficient public key encryption with equality test in the standard
                  model},
  journal      = {Theor. Comput. Sci.},
  volume       = {755},
  pages        = {65--80},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.06.048},
  doi          = {10.1016/J.TCS.2018.06.048},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhangCLQW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LibertLMNW19,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-knowledge arguments for matrix-vector relations and lattice-based
                  group encryption},
  journal      = {Theor. Comput. Sci.},
  volume       = {759},
  pages        = {72--97},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2019.01.003},
  doi          = {10.1016/J.TCS.2019.01.003},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LibertLMNW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AungLTW19,
  author       = {Khin Mi Mi Aung and
                  Hyung Tae Lee and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Fully homomorphic encryption over the integers for non-binary plaintexts
                  without the sparse subset sum problem},
  journal      = {Theor. Comput. Sci.},
  volume       = {771},
  pages        = {49--70},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.11.014},
  doi          = {10.1016/J.TCS.2018.11.014},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AungLTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LingNWX19,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Lattice-based group signatures: Achieving full dynamicity (and deniability)
                  with ease},
  journal      = {Theor. Comput. Sci.},
  volume       = {783},
  pages        = {71--94},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2019.03.023},
  doi          = {10.1016/J.TCS.2019.03.023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LingNWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLLTW19,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Private Compound Wildcard Queries Using Fully Homomorphic Encryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {743--756},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2763593},
  doi          = {10.1109/TDSC.2017.2763593},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KimLLTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenTWZ19,
  author       = {Khoa Nguyen and
                  Hanh Tang and
                  Huaxiong Wang and
                  Neng Zeng},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {New Code-Based Privacy-Preserving Cryptographic Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {25--55},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_2},
  doi          = {10.1007/978-3-030-34621-8\_2},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenTWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WangZHWL19,
  author       = {Shixiong Wang and
                  Juanyang Zhang and
                  Jingnan He and
                  Huaxiong Wang and
                  Chao Li},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {99--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_6},
  doi          = {10.1007/978-3-030-31578-8\_6},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/WangZHWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LinLWZ19,
  author       = {Fuchun Lin and
                  San Ling and
                  Huaxiong Wang and
                  Neng Zeng},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Threshold Changeable Ramp Secret Sharing},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_17},
  doi          = {10.1007/978-3-030-31578-8\_17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LinLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Xu0HWP19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {New Results on Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {297--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_11},
  doi          = {10.1007/978-3-030-26948-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LingNWX19,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  editor       = {Mitsuru Matsui},
  title        = {Accountable Tracing Signatures from Lattices},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {556--576},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_28},
  doi          = {10.1007/978-3-030-12612-4\_28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LingNWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuNYWW19,
  author       = {Zhen Liu and
                  Khoa Nguyen and
                  Guomin Yang and
                  Huaxiong Wang and
                  Duncan S. Wong},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {726--746},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_35},
  doi          = {10.1007/978-3-030-29959-0\_35},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LiuYWNW19,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly
                  Derived Public Key},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {215--230},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00025},
  doi          = {10.1109/EUROSP.2019.00025},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/LiuYWNW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfpt/HuWCW19,
  author       = {Jingwei Hu and
                  Wen Wang and
                  Ray C. C. Cheung and
                  Huaxiong Wang},
  title        = {Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: {A}
                  Case Study on {BIKE}},
  booktitle    = {International Conference on Field-Programmable Technology, {FPT} 2019,
                  Tianjin, China, December 9-13, 2019},
  pages        = {231--234},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICFPT47387.2019.00035},
  doi          = {10.1109/ICFPT47387.2019.00035},
  timestamp    = {Mon, 19 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfpt/HuWCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/LinCGSW19,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Avrim Blum},
  title        = {Secret Sharing with Binary Shares},
  booktitle    = {10th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2019, January 10-12, 2019, San Diego, California, {USA}},
  series       = {LIPIcs},
  volume       = {124},
  pages        = {53:1--53:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2019.53},
  doi          = {10.4230/LIPICS.ITCS.2019.53},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/LinCGSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LinSCW19,
  author       = {Fuchun Lin and
                  Reihaneh Safavi{-}Naini and
                  Mahdi Cheraghchi and
                  Huaxiong Wang},
  title        = {Non-Malleable Codes against Active Physical Layer Adversary},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {2753--2757},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849438},
  doi          = {10.1109/ISIT.2019.8849438},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/LinSCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/LinLSW19,
  author       = {Fuchun Lin and
                  San Ling and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Non-malleable Coding for Arbitrary Varying Channels},
  booktitle    = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden,
                  August 25-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITW44776.2019.8989115},
  doi          = {10.1109/ITW44776.2019.8989115},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/LinLSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertNTW19,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Zero-Knowledge Elementary Databases with More Expressive Queries},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {255--285},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_9},
  doi          = {10.1007/978-3-030-17253-4\_9},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertNTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/LingNWX19,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Forward-Secure Group Signatures from Lattices},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_3},
  doi          = {10.1007/978-3-030-25510-7\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/LingNWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/WangWWXSW19,
  author       = {Chenyu Wang and
                  Ding Wang and
                  Haowei Wang and
                  Guoai Xu and
                  Jing Sun and
                  Huaxiong Wang},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {Cloud-Aided Privacy Preserving User Authentication and Key Agreement
                  Protocol for Internet of Things},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_8},
  doi          = {10.1007/978-981-15-0758-8\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/WangWWXSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-00240,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Accountable Tracing Signatures from Lattices},
  journal      = {CoRR},
  volume       = {abs/1901.00240},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.00240},
  eprinttype    = {arXiv},
  eprint       = {1901.00240},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-00240.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06195,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Non-Malleable Secret Sharing against Affine Tampering},
  journal      = {CoRR},
  volume       = {abs/1902.06195},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06195},
  eprinttype    = {arXiv},
  eprint       = {1902.06195},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06195.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-11066,
  author       = {Fuchun Lin and
                  San Ling and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Non-malleable Coding for Arbitrary Varying Channels},
  journal      = {CoRR},
  volume       = {abs/1906.11066},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.11066},
  eprinttype    = {arXiv},
  eprint       = {1906.11066},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-11066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-04472,
  author       = {Martianus Frederic Ezerman and
                  Hyung Tae Lee and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Provably Secure Group Signature Schemes from Code-Based Assumptions},
  journal      = {CoRR},
  volume       = {abs/1909.04472},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.04472},
  eprinttype    = {arXiv},
  eprint       = {1909.04472},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-04472.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-06587,
  author       = {Jun Zhao and
                  Jing Tang and
                  Zengxiang Li and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam and
                  Kaiping Xue},
  title        = {An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving
                  a Neat Bound},
  journal      = {CoRR},
  volume       = {abs/1909.06587},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.06587},
  eprinttype    = {arXiv},
  eprint       = {1909.06587},
  timestamp    = {Tue, 28 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-06587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanLWRA19,
  author       = {Benjamin Hong Meng Tan and
                  Hyung Tae Lee and
                  Huaxiong Wang and
                  Shu Qin Ren and
                  Khin Mi Mi Aung},
  title        = {Efficient Private Comparison Queries over Encrypted Databases using
                  Fully Homomorphic Encryption with Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TanLWRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTWZ19,
  author       = {Khoa Nguyen and
                  Hanh Tang and
                  Huaxiong Wang and
                  Neng Zeng},
  title        = {New Code-Based Privacy-Preserving Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/513},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu0HWP19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  title        = {New Results on Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu0HWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZHWL19,
  author       = {Shixiong Wang and
                  Juanyang Zhang and
                  Jingnan He and
                  Huaxiong Wang and
                  Chao Li},
  title        = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {917},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/917},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZHWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ChangELW18,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {Construction of de Bruijn sequences from product of two irreducible
                  polynomials},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {2},
  pages        = {251--275},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0219-8},
  doi          = {10.1007/S12095-017-0219-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ChangELW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ChangELW18a,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {The cycle structure of {LFSR} with arbitrary characteristic polynomial
                  over finite fields},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {6},
  pages        = {1183--1202},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0273-2},
  doi          = {10.1007/S12095-017-0273-2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ChangELW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LingNRW18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Adeline Roux{-}Langlois and
                  Huaxiong Wang},
  title        = {A lattice-based group signature scheme with verifier-local revocation},
  journal      = {Theor. Comput. Sci.},
  volume       = {730},
  pages        = {1--20},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.03.027},
  doi          = {10.1016/J.TCS.2018.03.027},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LingNRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLLW18,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {On the Efficiency of FHE-Based Private Queries},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {357--363},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2568182},
  doi          = {10.1109/TDSC.2016.2568182},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KimLLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeWZ18,
  author       = {Hyung Tae Lee and
                  Huaxiong Wang and
                  Kai Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Security Analysis and Modification of ID-Based Encryption with Equality
                  Test from {ACISP} 2017},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {780--786},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_46},
  doi          = {10.1007/978-3-319-93638-3\_46},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertLNW18,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Lattice-Based Zero-Knowledge Arguments for Integer Relations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {700--732},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_24},
  doi          = {10.1007/978-3-319-96881-0\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertLNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNWX18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Constant-Size Group Signatures from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {58--88},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_3},
  doi          = {10.1007/978-3-319-76581-5\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07844,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  title        = {Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based
                  Instantiation},
  journal      = {CoRR},
  volume       = {abs/1801.07844},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.07844},
  eprinttype    = {arXiv},
  eprint       = {1801.07844},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-07844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-08323,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Forward-Secure Group Signatures from Lattices},
  journal      = {CoRR},
  volume       = {abs/1801.08323},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.08323},
  eprinttype    = {arXiv},
  eprint       = {1801.08323},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-08323.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-08737,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability)
                  with Ease},
  journal      = {CoRR},
  volume       = {abs/1801.08737},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.08737},
  eprinttype    = {arXiv},
  eprint       = {1801.08737},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-08737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-05004,
  author       = {Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Password Policy Check from Lattices},
  journal      = {CoRR},
  volume       = {abs/1802.05004},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.05004},
  eprinttype    = {arXiv},
  eprint       = {1802.05004},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-05004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02974,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Secret Sharing with Binary Shares},
  journal      = {CoRR},
  volume       = {abs/1808.02974},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.02974},
  eprinttype    = {arXiv},
  eprint       = {1808.02974},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-02974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Constant-size Group Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/034},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeWZ18,
  author       = {Hyung Tae Lee and
                  Huaxiong Wang and
                  Kai Zhang},
  title        = {Security Analysis and Modification of ID-Based Encryption with Equality
                  Test from {ACISP} 2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLNW18,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Lattice-Based Zero-Knowledge Arguments for Integer Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/716},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinCGSW18,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Secret Sharing with Binary Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinCGSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWNW18,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly
                  Derived Public Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/956},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX18a,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Accountable Tracing Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1251},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1251},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XuLWZH17,
  author       = {Chang Xu and
                  Rongxing Lu and
                  Huaxiong Wang and
                  Liehuang Zhu and
                  Cheng Huang},
  title        = {{TJET:} Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle
                  Platooning},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {26973--26989},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2753778},
  doi          = {10.1109/ACCESS.2017.2753778},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XuLWZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XuLWZH17,
  author       = {Chang Xu and
                  Rongxing Lu and
                  Huaxiong Wang and
                  Liehuang Zhu and
                  Cheng Huang},
  title        = {{PAVS:} {A} New Privacy-Preserving Data Aggregation Scheme for Vehicle
                  Sensing Systems},
  journal      = {Sensors},
  volume       = {17},
  number       = {3},
  pages        = {500},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17030500},
  doi          = {10.3390/S17030500},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/XuLWZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LingNWX17,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {293--312},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_15},
  doi          = {10.1007/978-3-319-61204-1\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LingNWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertLNW17,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to
                  E-Cash},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {304--335},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_11},
  doi          = {10.1007/978-3-319-70700-6\_11},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertLNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW17,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Adaptive Oblivious Transfer with Access Control from Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {533--563},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_19},
  doi          = {10.1007/978-3-319-70694-8\_19},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NguyenTW17,
  author       = {Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Zero-Knowledge Password Policy Check from Lattices},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_6},
  doi          = {10.1007/978-3-319-69659-1\_6},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/NguyenTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LingNWZ17,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Revocable Predicate Encryption from Lattices},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {305--326},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_19},
  doi          = {10.1007/978-3-319-68637-0\_19},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LingNWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChangEFLW17,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  Adamas Aqsa Fahreza and
                  San Ling and
                  Huaxiong Wang},
  title        = {Large Order Binary de Bruijn Sequences via Zech's Logarithms},
  journal      = {CoRR},
  volume       = {abs/1705.03150},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.03150},
  eprinttype    = {arXiv},
  eprint       = {1705.03150},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChangEFLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05462,
  author       = {Fuchun Lin and
                  Reihaneh Safavi{-}Naini and
                  Mahdi Cheraghchi and
                  Huaxiong Wang},
  title        = {Non-Malleable Codes with Leakage and Applications to Secure Communication},
  journal      = {CoRR},
  volume       = {abs/1708.05462},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05462},
  eprinttype    = {arXiv},
  eprint       = {1708.05462},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05462.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX17,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/353},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTW17,
  author       = {Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Password Policy Check from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/854},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLNW17,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to
                  E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/856},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LeeLSW16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang},
  title        = {{CCA2} Attack and Modification of Huang \emph{et al}.'s Public Key
                  Encryption with Authorized Equality Test},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1689--1694},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw033},
  doi          = {10.1093/COMJNL/BXW033},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LeeLSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChengNW16,
  author       = {Shantian Cheng and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Policy-based signature scheme from lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {81},
  number       = {1},
  pages        = {43--74},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0126-y},
  doi          = {10.1007/S10623-015-0126-Y},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChengNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LeeLSW16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang},
  title        = {Semi-generic construction of public key encryption and identity-based
                  encryption with equality test},
  journal      = {Inf. Sci.},
  volume       = {373},
  pages        = {419--440},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.09.013},
  doi          = {10.1016/J.INS.2016.09.013},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LeeLSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LeeLW16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {Analysis of Gong et al.'s CCA2-secure homomorphic encryption},
  journal      = {Theor. Comput. Sci.},
  volume       = {640},
  pages        = {104--114},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.06.014},
  doi          = {10.1016/J.TCS.2016.06.014},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LeeLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW16,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based
                  Group Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {101--131},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_4},
  doi          = {10.1007/978-3-662-53890-6\_4},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW16a,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures
                  from Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {373--403},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_13},
  doi          = {10.1007/978-3-662-53890-6\_13},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NguyenWZ16,
  author       = {Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Server-Aided Revocable Identity-Based Encryption from Lattices},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {107--123},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_7},
  doi          = {10.1007/978-3-319-48965-0\_7},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/NguyenWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LibertLNW16,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size
                  Ring Signatures and Group Signatures Without Trapdoors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {1--31},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_1},
  doi          = {10.1007/978-3-662-49896-5\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LibertLNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DengGLWY16,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge
                  Proofs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_13},
  doi          = {10.1007/978-3-319-44618-9\_13},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DengGLWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChangELW16,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {Construction of de Bruijn Sequences from Product of Two Irreducible
                  Polynomials},
  journal      = {CoRR},
  volume       = {abs/1604.04351},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.04351},
  eprinttype    = {arXiv},
  eprint       = {1604.04351},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChangELW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChangELW16a,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic
                  Polynomials},
  journal      = {CoRR},
  volume       = {abs/1611.10088},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.10088},
  eprinttype    = {arXiv},
  eprint       = {1611.10088},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChangELW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChangELW16b,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {The Cycle Structure of {LFSR} with Arbitrary Characteristic Polynomial
                  over Finite Fields},
  journal      = {CoRR},
  volume       = {abs/1612.07928},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.07928},
  eprinttype    = {arXiv},
  eprint       = {1612.07928},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChangELW16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLW16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLMNW16,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures
                  from Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/101},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLMNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLLRTW16,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Shu Qin Ren and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Better Security for Queries on Encrypted Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLLRTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLMNW16a,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based
                  Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/879},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLMNW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenWZ16,
  author       = {Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  title        = {Server-Aided Revocable Identity-Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/974},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLSWY16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang and
                  Taek{-}Young Youn},
  title        = {Public Key Encryption with Equality Test in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLSWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/OrgunEPCSW15,
  author       = {Mehmet A. Orgun and
                  Atilla El{\c{c}}i and
                  Josef Pieprzyk and
                  Alexander G. Chefranov and
                  Rajan Shankaran and
                  Huaxiong Wang},
  title        = {Special issue on trust and security in wireless sensor networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {15},
  pages        = {3791--3793},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3497},
  doi          = {10.1002/CPE.3497},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/OrgunEPCSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunHCWLW15,
  author       = {Hung{-}Min Sun and
                  Bing{-}Zhe He and
                  Chien{-}Ming Chen and
                  Tsu{-}Yang Wu and
                  Chia{-}Hsien Lin and
                  Huaxiong Wang},
  title        = {A provable authenticated group key agreement protocol for mobile environment},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {224--237},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.01.037},
  doi          = {10.1016/J.INS.2015.01.037},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunHCWLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/EzermanLLNW15,
  author       = {Martianus Frederic Ezerman and
                  Hyung Tae Lee and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {A Provably Secure Group Signature Scheme from Code-Based Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {260--285},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_12},
  doi          = {10.1007/978-3-662-48797-6\_12},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/EzermanLLNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LinLWZ15,
  author       = {Changlu Lin and
                  Fucai Luo and
                  Huaxiong Wang and
                  Yan Zhu},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {A Provable Data Possession Scheme with Data Hierarchy in Cloud},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {301--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_18},
  doi          = {10.1007/978-3-319-38898-4\_18},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LinLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNW15,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Jonathan Katz},
  title        = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_19},
  doi          = {10.1007/978-3-662-46447-2\_19},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNW15,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/014},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EzermanLLNW15,
  author       = {Martianus Frederic Ezerman and
                  Hyung Tae Lee and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {A Provably Secure Group Signature Scheme from Code-Based Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/479},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EzermanLLNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLLW15,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {On the Efficiency of FHE-based Private Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/EmamiLNPW14,
  author       = {Sareh Emami and
                  San Ling and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {The resistance of {PRESENT-80} against related-key differential attacks},
  journal      = {Cryptogr. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {171--187},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12095-013-0096-8},
  doi          = {10.1007/S12095-013-0096-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/EmamiLNPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenLLW14,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {The relation and transformation between hierarchical inner product
                  encryption and spatial encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {71},
  number       = {2},
  pages        = {347--364},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9742-y},
  doi          = {10.1007/S10623-012-9742-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenLLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenLLSW14,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Le Su and
                  Huaxiong Wang},
  title        = {Spatial encryption supporting non-monotone access structure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {731--746},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9823-6},
  doi          = {10.1007/S10623-013-9823-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenLLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenLLWW14,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Hoeteck Wee},
  title        = {Shorter identity-based encryption via asymmetric pairings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {911--947},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9834-3},
  doi          = {10.1007/S10623-013-9834-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenLLWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/0001CZYWS14,
  author       = {Chien{-}Ming Chen and
                  Shuai{-}Min Chen and
                  Xinying Zheng and
                  Lijun Yan and
                  Huaxiong Wang and
                  Hung{-}Min Sun},
  title        = {Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost
                  {RFID}},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {5},
  number       = {4},
  pages        = {642--648},
  year         = {2014},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2014/vol5/JIH-MSP-2014-04-006.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/0001CZYWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/LingSW14,
  author       = {San Ling and
                  Igor E. Shparlinski and
                  Huaxiong Wang},
  title        = {On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random
                  Function},
  journal      = {Math. Comput.},
  volume       = {83},
  number       = {289},
  pages        = {2429--2434},
  year         = {2014},
  url          = {https://doi.org/10.1090/S0025-5718-2014-02794-4},
  doi          = {10.1090/S0025-5718-2014-02794-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/LingSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/EmamiLNPW14,
  author       = {Sareh Emami and
                  San Ling and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Low Probability Differentials and the Cryptanalysis of Full-Round
                  {CLEFIA-128}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_8},
  doi          = {10.1007/978-3-662-45611-8\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/EmamiLNPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangloisLNW14,
  author       = {Adeline Langlois and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Hugo Krawczyk},
  title        = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {345--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_20},
  doi          = {10.1007/978-3-642-54631-0\_20},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LangloisLNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BoschPLLTWHJ14,
  author       = {Christoph B{\"{o}}sch and
                  Andreas Peter and
                  Bram Leenders and
                  Hoon Wei Lim and
                  Qiang Tang and
                  Huaxiong Wang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Distributed Searchable Symmetric Encryption},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {330--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890956},
  doi          = {10.1109/PST.2014.6890956},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BoschPLLTWHJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisLNW14,
  author       = {Adeline Langlois and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Lattice-based Group Signature Scheme with Verifier-local Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/033},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisLNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EmamiLNPW14,
  author       = {Sareh Emami and
                  San Ling and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Low Probability Differentials and the Cryptanalysis of Full-Round
                  {CLEFIA-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EmamiLNPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/CheeFLWZ13,
  author       = {Yeow Meng Chee and
                  Tao Feng and
                  San Ling and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Query-Efficient Locally Decodable Codes of Subexponential Length},
  journal      = {Comput. Complex.},
  volume       = {22},
  number       = {1},
  pages        = {159--189},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00037-011-0017-1},
  doi          = {10.1007/S00037-011-0017-1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cc/CheeFLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CruzW13,
  author       = {Romar dela Cruz and
                  Huaxiong Wang},
  title        = {Cheating-immune secret sharing schemes from codes and cumulative arrays},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {67--83},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0076-4},
  doi          = {10.1007/S12095-012-0076-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CruzW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AsgharLPW13,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Cryptanalysis of the convex hull click human identification protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {83--96},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0161-x},
  doi          = {10.1007/S10207-012-0161-X},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AsgharLPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CheeLWZ13,
  author       = {Yeow Meng Chee and
                  San Ling and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Upper Bounds on Matching Families in BBZ\({}_{\mbox{pq}}\)\({}^{\mbox{n}}\)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {8},
  pages        = {5131--5139},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2013.2257918},
  doi          = {10.1109/TIT.2013.2257918},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/CheeLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YiLW13,
  author       = {Xun Yi and
                  San Ling and
                  Huaxiong Wang},
  title        = {Efficient Two-Server Password-Only Authenticated Key Exchange},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {9},
  pages        = {1773--1782},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2012.282},
  doi          = {10.1109/TPDS.2012.282},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/YiLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KutznerNPW13,
  author       = {Sebastian Kutzner and
                  Phuong Ha Nguyen and
                  Axel Poschmann and
                  Huaxiong Wang},
  editor       = {Emmanuel Prouff},
  title        = {On 3-Share Threshold Implementations for 4-Bit S-boxes},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_7},
  doi          = {10.1007/978-3-642-40026-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/KutznerNPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChenCLZFLW13,
  author       = {Cheng Chen and
                  Jie Chen and
                  Hoon Wei Lim and
                  Zhenfeng Zhang and
                  Dengguo Feng and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Ed Dawson},
  title        = {Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures
                  and Threshold Access Structures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_4},
  doi          = {10.1007/978-3-642-36095-4\_4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChenCLZFLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/SuLLW13,
  author       = {Le Su and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Revocable {IBE} Systems with Almost Constant-Size Key Update},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {168--185},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_10},
  doi          = {10.1007/978-3-319-04873-4\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/SuLLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNSW13,
  author       = {San Ling and
                  Khoa Nguyen and
                  Damien Stehl{\'{e}} and
                  Huaxiong Wang},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Improved Zero-Knowledge Proofs of Knowledge for the {ISIS} Problem,
                  and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_8},
  doi          = {10.1007/978-3-642-36362-7\_8},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-0980,
  author       = {Yeow Meng Chee and
                  San Ling and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Upper Bounds on Matching Families in {\textdollar}{\textbackslash}mathbb\{Z\}{\_}\{pq\}{\^{}}n{\textdollar}},
  journal      = {CoRR},
  volume       = {abs/1301.0980},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.0980},
  eprinttype    = {arXiv},
  eprint       = {1301.0980},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-0980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuLLW13,
  author       = {Le Su and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {Revocable {IBE} Systems with Almost Constant-size Key Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuLLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EmamiLNPW13,
  author       = {Sareh Emami and
                  San Ling and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {The Resistance of {PRESENT-80} Against Related-Key Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EmamiLNPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/BeimelCWZ12,
  author       = {Amos Beimel and
                  Yeow Meng Chee and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Communication-efficient distributed oblivious transfer},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {78},
  number       = {4},
  pages        = {1142--1157},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jcss.2012.02.002},
  doi          = {10.1016/J.JCSS.2012.02.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/BeimelCWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/CheeWZ12,
  author       = {Yeow Meng Chee and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {On the Bringer-Chabanne {EPIR} protocol for polynomial evaluation},
  journal      = {J. Math. Cryptol.},
  volume       = {5},
  number       = {3-4},
  pages        = {277--301},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2012-0001},
  doi          = {10.1515/JMC-2012-0001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/CheeWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DesmedtPSSTWY12,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Xiaoming Sun and
                  Christophe Tartary and
                  Huaxiong Wang and
                  Andrew Chi{-}Chih Yao},
  title        = {Graph Coloring Applied to Secure Computation in Non-Abelian Groups},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {4},
  pages        = {557--600},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-011-9104-3},
  doi          = {10.1007/S00145-011-9104-3},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DesmedtPSSTWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/LingSSW12,
  author       = {San Ling and
                  Igor E. Shparlinski and
                  Ron Steinfeld and
                  Huaxiong Wang},
  title        = {On the modular inversion hidden number problem},
  journal      = {J. Symb. Comput.},
  volume       = {47},
  number       = {4},
  pages        = {358--367},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jsc.2011.09.002},
  doi          = {10.1016/J.JSC.2011.09.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/LingSSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhangCLLW12,
  author       = {Zhifang Zhang and
                  Yeow Meng Chee and
                  San Ling and
                  Mulan Liu and
                  Huaxiong Wang},
  title        = {Threshold changeable secret sharing schemes revisited},
  journal      = {Theor. Comput. Sci.},
  volume       = {418},
  pages        = {106--115},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.tcs.2011.09.027},
  doi          = {10.1016/J.TCS.2011.09.027},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhangCLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LimKW12,
  author       = {Hoon Wei Lim and
                  Florian Kerschbaum and
                  Huaxiong Wang},
  title        = {Workflow Signatures for Business Process Compliance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {756--769},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.38},
  doi          = {10.1109/TDSC.2012.38},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LimKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLLWN12,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Khoa Nguyen},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Revocable Identity-Based Encryption from Lattices},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {390--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_29},
  doi          = {10.1007/978-3-642-31448-3\_29},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLLWN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuHNWL12,
  author       = {Hongjun Wu and
                  Tao Huang and
                  Phuong Ha Nguyen and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Differential Attacks against Stream Cipher {ZUC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_17},
  doi          = {10.1007/978-3-642-34961-4\_17},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuHNWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NguyenRMW12,
  author       = {Phuong Ha Nguyen and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  Huaxiong Wang},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Improved Differential Cache Attacks on {SMS4}},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_3},
  doi          = {10.1007/978-3-642-38519-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/NguyenRMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001PSLPW12,
  author       = {Lei Wei and
                  Thomas Peyrin and
                  Przemyslaw Sokolowski and
                  San Ling and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Anne Canteaut},
  title        = {On the (In)Security of {IDEA} in Various Hashing Modes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {163--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_10},
  doi          = {10.1007/978-3-642-34047-5\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001PSLPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/ChenLLWW12,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Hoeteck Wee},
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Shorter {IBE} and Signatures via Asymmetric Pairings},
  booktitle    = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  pages        = {122--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36334-4\_8},
  doi          = {10.1007/978-3-642-36334-4\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/ChenLLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldLPTW12,
  author       = {Ron Steinfeld and
                  San Ling and
                  Josef Pieprzyk and
                  Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {{NTRUCCA:} How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {353--371},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_21},
  doi          = {10.1007/978-3-642-30057-8\_21},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldLPTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TangLW12,
  author       = {ZhaoHui Tang and
                  Hoon Wei Lim and
                  Huaxiong Wang},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Revisiting a Secret Sharing Approach to Network Codes},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {300--317},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_20},
  doi          = {10.1007/978-3-642-33272-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TangLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-5190,
  author       = {Yeow Meng Chee and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {On Bringer-Chabanne {EPIR} Protocol for Polynomial Evaluation},
  journal      = {CoRR},
  volume       = {abs/1208.5190},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.5190},
  eprinttype    = {arXiv},
  eprint       = {1208.5190},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-5190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-6441,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Le Su and
                  Huaxiong Wang},
  title        = {Anonymous and Adaptively Secure Revocable {IBE} with Constant Size
                  Public Parameters},
  journal      = {CoRR},
  volume       = {abs/1210.6441},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.6441},
  eprinttype    = {arXiv},
  eprint       = {1210.6441},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-6441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLWW12,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Hoeteck Wee},
  title        = {Shorter {IBE} and Signatures via Asymmetric Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiPSLPW12,
  author       = {Lei Wei and
                  Thomas Peyrin and
                  Przemyslaw Sokolowski and
                  San Ling and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {On the (In)Security of {IDEA} in Various Hashing Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiPSLPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengGLWY12,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  title        = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable
                  Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutznerNPW12,
  author       = {Sebastian Kutzner and
                  Phuong Ha Nguyen and
                  Axel Poschmann and
                  Huaxiong Wang},
  title        = {On 3-share Threshold Implementations for 4-bit S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutznerNPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNSW12,
  author       = {San Ling and
                  Khoa Nguyen and
                  Damien Stehl{\'{e}} and
                  Huaxiong Wang},
  title        = {Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem,
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/569},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/AsgharPW11,
  author       = {Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {On the Hardness of the Sum of \emph{k} Mins Problem},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {10},
  pages        = {1652--1660},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxr070},
  doi          = {10.1093/COMJNL/BXR070},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/AsgharPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/PieprzykWZ11,
  author       = {Josef Pieprzyk and
                  Huaxiong Wang and
                  Xian{-}Mo Zhang},
  title        = {M{\"{o}}bius transforms, coincident Boolean functions and non-coincidence
                  property of Boolean functions},
  journal      = {Int. J. Comput. Math.},
  volume       = {88},
  number       = {7},
  pages        = {1398--1416},
  year         = {2011},
  url          = {https://doi.org/10.1080/00207160.2010.509428},
  doi          = {10.1080/00207160.2010.509428},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/PieprzykWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/TartaryWZ11,
  author       = {Christophe Tartary and
                  Huaxiong Wang and
                  Yun Zhang},
  title        = {An Efficient and Information Theoretically Secure Rational Secret
                  Sharing Scheme Based on Symmetric bivariate polynomials},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {22},
  number       = {6},
  pages        = {1395--1416},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0129054111008775},
  doi          = {10.1142/S0129054111008775},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/TartaryWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PoschmannMKLWL11,
  author       = {Axel Poschmann and
                  Amir Moradi and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Huaxiong Wang and
                  San Ling},
  title        = {Side-Channel Resistant Crypto for Less than 2, 300 {GE}},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {322--345},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9086-6},
  doi          = {10.1007/S00145-010-9086-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PoschmannMKLWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TartaryWL11,
  author       = {Christophe Tartary and
                  Huaxiong Wang and
                  San Ling},
  title        = {Authentication of Digital Streams},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {9},
  pages        = {6285--6303},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2161960},
  doi          = {10.1109/TIT.2011.2161960},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/TartaryWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenWW11,
  author       = {Phuong Ha Nguyen and
                  Hongjun Wu and
                  Huaxiong Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_5},
  doi          = {10.1007/978-3-642-22497-3\_5},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangTW11,
  author       = {Yun Zhang and
                  Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder
                  Theorem},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_17},
  doi          = {10.1007/978-3-642-22497-3\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {433--438},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_31},
  doi          = {10.1007/978-3-642-22497-3\_31},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/CheeWZ11,
  author       = {Yeow Meng Chee and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  editor       = {Bin Fu and
                  Ding{-}Zhu Du},
  title        = {Oblivious Transfer and n-Variate Linear Function Evaluation},
  booktitle    = {Computing and Combinatorics - 17th Annual International Conference,
                  {COCOON} 2011, Dallas, TX, USA, August 14-16, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6842},
  pages        = {627--637},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22685-4\_54},
  doi          = {10.1007/978-3-642-22685-4\_54},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/CheeWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11,
  author       = {Amir Moradi and
                  Axel Poschmann and
                  San Ling and
                  Christof Paar and
                  Huaxiong Wang},
  editor       = {Kenneth G. Paterson},
  title        = {Pushing the Limits: {A} Very Compact and a Threshold Implementation
                  of {AES}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {69--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_6},
  doi          = {10.1007/978-3-642-20465-4\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YangDWTW11,
  author       = {Guomin Yang and
                  Shanshan Duan and
                  Duncan S. Wong and
                  Chik How Tan and
                  Huaxiong Wang},
  editor       = {George Danezis},
  title        = {Authenticated Key Exchange under Bad Randomness},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_10},
  doi          = {10.1007/978-3-642-27576-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/YangDWTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NguyenRW11,
  author       = {Phuong Ha Nguyen and
                  Matthew J. B. Robshaw and
                  Huaxiong Wang},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {On Related-Key Attacks and {KASUMI:} The Case of {A5/3}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {146--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_12},
  doi          = {10.1007/978-3-642-25578-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NguyenRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codcry/2011,
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7},
  doi          = {10.1007/978-3-642-20901-7},
  isbn         = {978-3-642-20900-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/201},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangTW11,
  author       = {Yun Zhang and
                  Christophe Tartary and
                  Huaxiong Wang},
  title        = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder
                  Theorem (Revised Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLW11,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {The Relation and Transformation between Hierarchical Inner Product
                  Encryption and Spatial Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLWN11,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Khoa Nguyen},
  title        = {Revocable Identity-Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/583},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLWN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLW11a,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size
                  Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDWTW11,
  author       = {Guomin Yang and
                  Shanshan Duan and
                  Duncan S. Wong and
                  Chik How Tan and
                  Huaxiong Wang},
  title        = {Authenticated Key Exchange under Bad Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/SunWKP10,
  author       = {Hung{-}Min Sun and
                  Huaxiong Wang and
                  Bying{-}He Ku and
                  Josef Pieprzyk},
  title        = {Decomposition Construction for Secret Sharing Schemes with Graph Access
                  Structures in Polynomial Time},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {24},
  number       = {2},
  pages        = {617--638},
  year         = {2010},
  url          = {https://doi.org/10.1137/080733802},
  doi          = {10.1137/080733802},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/SunWKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenWWL10,
  author       = {Phuong Ha Nguyen and
                  Lei Wei and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {On Multidimensional Linear Cryptanalysis},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_3},
  doi          = {10.1007/978-3-642-14081-5\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenWWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AsgharPW10,
  author       = {Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step
                  Algorithm},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {349--366},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_21},
  doi          = {10.1007/978-3-642-13708-2\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AsgharPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoLRW10,
  author       = {Jian Guo and
                  San Ling and
                  Christian Rechberger and
                  Huaxiong Wang},
  editor       = {Masayuki Abe},
  title        = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full
                  Tiger, and Improved Results on {MD4} and {SHA-2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {56--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_4},
  doi          = {10.1007/978-3-642-17373-8\_4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoLRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/WangWP10,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Colin Boyd and
                  Willy Susilo},
  title        = {Secure Coprocessor-based Private Information Retrieval without Periodical
                  Preprocessing},
  booktitle    = {8th Australasian Information Security Conference 2010, {AISC} 2010,
                  Brisbane, Australia, January 2010},
  series       = {{CRPIT}},
  volume       = {105},
  pages        = {5--11},
  publisher    = {Australian Computer Society},
  year         = {2010},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wang.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/WangWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoschmannLW10,
  author       = {Axel Poschmann and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {256 Bit Standardized Crypto for 650 {GE} - {GOST} Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_15},
  doi          = {10.1007/978-3-642-15031-9\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoschmannLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JiangW10,
  author       = {Shaoquan Jiang and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk},
  title        = {Plaintext-Awareness of Hybrid Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_5},
  doi          = {10.1007/978-3-642-11925-5\_5},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JiangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AsgharLPW10,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Cryptanalysis of the Convex Hull Click Human Identification Protocol},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {24--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_3},
  doi          = {10.1007/978-3-642-18178-8\_3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AsgharLPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-1617,
  author       = {Yeow Meng Chee and
                  Tao Feng and
                  San Ling and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Query-Efficient Locally Decodable Codes of Subexponential Length},
  journal      = {CoRR},
  volume       = {abs/1008.1617},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.1617},
  eprinttype    = {arXiv},
  eprint       = {1008.1617},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-1617.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/CheeFLWZ10,
  author       = {Yeow Meng Chee and
                  Tao Feng and
                  San Ling and
                  Huaxiong Wang and
                  Liang Feng Zhang},
  title        = {Query-Efficient Locally Decodable Codes},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-173}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/173},
  eprinttype    = {ECCC},
  eprint       = {TR10-173},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/CheeFLWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LRW10,
  author       = {Jian Guo and
                  San Ling and
                  Christian Rechberger and
                  Huaxiong Wang},
  title        = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full
                  Tiger, and Improved Results on {MD4} and {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharPW10,
  author       = {Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharLPW10,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Cryptanalysis of the Convex Hull Click Human Identification Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharLPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/DesmedtDTW09,
  author       = {Yvo Desmedt and
                  Niels Duif and
                  Henk van Tilborg and
                  Huaxiong Wang},
  title        = {Bounds and constructions for key distribution schemes},
  journal      = {Adv. Math. Commun.},
  volume       = {3},
  number       = {3},
  pages        = {273--293},
  year         = {2009},
  url          = {https://doi.org/10.3934/amc.2009.3.273},
  doi          = {10.3934/AMC.2009.3.273},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/DesmedtDTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YeWPZ09,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  title        = {Unconditionally secure disjointness tests for private datasets},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {225--235},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023471},
  doi          = {10.1504/IJACT.2009.023471},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YeWPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiAPSSW09,
  author       = {Shujun Li and
                  Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Roland Schmitz and
                  Huaxiong Wang},
  title        = {On the Security of {PAS} (Predicate-Based Authentication Service)},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.27},
  doi          = {10.1109/ACSAC.2009.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiAPSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09,
  author       = {Alex Biryukov and
                  Praveen Gauravaram and
                  Jian Guo and
                  Dmitry Khovratovich and
                  San Ling and
                  Krystian Matusiewicz and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {LAKE} Hash Family},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_10},
  doi          = {10.1007/978-3-642-03317-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Pasupathinathan09,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Privacy Enhancements for Hardware-Based Security Modules},
  booktitle    = {e-Business and Telecommunications - 6th International Joint Conference,
                  {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {130},
  pages        = {224--236},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-20077-9\_16},
  doi          = {10.1007/978-3-642-20077-9\_16},
  timestamp    = {Sat, 19 Oct 2019 20:35:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Pasupathinathan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YeSPW09,
  author       = {Qingsong Ye and
                  Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Efficient Fuzzy Matching and Intersection on Private Datasets},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {211--228},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_15},
  doi          = {10.1007/978-3-642-14423-3\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YeSPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ChenLPWX09,
  author       = {Hao Chen and
                  San Ling and
                  Carles Padr{\'{o}} and
                  Huaxiong Wang and
                  Chaoping Xing},
  editor       = {Matthew Geoffrey Parker},
  title        = {Key Predistribution Schemes and One-Time Broadcast Encryption Schemes
                  from Algebraic Geometry Codes},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_16},
  doi          = {10.1007/978-3-642-10868-6\_16},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/ChenLPWX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_9},
  doi          = {10.1007/978-3-642-05445-7\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW09,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Certified Pseudonyms Colligated with Master Secret Key},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {190--197},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codcry/2009,
  editor       = {Yeow Meng Chee and
                  Chao Li and
                  San Ling and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Coding and Cryptology, Second International Workshop, {IWCC} 2009,
                  Zhangjiajie, China, June 1-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5557},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01877-0},
  doi          = {10.1007/978-3-642-01877-0},
  isbn         = {978-3-642-01813-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMKLW09,
  author       = {Jian Guo and
                  Krystian Matusiewicz and
                  Lars R. Knudsen and
                  San Ling and
                  Huaxiong Wang},
  title        = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiAPSSW09,
  author       = {Shujun Li and
                  Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Roland Schmitz and
                  Huaxiong Wang},
  title        = {On the Security of {PAS} (Predicate-based Authentication Service)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiAPSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/PasupathinathanPW08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Security Analysis of Australian and {E.U.} E-passport Implementation},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {40},
  number       = {3},
  pages        = {187--206},
  year         = {2008},
  url          = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.3.187.pdf},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/PasupathinathanPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/YuanDWP08,
  author       = {Jin Yuan and
                  Cunsheng Ding and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Permutation polynomials of the form (x\({}^{\mbox{p}}\)-x+delta)\({}^{\mbox{s}}\)+L(x)},
  journal      = {Finite Fields Their Appl.},
  volume       = {14},
  number       = {2},
  pages        = {482--493},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ffa.2007.05.003},
  doi          = {10.1016/J.FFA.2007.05.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/YuanDWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TartaryZLWP08,
  author       = {Christophe Tartary and
                  Sujing Zhou and
                  Dongdai Lin and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Analysis of bilinear pairing-based accumulator for identity escrowing},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {99--107},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070091},
  doi          = {10.1049/IET-IFS:20070091},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TartaryWP08,
  author       = {Christophe Tartary and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {A coding approach to the multicast stream authentication problem},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {4},
  pages        = {265--283},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0048-4},
  doi          = {10.1007/S10207-007-0048-4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TartaryWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/YangWWD08,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  title        = {Two-factor mutual authentication based on smart cards and passwords},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {74},
  number       = {7},
  pages        = {1160--1172},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jcss.2008.04.002},
  doi          = {10.1016/J.JCSS.2008.04.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/YangWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/WangWW08,
  author       = {Yan Wang and
                  Duncan S. Wong and
                  Huaxiong Wang},
  title        = {Employ a mobile agent for making a payment},
  journal      = {Mob. Inf. Syst.},
  volume       = {4},
  number       = {1},
  pages        = {51--68},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/402519},
  doi          = {10.1155/2008/402519},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/WangWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangW08,
  author       = {Huaxiong Wang and
                  Duncan S. Wong},
  title        = {On Secret Reconstruction in Secret Sharing Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {1},
  pages        = {473--480},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2007.911179},
  doi          = {10.1109/TIT.2007.911179},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YeWT08,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Christophe Tartary},
  title        = {Privacy-Preserving Distributed Set Intersection},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1332--1339},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.134},
  doi          = {10.1109/ARES.2008.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YeWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWWG08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Huaxiong Wang and
                  Jian Guo},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {On the Improvement of the {BDF} Attack on {LSBS-RSA}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_7},
  doi          = {10.1007/978-3-540-70500-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YeWPZ08,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient Disjointness Tests for Private Datasets},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_12},
  doi          = {10.1007/978-3-540-70500-0\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YeWPZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/WangWP08,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Improvement of a Dynamic Accumulator at {ICICS} 07 and Its Application
                  in Multi-user Keyword-Based Retrieval on Encrypted Data},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {1381--1386},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.98},
  doi          = {10.1109/APSCC.2008.98},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/WangWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangLCLW08,
  author       = {Zhifang Zhang and
                  Mulan Liu and
                  Yeow Meng Chee and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk},
  title        = {Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing
                  Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_2},
  doi          = {10.1007/978-3-540-89255-7\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangLCLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Pasupathinathan08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Formal Security Analysis of Australian E-passport Implementation},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {75--82},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Vijayakrishnan.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Pasupathinathan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SunWSGW08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Ron Steinfeld and
                  Jian Guo and
                  Huaxiong Wang},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant
                  Bits},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_4},
  doi          = {10.1007/978-3-540-89641-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SunWSGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WangWP08,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data
                  and Extension for Dynamic Groups},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {178--195},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_13},
  doi          = {10.1007/978-3-540-89641-8\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/WangWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of {LASH}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_13},
  doi          = {10.1007/978-3-540-71039-4\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PasupathinathanPW08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {An On-Line Secure E-Passport Protocol},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_2},
  doi          = {10.1007/978-3-540-79104-1\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PasupathinathanPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YuanYWP08,
  author       = {Jin Yuan and
                  Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Secure Computation of the Vector Dominance Problem},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {319--333},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_23},
  doi          = {10.1007/978-3-540-79104-1\_23},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YuanYWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YeWP08,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Distributed Private Matching and Set Operations},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {347--360},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_25},
  doi          = {10.1007/978-3-540-79104-1\_25},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YeWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuWL08,
  author       = {Yi Lu and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Cryptanalysis of Rabbit},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {204--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_14},
  doi          = {10.1007/978-3-540-85886-7\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LuWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Fair e-Tendering Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {294--299},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/WangWP08,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {Threshold Privacy Preserving Keyword Searches},
  booktitle    = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4910},
  pages        = {646--658},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77566-9\_56},
  doi          = {10.1007/978-3-540-77566-9\_56},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofsem/WangWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangWP08,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based
                  Retrieval on Encrypted Data},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_11},
  doi          = {10.1007/978-3-642-00306-6\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0812-2518,
  author       = {Zhifang Zhang and
                  Mulan Liu and
                  Yeow Meng Chee and
                  San Ling and
                  Huaxiong Wang},
  title        = {Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing
                  Schemes},
  journal      = {CoRR},
  volume       = {abs/0812.2518},
  year         = {2008},
  url          = {http://arxiv.org/abs/0812.2518},
  eprinttype    = {arXiv},
  eprint       = {0812.2518},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0812-2518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunWSGW08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Ron Steinfeld and
                  Jian Guo and
                  Huaxiong Wang},
  title        = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant
                  Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/TilborgPSW07,
  author       = {Henk van Tilborg and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Huaxiong Wang},
  title        = {New constructions of anonymous membership broadcasting schemes},
  journal      = {Adv. Math. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {29--44},
  year         = {2007},
  url          = {https://doi.org/10.3934/amc.2007.1.29},
  doi          = {10.3934/AMC.2007.1.29},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/TilborgPSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TartaryW07,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  title        = {Efficient multicast stream authentication for the fully adversarial
                  network model},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {175--191},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013172},
  doi          = {10.1504/IJSN.2007.013172},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SteinfeldPW07,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing
                  Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {7},
  pages        = {2542--2559},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.899541},
  doi          = {10.1109/TIT.2007.899541},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SteinfeldPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TartaryW07,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Combining Prediction Hashing and {MDS} Codes for Efficient Multicast
                  Stream Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_22},
  doi          = {10.1007/978-3-540-73458-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TartaryW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TartaryPW08,
  author       = {Christophe Tartary and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access
                  Structures},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {167--181},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_14},
  doi          = {10.1007/978-3-540-79499-8\_14},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TartaryPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtPSW07,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Huaxiong Wang},
  editor       = {Alfred Menezes},
  title        = {On Secure Multi-party Computation in Black-Box Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {591--612},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_33},
  doi          = {10.1007/978-3-540-74143-5\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtPSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SteinfeldPW07,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Masayuki Abe},
  title        = {How to Strengthen Any Weakly Unforgeable Signature into a Strongly
                  Unforgeable Signature},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_23},
  doi          = {10.1007/11967668\_23},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SteinfeldPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWP07,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {A New Dynamic Accumulator for Batch Updates},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_8},
  doi          = {10.1007/978-3-540-77048-0\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TartaryWP07,
  author       = {Christophe Tartary and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {An Hybrid Approach for Efficient Multicast Stream Authentication over
                  Unsecured Channels},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_2},
  doi          = {10.1007/978-3-540-75670-5\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/TartaryWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WangWP07,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted
                  Data},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_8},
  doi          = {10.1007/978-3-540-75248-6\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/WangWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2007,
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9},
  doi          = {10.1007/978-3-540-76969-9},
  isbn         = {978-3-540-76968-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YeWT07,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Christophe Tartary},
  title        = {Privacy-Preserving Distributed Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YeWT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniMPSGLW07,
  author       = {Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  title        = {Cryptanalysis of {LASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LongPWW06,
  author       = {Shoulun Long and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Duncan S. Wong},
  title        = {Generalised Cumulative Arrays in Secret Sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {40},
  number       = {2},
  pages        = {191--209},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-006-0007-5},
  doi          = {10.1007/S10623-006-0007-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LongPWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Safavi-NainiW06,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Secret sharing schemes with partial broadcast channels},
  journal      = {Des. Codes Cryptogr.},
  volume       = {41},
  number       = {1},
  pages        = {5--22},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-006-0027-1},
  doi          = {10.1007/S10623-006-0027-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Safavi-NainiW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Lattice-based threshold-changeability for standard {CRT} secret-sharing
                  schemes},
  journal      = {Finite Fields Their Appl.},
  volume       = {12},
  number       = {4},
  pages        = {653--680},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ffa.2005.04.007},
  doi          = {10.1016/J.FFA.2005.04.007},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/Safavi-NainiWW06,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Duncan S. Wong},
  title        = {Resilient Lkh: Secure Multicast Key Distribution Schemes},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {17},
  number       = {5},
  pages        = {1205--1222},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0129054106004340},
  doi          = {10.1142/S0129054106004340},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/Safavi-NainiWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/PasupathinathanPWC06,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Joo Yeon Cho},
  editor       = {Rajkumar Buyya and
                  Tianchi Ma and
                  Reihaneh Safavi{-}Naini and
                  Chris Steketee and
                  Willy Susilo},
  title        = {Formal analysis of card-based payment systems in mobile devices},
  booktitle    = {The proceedings of the Fourth Australasian Symposium on Grid Computing
                  and e-Research (AusGrid 2006) and the Fourth Australasian Information
                  Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania,
                  Australia, January 2006},
  series       = {{CRPIT}},
  volume       = {54},
  pages        = {213--220},
  publisher    = {Australian Computer Society},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1151853},
  timestamp    = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/PasupathinathanPWC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {194--209},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_13},
  doi          = {10.1007/11935230\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TartaryW06,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Achieving Multicast Stream Authentication Using {MDS} Codes},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_7},
  doi          = {10.1007/11935070\_7},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/TartaryW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaPW06,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {An attack-localizing watermarking scheme for natural language documents},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {157--165},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128842},
  doi          = {10.1145/1128817.1128842},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TartaryW06,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing
                  Scheme},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_9},
  doi          = {10.1007/11937807\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TartaryW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Formal Analysis and Systematic Construction of Two-Factor Authentication
                  Scheme (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {82--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_7},
  doi          = {10.1007/11935308\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtPSW06,
  author       = {Yvo Desmedt and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Huaxiong Wang},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {A Non-malleable Group Key Exchange Protocol Robust Against Active
                  Insiders},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {459--475},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_33},
  doi          = {10.1007/11836810\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TartaryW06,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Rateless Codes for the Multicast Stream Authentication Problem},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_10},
  doi          = {10.1007/11908739\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TartaryW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Higher Order Universal One-Way Hash Functions from the Subset Sum
                  Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_11},
  doi          = {10.1007/11745853\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YangWDW06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Huaxiong Wang},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Anonymous Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_23},
  doi          = {10.1007/11745853\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YangWDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  title        = {Formal Analysis and Systematic Construction of Two-factor Authentication
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartinSWW05,
  author       = {Keith M. Martin and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  title        = {Distributing the Encryption and Decryption of a Block Cipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {263--287},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1719-4},
  doi          = {10.1007/S10623-003-1719-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MartinSWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/DesmedtWSW05,
  author       = {Yvo Desmedt and
                  Yongge Wang and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Lusheng Wang},
  title        = {Radio Networks with Reliable Communication},
  booktitle    = {Computing and Combinatorics, 11th Annual International Conference,
                  {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3595},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533719\_18},
  doi          = {10.1007/11533719\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/DesmedtWSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldCWP05,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Serge Vaudenay},
  title        = {Converse Results to the Wiener Attack on {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_13},
  doi          = {10.1007/978-3-540-30580-4\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldCWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/PasupathinathanPW05,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Privacy Enhanced Electronic Cheque System},
  booktitle    = {7th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2005), 19-22 July 2005, M{\"{u}}nchen, Germany},
  pages        = {431--434},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECT.2005.68},
  doi          = {10.1109/ICECT.2005.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/PasupathinathanPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/WuLCW05,
  author       = {Bangyu Wu and
                  Kwok{-}Yan Lam and
                  Siu Leung Chung and
                  Huaxiong Wang},
  editor       = {Xiaotie Deng and
                  Yinyu Ye},
  title        = {Secure Construction of Virtual Organizations in Grid Computing Systems},
  booktitle    = {Internet and Network Economics, First International Workshop, {WINE}
                  2005, Hong Kong, China, December 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3828},
  pages        = {959--968},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11600930\_97},
  doi          = {10.1007/11600930\_97},
  timestamp    = {Sun, 18 Dec 2022 19:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/wine/WuLCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TartaryW05,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Efficient Multicast Stream Authentication for the Fully Adversarial
                  Network Model},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_9},
  doi          = {10.1007/11604938\_9},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TartaryW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2005,
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371},
  doi          = {10.1007/11599371},
  isbn         = {3-540-30849-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWDW05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Huaxiong Wang},
  title        = {Anonymous Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWDW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/WangP04,
  author       = {Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Shared generation of pseudo-random functions},
  journal      = {J. Complex.},
  volume       = {20},
  number       = {2-3},
  pages        = {458--472},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jco.2003.08.021},
  doi          = {10.1016/J.JCO.2003.08.021},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/WangP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SteinfeldWP04,
  author       = {Ron Steinfeld and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Pil Joong Lee},
  title        = {Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing
                  Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_13},
  doi          = {10.1007/978-3-540-30539-2\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SteinfeldWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awcc/KurnioWPG04,
  author       = {Hartono Kurnio and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Kris Gaj},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Securing Multicast Groups in Ad Hoc Networks},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_24},
  doi          = {10.1007/978-3-540-30483-8\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/awcc/KurnioWPG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldWP04,
  author       = {Ron Steinfeld and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient Extension of Standard Schnorr/RSA Signatures into Universal
                  Designated-Verifier Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_7},
  doi          = {10.1007/978-3-540-24632-9\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98755},
  doi          = {10.1007/B98755},
  isbn         = {3-540-22379-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangXS03,
  author       = {Huaxiong Wang and
                  Chaoping Xing and
                  Reihaneh Safavi{-}Naini},
  title        = {Linear authentication codes: bounds and constructions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {4},
  pages        = {866--872},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2003.809567},
  doi          = {10.1109/TIT.2003.809567},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangXS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangP03,
  author       = {Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Chi{-}Sung Laih},
  title        = {Efficient One-Time Proxy Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {507--522},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_32},
  doi          = {10.1007/978-3-540-40061-5\_32},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SteinfeldBWP03,
  author       = {Ron Steinfeld and
                  Laurence Bull and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Chi{-}Sung Laih},
  title        = {Universal Designated-Verifier Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {523--542},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_33},
  doi          = {10.1007/978-3-540-40061-5\_33},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SteinfeldBWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangP03,
  author       = {Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Marc Joye},
  title        = {Shared Generation of Pseudo-Random Functions with Cumulative Maps},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {281--294},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_19},
  doi          = {10.1007/3-540-36563-X\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PieprzykWX03,
  author       = {Josef Pieprzyk and
                  Huaxiong Wang and
                  Chaoping Xing},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {88--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_7},
  doi          = {10.1007/978-3-540-24654-1\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PieprzykWX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinSWW03,
  author       = {Keith M. Martin and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  title        = {Distributing the Encryption and Decryption of a Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinSWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldBWP03,
  author       = {Ron Steinfeld and
                  Laurence Bull and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Universal Designated-Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldBWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldWP03,
  author       = {Ron Steinfeld and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Efficient Extension of Standard Schnorr/RSA signatures into Universal
                  Designated-Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/Safavi-NainiW02,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Bounds and Constructions for Threshold Shared Generation of Authenticators},
  journal      = {Int. J. Comput. Math.},
  volume       = {79},
  number       = {12},
  pages        = {1285--1301},
  year         = {2002},
  url          = {https://doi.org/10.1080/00207160214648},
  doi          = {10.1080/00207160214648},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/Safavi-NainiW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Secure Re-keying Scheme with Key Recovery Property},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_4},
  doi          = {10.1007/3-540-45450-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/WangP02,
  author       = {Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Oscar H. Ibarra and
                  Louxin Zhang},
  title        = {A Combinatorial Approach to Anonymous Membership Broadcast},
  booktitle    = {Computing and Combinatorics, 8th Annual International Conference,
                  {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2387},
  pages        = {162--170},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45655-4\_19},
  doi          = {10.1007/3-540-45655-4\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/WangP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtSW02,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Matt Blaze},
  title        = {Redistribution of Mechanical Secret Shares},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {238--252},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_17},
  doi          = {10.1007/3-540-36504-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MartinPSWW02,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Threshold MACs},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_17},
  doi          = {10.1007/3-540-36552-4\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MartinPSWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KurnioMSW02,
  author       = {Hartono Kurnio and
                  Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Dynamic Group Key Distribution Scheme with Flexible User Join},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {478--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_33},
  doi          = {10.1007/3-540-36552-4\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A Group Key Distribution Scheme with Decentralised User Join},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_11},
  doi          = {10.1007/3-540-36413-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DesmedtSWBCP01,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Lynn Margaret Batten and
                  Chris Charnes and
                  Josef Pieprzyk},
  title        = {Broadcast anti-jamming systems},
  journal      = {Comput. Networks},
  volume       = {35},
  number       = {2-3},
  pages        = {223--236},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(00)00169-9},
  doi          = {10.1016/S1389-1286(00)00169-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DesmedtSWBCP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/WangX01,
  author       = {Huaxiong Wang and
                  Chaoping Xing},
  title        = {Explicit Constructions of Perfect Hash Families from Algebraic Curves
                  over Finite Fields},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {93},
  number       = {1},
  pages        = {112--124},
  year         = {2001},
  url          = {https://doi.org/10.1006/jcta.2000.3068},
  doi          = {10.1006/JCTA.2000.3068},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/WangX01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/Safavi-NainiSW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  title        = {An Efficient Construction for Fail-Stop Signature for Long Messages},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {17},
  number       = {6},
  pages        = {879--898},
  year         = {2001},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_02.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/Safavi-NainiSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Safavi-NainiW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Broadcast authentication for group communication},
  journal      = {Theor. Comput. Sci.},
  volume       = {269},
  number       = {1-2},
  pages        = {1--21},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0304-3975(00)00184-5},
  doi          = {10.1016/S0304-3975(00)00184-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Safavi-NainiW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {How to Construct Fail-Stop Confirmer Signature Schemes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_34},
  doi          = {10.1007/3-540-47719-5\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SongWS01,
  author       = {Beomsik Song and
                  Huaxiong Wang and
                  Jennifer Seberry},
  editor       = {Kwangjo Kim},
  title        = {A New Cryptanalytic Method Using the Distribution Characteristics
                  of Substitution Distances},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_2},
  doi          = {10.1007/3-540-45861-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SongWS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KurnioSW01,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kwangjo Kim},
  title        = {Efficient Revocation Schemes for Secure Multicast},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {160--177},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_13},
  doi          = {10.1007/3-540-45861-1\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KurnioSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Safavi-Naini1WX01,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Chaoping Xing},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Linear Authentication Codes: Bounds and Constructions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {127--135},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_13},
  doi          = {10.1007/3-540-45311-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Safavi-Naini1WX01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/XingWL00,
  author       = {Chaoping Xing and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam},
  title        = {Constructions of authentication codes from algebraic curves over finite
                  fields},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {886--892},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841168},
  doi          = {10.1109/18.841168},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/XingWL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSSW00,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Key Management for Secure Multicast with Dynamic Controller},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {178--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_15},
  doi          = {10.1007/10718964\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangLXZ00,
  author       = {Huaxiong Wang and
                  Kwok{-}Yan Lam and
                  Guozhen Xiao and
                  Huanhui Zhao},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {On Multiplicative Secret Sharing Schemes},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {342--351},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_28},
  doi          = {10.1007/10718964\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangLXZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Safavi-NainiW00,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {New constructions for multicast re-keying schemes using perfect hash
                  families},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {228--234},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352637},
  doi          = {10.1145/352600.352637},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Safavi-NainiW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Safavi-NainiSW00,
  author       = {Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Fail-Stop Signature for Long Messages},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {165--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_15},
  doi          = {10.1007/3-540-44495-5\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Safavi-NainiSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/MartinPSW99,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Changing Thresholds in the Absence of Secure Channels},
  journal      = {Aust. Comput. J.},
  volume       = {31},
  number       = {2},
  pages        = {34--43},
  year         = {1999},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/MartinPSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MartinRW99,
  author       = {Keith M. Martin and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Bounds and Techniques for Efficient Redistribution of Secret Shares
                  to New Access Structures},
  journal      = {Comput. J.},
  volume       = {42},
  number       = {8},
  pages        = {638--649},
  year         = {1999},
  url          = {https://doi.org/10.1093/comjnl/42.8.638},
  doi          = {10.1093/COMJNL/42.8.638},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MartinRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Safavi-NainiW99,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Multireceiver Authentication Codes: Models, Bounds, Constructions,
                  and Extensions},
  journal      = {Inf. Comput.},
  volume       = {151},
  number       = {1-2},
  pages        = {148--172},
  year         = {1999},
  url          = {https://doi.org/10.1006/inco.1998.2769},
  doi          = {10.1006/INCO.1998.2769},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Safavi-NainiW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MartinPSW99,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Changing Thresholds in the Absence of Secure Channels},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_15},
  doi          = {10.1007/3-540-48970-3\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW99,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Broadcast Authentication in Group Communication},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {399--411},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_32},
  doi          = {10.1007/978-3-540-48000-6\_32},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Safavi-NainiWL99,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam},
  editor       = {JooSeok Song},
  title        = {A New Approach to Robust Threshold {RSA} Signature Schemes},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_15},
  doi          = {10.1007/10719994\_15},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Safavi-NainiWL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/DesmedtSWCP99,
  author       = {Yvo Desmedt and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Chris Charnes and
                  Josef Pieprzyk},
  title        = {Broadcast anti-jamming systems},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 1999,
                  {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October
                  1, 1999},
  pages        = {349--355},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICON.1999.796197},
  doi          = {10.1109/ICON.1999.796197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/DesmedtSWCP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Wang98,
  author       = {Huaxiong Wang},
  title        = {On Syntactic Nuclei of Rational Languages},
  journal      = {Inf. Process. Lett.},
  volume       = {67},
  number       = {5},
  pages        = {221--226},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00120-3},
  doi          = {10.1016/S0020-0190(98)00120-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Wang98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Wang98b,
  author       = {Huaxiong Wang},
  title        = {On Rational Series and Rational Languages},
  journal      = {Theor. Comput. Sci.},
  volume       = {205},
  number       = {1-2},
  pages        = {329--336},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0304-3975(98)00103-0},
  doi          = {10.1016/S0304-3975(98)00103-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Wang98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiPSW98,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {On Construction of Cumulative Secret Sharing Schemes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053749},
  doi          = {10.1007/BFB0053749},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiPSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW98,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Bounds and Constructions for Multireceiver Authentication Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_20},
  doi          = {10.1007/3-540-49649-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Safavi-NainiW98,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kaisa Nyberg},
  title        = {New Results on Multi-Receiver Authentication Codes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {527--541},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054151},
  doi          = {10.1007/BFB0054151},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Safavi-NainiW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics