Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Huaxiong Wang
@article{DBLP:journals/csi/LiuQWMW24, author = {Jinlu Liu and Jing Qin and Wenchao Wang and Lin Mei and Huaxiong Wang}, title = {Key-aggregate based access control encryption for flexible cloud data sharing}, journal = {Comput. Stand. Interfaces}, volume = {88}, pages = {103800}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103800}, doi = {10.1016/J.CSI.2023.103800}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiuQWMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChengLWZLWL24, author = {Hang Cheng and Xibin Li and Huaxiong Wang and Xinpeng Zhang and Ximeng Liu and Meiqing Wang and Fengyong Li}, title = {DeepDIST: {A} Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {1}, pages = {97--109}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3284914}, doi = {10.1109/TCSVT.2023.3284914}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/ChengLWZLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNPTWX24, author = {San Ling and Khoa Nguyen and Duong Hieu Phan and Khai Hanh Tang and Huaxiong Wang and Yanhong Xu}, title = {Fully Dynamic Attribute-Based Signatures for Circuits from Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2024}, url = {https://eprint.iacr.org/2024/022}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNPTWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/XuTWAW23, author = {Kexin Xu and Benjamin Hong Meng Tan and Li{-}Ping Wang and Khin Mi Mi Aung and Huaxiong Wang}, title = {Threshold Homomorphic Encryption From Provably Secure {NTRU}}, journal = {Comput. J.}, volume = {66}, number = {12}, pages = {2861--2873}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac126}, doi = {10.1093/COMJNL/BXAC126}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/XuTWAW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingLLW23, author = {Jian Ding and Changlu Lin and Fuchun Lin and Huaxiong Wang}, title = {Full threshold change range of threshold changeable secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2421--2447}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01205-9}, doi = {10.1007/S10623-023-01205-9}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuTWAW23, author = {Kexin Xu and Benjamin Hong Meng Tan and Li{-}Ping Wang and Khin Mi Mi Aung and Huaxiong Wang}, title = {Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103582}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103582}, doi = {10.1016/J.JISA.2023.103582}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuTWAW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LibertLNW23, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors}, journal = {J. Cryptol.}, volume = {36}, number = {3}, pages = {23}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09470-6}, doi = {10.1007/S00145-023-09470-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LibertLNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/DingKLW23, author = {Jian Ding and Pinhui Ke and Changlu Lin and Huaxiong Wang}, title = {Ramp Scheme Based on {CRT} for Polynomial Ring over Finite Field}, journal = {J. Syst. Sci. Complex.}, volume = {36}, number = {1}, pages = {129--150}, year = {2023}, url = {https://doi.org/10.1007/s11424-022-1292-4}, doi = {10.1007/S11424-022-1292-4}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jossac/DingKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/XueLDSZW23, author = {Jingting Xue and Shuqin Luo and Qinfang Deng and Lingjie Shi and Xiaojun Zhang and Huaxiong Wang}, title = {{KA:} Keyword-based auditing with frequency hiding and retrieval reliability for smart government}, journal = {J. Syst. Archit.}, volume = {138}, pages = {102856}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102856}, doi = {10.1016/J.SYSARC.2023.102856}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/XueLDSZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HuWGWW23, author = {Jingwei Hu and Wen Wang and Kris Gaj and Liping Wang and Huaxiong Wang}, title = {Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. {A} Case Study on {ROLLO}}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {7}, pages = {2094--2110}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3225080}, doi = {10.1109/TC.2022.3225080}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HuWGWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/FengMWWXM23, author = {Xiaoqin Feng and Jianfeng Ma and Huaxiong Wang and Sheng Wen and Yang Xiang and Yinbin Miao}, title = {Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2631--2645}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3220664}, doi = {10.1109/TCC.2022.3220664}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/FengMWWXM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/XuTWAW23, author = {Kexin Xu and Benjamin Hong Meng Tan and Li{-}Ping Wang and Khin Mi Mi Aung and Huaxiong Wang}, title = {Multi-key fully homomorphic encryption from {NTRU} and {(R)LWE} with faster bootstrapping}, journal = {Theor. Comput. Sci.}, volume = {968}, pages = {114026}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.114026}, doi = {10.1016/J.TCS.2023.114026}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/XuTWAW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FengMWMLJ23, author = {Xiaoqin Feng and Jianfeng Ma and Huaxiong Wang and Yinbin Miao and Ximeng Liu and Zhongyuan Jiang}, title = {An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4144--4156}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3293402}, doi = {10.1109/TIFS.2023.3293402}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FengMWMLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/XuSHWP23, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, title = {Revisiting Modular Inversion Hidden Number Problem and Its Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {8}, pages = {5337--5356}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3263485}, doi = {10.1109/TIT.2023.3263485}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/XuSHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangHGZW23, author = {Xiaojun Zhang and Chao Huang and Dawu Gu and Jingwei Zhang and Huaxiong Wang}, title = {{BIB-MKS:} Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {122--133}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3112779}, doi = {10.1109/TSC.2021.3112779}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhangHGZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, editor = {Jian Guo and Ron Steinfeld}, title = {Non-interactive Zero-Knowledge Functional Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {236--268}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_8}, doi = {10.1007/978-981-99-8733-7\_8}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KruglikLKSKLW23, author = {Stanislav Kruglik and Gaojun Luo and Wilton Kim and Shubhransh Singhvi and Han Mao Kiah and San Ling and Huaxiong Wang}, title = {Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1003--1008}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206718}, doi = {10.1109/ISIT54713.2023.10206718}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/KruglikLKSKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KruglikDKW23, author = {Stanislav Kruglik and Son Hoang Dau and Han Mao Kiah and Huaxiong Wang}, title = {Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1354--1359}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206529}, doi = {10.1109/ISIT54713.2023.10206529}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KruglikDKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KruglikDKW23a, author = {Stanislav Kruglik and Son Hoang Dau and Han Mao Kiah and Huaxiong Wang}, title = {k-server Byzantine-Resistant {PIR} Scheme with Optimal Download Rate and Optimal File Size}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1532--1537}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206768}, doi = {10.1109/ISIT54713.2023.10206768}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KruglikDKW23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KiahKKLW23, author = {Han Mao Kiah and Wilton Kim and Stanislav Kruglik and San Ling and Huaxiong Wang}, title = {Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1973--1978}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206838}, doi = {10.1109/ISIT54713.2023.10206838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/KiahKKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-11730, author = {Stanislav Kruglik and Son Hoang Dau and Han Mao Kiah and Huaxiong Wang}, title = {Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification}, journal = {CoRR}, volume = {abs/2301.11730}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.11730}, doi = {10.48550/ARXIV.2301.11730}, eprinttype = {arXiv}, eprint = {2301.11730}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-11730.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-02230, author = {Stanislav Kruglik and Son Hoang Dau and Han Mao Kiah and Huaxiong Wang}, title = {k-server Byzantine-Resistant {PIR} Scheme with Optimal Download Rate and Optimal File Size}, journal = {CoRR}, volume = {abs/2302.02230}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.02230}, doi = {10.48550/ARXIV.2302.02230}, eprinttype = {arXiv}, eprint = {2302.02230}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-02230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-03442, author = {Stanislav Kruglik and Gaojun Luo and Wilton Kim and Shubhransh Singhvi and Han Mao Kiah and San Ling and Huaxiong Wang}, title = {Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes}, journal = {CoRR}, volume = {abs/2305.03442}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.03442}, doi = {10.48550/ARXIV.2305.03442}, eprinttype = {arXiv}, eprint = {2305.03442}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-03442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LamLZWWG23, author = {Kwok{-}Yan Lam and Xianhui Lu and Linru Zhang and Xiangning Wang and Huaxiong Wang and Si Qi Goh}, title = {Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2023}, url = {https://eprint.iacr.org/2023/647}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LamLZWWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuCDW23, author = {Jingwei Hu and Junyan Chen and Wangchen Dai and Huaxiong Wang}, title = {Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1407}, year = {2023}, url = {https://eprint.iacr.org/2023/1407}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuCDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, title = {Non-Interactive Zero-Knowledge Functional Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1759}, year = {2023}, url = {https://eprint.iacr.org/2023/1759}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/JiangCLWX22, author = {Shaoquan Jiang and Yeow Meng Chee and San Ling and Huaxiong Wang and Chaoping Xing}, title = {A new framework for deniable secure key exchange}, journal = {Inf. Comput.}, volume = {285}, number = {Part}, pages = {104866}, year = {2022}, url = {https://doi.org/10.1016/j.ic.2022.104866}, doi = {10.1016/J.IC.2022.104866}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/JiangCLWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HuangZCWZCWL22, author = {Chenyu Huang and Yongjun Zhao and Huangxun Chen and Xu Wang and Qian Zhang and Yanjiao Chen and Huaxiong Wang and Kwok{-}Yan Lam}, title = {ZkRep: {A} Privacy-Preserving Scheme for Reputation-Based Blockchain System}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {6}, pages = {4330--4342}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3105273}, doi = {10.1109/JIOT.2021.3105273}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HuangZCWZCWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DingKLW22, author = {Jian Ding and Pinhui Ke and Changlu Lin and Huaxiong Wang}, title = {Bivariate polynomial-based secret sharing schemes with secure secret reconstruction}, journal = {Inf. Sci.}, volume = {593}, pages = {398--414}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.02.005}, doi = {10.1016/J.INS.2022.02.005}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/DingKLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XuSNW22, author = {Yanhong Xu and Reihaneh Safavi{-}Naini and Khoa Nguyen and Huaxiong Wang}, title = {Traceable policy-based signatures and instantiation from lattices}, journal = {Inf. Sci.}, volume = {607}, pages = {1286--1310}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.06.031}, doi = {10.1016/J.INS.2022.06.031}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/XuSNW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ZhangHGZXW22, author = {Xiaojun Zhang and Chao Huang and Dawu Gu and Jingwei Zhang and Jingting Xue and Huaxiong Wang}, title = {Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems}, journal = {J. Syst. Archit.}, volume = {127}, pages = {102508}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102508}, doi = {10.1016/J.SYSARC.2022.102508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ZhangHGZXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ChengLWFWZ22, author = {Hang Cheng and Ximeng Liu and Huaxiong Wang and Yan Fang and Meiqing Wang and Xiaopeng Zhao}, title = {SecureAD: {A} Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1413--1427}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2990946}, doi = {10.1109/TCC.2020.2990946}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ChengLWFWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangWTXW22, author = {Chenyu Wang and Ding Wang and Yi Tu and Guoai Xu and Huaxiong Wang}, title = {Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {507--523}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2974220}, doi = {10.1109/TDSC.2020.2974220}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangWTXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangSQW22, author = {Haining Yang and Ye Su and Jing Qin and Huaxiong Wang}, title = {Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1320--1337}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3001345}, doi = {10.1109/TDSC.2020.3001345}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangSQW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuYWNWKL22, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang and Xiaorong Ke and Yining Liu}, title = {Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {2934--2951}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3078463}, doi = {10.1109/TDSC.2021.3078463}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiuYWNWKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DingLWX22, author = {Jian Ding and Changlu Lin and Huaxiong Wang and Chaoping Xing}, title = {Communication Efficient Secret Sharing With Small Share Size}, journal = {{IEEE} Trans. Inf. Theory}, volume = {68}, number = {1}, pages = {659--669}, year = {2022}, url = {https://doi.org/10.1109/TIT.2021.3123692}, doi = {10.1109/TIT.2021.3123692}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DingLWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangZXWZ22, author = {Xiaojun Zhang and Jie Zhao and Chunxiang Xu and Huaxiong Wang and Yuan Zhang}, title = {{DOPIV:} Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {1}, pages = {334--345}, year = {2022}, url = {https://doi.org/10.1109/TSC.2019.2942297}, doi = {10.1109/TSC.2019.2942297}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhangZXWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangWW22, author = {Liang Feng Zhang and Huaxiong Wang and Li{-}Ping Wang}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1079--1085}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497773}, doi = {10.1145/3488932.3497773}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/XuSWH22, author = {Jun Xu and Santanu Sarkar and Huaxiong Wang and Lei Hu}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH} Key Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {771--799}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_26}, doi = {10.1007/978-3-031-22969-5\_26}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/XuSWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AungLJTWY22, author = {Khin Mi Mi Aung and Enhui Lim and Sim Jun Jie and Benjamin Hong Meng Tan and Huaxiong Wang and Sze Ling Yeo}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Field Instruction Multiple Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {611--641}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_21}, doi = {10.1007/978-3-031-06944-4\_21}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AungLJTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangW22, author = {Liang Feng Zhang and Huaxiong Wang}, title = {Multi-Server Verifiable Computation of Low-Degree Polynomials}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {596--613}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833792}, doi = {10.1109/SP46214.2022.9833792}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-03251, author = {Han Mao Kiah and Wilton Kim and Stanislav Kruglik and San Ling and Huaxiong Wang}, title = {Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols}, journal = {CoRR}, volume = {abs/2209.03251}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.03251}, doi = {10.48550/ARXIV.2209.03251}, eprinttype = {arXiv}, eprint = {2209.03251}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-03251.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AungLJTWY22, author = {Khin Mi Mi Aung and Enhui Lim and Sim Jun Jie and Benjamin Hong Meng Tan and Huaxiong Wang and Sze Ling Yeo}, title = {Field Instruction Multiple Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {771}, year = {2022}, url = {https://eprint.iacr.org/2022/771}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AungLJTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuWGCW22, author = {Jingwei Hu and Wen Wang and Kris Gaj and Donglong Chen and Huaxiong Wang}, title = {Universal Gaussian Elimination Hardware for Cryptographic Purposes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2022}, url = {https://eprint.iacr.org/2022/928}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuWGCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00220WH22, author = {Jun Xu and Santanu Sarkar and Huaxiong Wang and Lei Hu}, title = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH} Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2022}, url = {https://eprint.iacr.org/2022/1239}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00220WH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangHXZZW21, author = {Xiaojun Zhang and Chao Huang and Chunxiang Xu and Yuan Zhang and Jingwei Zhang and Huaxiong Wang}, title = {Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {8234--8245}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3047958}, doi = {10.1109/JIOT.2020.3047958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangHXZZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/ChangEFLSW21, author = {Zuling Chang and Martianus Frederic Ezerman and Adamas Aqsa Fahreza and San Ling and Janusz Szmidt and Huaxiong Wang}, title = {Binary de Bruijn Sequences via Zech's Logarithms}, journal = {{SN} Comput. Sci.}, volume = {2}, number = {4}, pages = {314}, year = {2021}, url = {https://doi.org/10.1007/s42979-021-00683-9}, doi = {10.1007/S42979-021-00683-9}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/ChangEFLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangZXLWZ21, author = {Xiaojun Zhang and Jie Zhao and Chunxiang Xu and Hongwei Li and Huaxiong Wang and Yuan Zhang}, title = {{CIPPPA:} Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {4}, pages = {1362--1375}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2927219}, doi = {10.1109/TCC.2019.2927219}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangZXLWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertLMNW21, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Adaptive oblivious transfer with access control from lattice assumptions}, journal = {Theor. Comput. Sci.}, volume = {891}, pages = {210--229}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.09.001}, doi = {10.1016/J.TCS.2021.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LibertLMNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangXWZW21, author = {Xiaojun Zhang and Chunxiang Xu and Huaxiong Wang and Yuan Zhang and Shixiong Wang}, title = {{FS-PEKS:} Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1019--1032}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2914117}, doi = {10.1109/TDSC.2019.2914117}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangXWZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChengWLFWZ21, author = {Hang Cheng and Huaxiong Wang and Ximeng Liu and Yan Fang and Meiqing Wang and Xiaojun Zhang}, title = {Person Re-Identification over Encrypted Outsourced Surveillance Videos}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1456--1473}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2923653}, doi = {10.1109/TDSC.2019.2923653}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChengWLFWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TanLWRA21, author = {Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung}, title = {Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2861--2874}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2967740}, doi = {10.1109/TDSC.2020.2967740}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TanLWRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21, author = {Khoa Nguyen and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, editor = {Juan A. Garay}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {678--708}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_24}, doi = {10.1007/978-3-030-75248-4\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/LingNPTW21, author = {San Ling and Khoa Nguyen and Duong Hieu Phan and Hanh Tang and Huaxiong Wang}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Zero-Knowledge Proofs for Committed Symmetric Boolean Functions}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {339--359}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_18}, doi = {10.1007/978-3-030-81293-5\_18}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/LingNPTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-1, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3}, doi = {10.1007/978-3-030-92062-3}, isbn = {978-3-030-92061-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-2, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3}, doi = {10.1007/978-3-030-92075-3}, isbn = {978-3-030-92074-6}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-3, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4}, doi = {10.1007/978-3-030-92078-4}, isbn = {978-3-030-92077-7}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2021-4, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5}, doi = {10.1007/978-3-030-92068-5}, isbn = {978-3-030-92067-8}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2021-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-04194, author = {Jenn{-}Bing Ong and Wee Keong Ng and Ivan Tjuawinata and Chao Li and Jielin Yang and Sai None Myne and Huaxiong Wang and Kwok{-}Yan Lam and C.{-}C. Jay Kuo}, title = {Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation}, journal = {CoRR}, volume = {abs/2101.04194}, year = {2021}, url = {https://arxiv.org/abs/2101.04194}, eprinttype = {arXiv}, eprint = {2101.04194}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-04194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSSWXZ21, author = {Khoa Nguyen and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2021}, url = {https://eprint.iacr.org/2021/226}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSSWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWL21, author = {Yongjun Zhao and Huaxiong Wang and Kwok{-}Yan Lam}, title = {Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2021}, url = {https://eprint.iacr.org/2021/786}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZuoLYLSW21, author = {Cong Zuo and Shangqi Lai and Xingliang Yuan and Joseph K. Liu and Jun Shao and Huaxiong Wang}, title = {Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1585}, year = {2021}, url = {https://eprint.iacr.org/2021/1585}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZuoLYLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaLCSCW20, author = {Jinhua Ma and Shih{-}Ya Lin and Xin Chen and Hung{-}Min Sun and Yeh{-}Cheng Chen and Huaxiong Wang}, title = {A Blockchain-Based Application System for Product Anti-Counterfeiting}, journal = {{IEEE} Access}, volume = {8}, pages = {77642--77652}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2972026}, doi = {10.1109/ACCESS.2020.2972026}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaLCSCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WenZWMG20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Yinbin Miao and Zheng Gong}, title = {Intersection-policy private mutual authentication from authorized private set intersection}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {2}, pages = {122101}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-9907-x}, doi = {10.1007/S11432-019-9907-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LeeLSWY20, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek{-}Young Youn}, title = {Public key encryption with equality test in the standard model}, journal = {Inf. Sci.}, volume = {516}, pages = {89--108}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.12.023}, doi = {10.1016/J.INS.2019.12.023}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LeeLSWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WenZWGMD20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Zheng Gong and Yinbin Miao and Yuqiao Deng}, title = {A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks}, journal = {Inf. Sci.}, volume = {520}, pages = {142--154}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.02.007}, doi = {10.1016/J.INS.2020.02.007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangSQWS20, author = {Haining Yang and Ye Su and Jing Qin and Huaxiong Wang and Yongcheng Song}, title = {Verifiable inner product computation on outsourced database for authenticated multi-user data sharing}, journal = {Inf. Sci.}, volume = {539}, pages = {295--311}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.05.118}, doi = {10.1016/J.INS.2020.05.118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangSQWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HuBSZLW20, author = {Jingwei Hu and Marco Baldi and Paolo Santini and Neng Zeng and San Ling and Huaxiong Wang}, title = {Lightweight Key Encapsulation Using {LDPC} Codes on FPGAs}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {3}, pages = {327--341}, year = {2020}, url = {https://doi.org/10.1109/TC.2019.2948323}, doi = {10.1109/TC.2019.2948323}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/HuBSZLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/HuLCBLW20, author = {Jingwei Hu and Yao Liu and Ray C. C. Cheung and Shivam Bhasin and San Ling and Huaxiong Wang}, title = {Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {67-I}, number = {7}, pages = {2305--2316}, year = {2020}, url = {https://doi.org/10.1109/TCSI.2020.2984026}, doi = {10.1109/TCSI.2020.2984026}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/HuLCBLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SongHMWW20, author = {Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu and Huaxiong Wang}, title = {A code-based signature scheme from the Lyubashevsky framework}, journal = {Theor. Comput. Sci.}, volume = {835}, pages = {15--30}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.05.011}, doi = {10.1016/J.TCS.2020.05.011}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SongHMWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/EzermanLLNW20, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Provably Secure Group Signature Schemes From Code-Based Assumptions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {9}, pages = {5754--5773}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2976073}, doi = {10.1109/TIT.2020.2976073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/EzermanLLNW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhaoTLWLX20, author = {Jun Zhao and Jing Tang and Zengxiang Li and Huaxiong Wang and Kwok{-}Yan Lam and Kaiping Xue}, title = {An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {179--189}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00039}, doi = {10.1109/ICDCS47774.2020.00039}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/ZhaoTLWLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/LinCGSW20, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Leakage-Resilient Secret Sharing in Non-Compartmentalized Models}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {7:1--7:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.7}, doi = {10.4230/LIPICS.ITC.2020.7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icits/LinCGSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/YangS0MW20, author = {Haining Yang and Ye Su and Jing Qin and Jinhua Ma and Huaxiong Wang}, editor = {Xiaofeng Chen and Hongyang Yan and Qiben Yan and Xiangliang Zhang}, title = {An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model}, booktitle = {Machine Learning for Cyber Security - Third International Conference, {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12486}, pages = {578--592}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62223-7\_51}, doi = {10.1007/978-3-030-62223-7\_51}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/YangS0MW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JiangGHNW20, author = {Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {396--427}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_14}, doi = {10.1007/978-3-030-45374-9\_14}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/JiangGHNW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2020-1, editor = {Shiho Moriai and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4}, doi = {10.1007/978-3-030-64837-4}, isbn = {978-3-030-64836-7}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2020-2, editor = {Shiho Moriai and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3}, doi = {10.1007/978-3-030-64834-3}, isbn = {978-3-030-64833-6}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2020-3, editor = {Shiho Moriai and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4}, doi = {10.1007/978-3-030-64840-4}, isbn = {978-3-030-64839-8}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2020, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4}, doi = {10.1007/978-3-030-62576-4}, isbn = {978-3-030-62575-7}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00033, author = {Yanhong Xu and Reihaneh Safavi{-}Naini and Khoa Nguyen and Huaxiong Wang}, title = {Traceable Policy-Based Signatures and Instantiation from Lattices}, journal = {CoRR}, volume = {abs/2007.00033}, year = {2020}, url = {https://arxiv.org/abs/2007.00033}, eprinttype = {arXiv}, eprint = {2007.00033}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangGHNW20, author = {Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang}, title = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2020}, url = {https://eprint.iacr.org/2020/140}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JiangGHNW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLSW20, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang}, title = {Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2020}, url = {https://eprint.iacr.org/2020/749}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimLLRTW19, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Shu Qin Ren and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Search Condition-Hiding Query Evaluation on Encrypted Databases}, journal = {{IEEE} Access}, volume = {7}, pages = {161283--161295}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2951695}, doi = {10.1109/ACCESS.2019.2951695}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimLLRTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/WangQLW19, author = {Shixiong Wang and Longjiang Qu and Chao Li and Huaxiong Wang}, title = {Further improvement of factoring {N} = p\({}^{\mbox{r}}\) q\({}^{\mbox{s}}\) with partial known bits}, journal = {Adv. Math. Commun.}, volume = {13}, number = {1}, pages = {121--135}, year = {2019}, url = {https://doi.org/10.3934/amc.2019007}, doi = {10.3934/AMC.2019007}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/WangQLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LingNWZ19, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, title = {Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1849--1862}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz079}, doi = {10.1093/COMJNL/BXZ079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LingNWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChangELW19, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1137--1160}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0509-y}, doi = {10.1007/S10623-018-0509-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChangELW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuEW19, author = {Yali Liu and Martianus Frederic Ezerman and Huaxiong Wang}, title = {Double verification protocol via secret sharing for low-cost {RFID} tags}, journal = {Future Gener. Comput. Syst.}, volume = {90}, pages = {118--128}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.07.004}, doi = {10.1016/J.FUTURE.2018.07.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/LiuEW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/YuYW19, author = {Yong Yu and Guomin Yang and Huaxiong Wang}, title = {Preface: Special Issue Cryptography and Provable Security}, journal = {Int. J. Found. Comput. Sci.}, volume = {30}, number = {4}, pages = {489--492}, year = {2019}, url = {https://doi.org/10.1142/S0129054119020027}, doi = {10.1142/S0129054119020027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/YuYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangWX19, author = {Xiaojun Zhang and Huaxiong Wang and Chunxiang Xu}, title = {Identity-based key-exposure resilient cloud storage public auditing scheme from lattices}, journal = {Inf. Sci.}, volume = {472}, pages = {223--234}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.013}, doi = {10.1016/J.INS.2018.09.013}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangTWXMC19, author = {Xiaojun Zhang and Yao Tang and Huaxiong Wang and Chunxiang Xu and Yinbin Miao and Hang Cheng}, title = {Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage}, journal = {Inf. Sci.}, volume = {494}, pages = {193--207}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.04.051}, doi = {10.1016/J.INS.2019.04.051}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangTWXMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LeeLSW19, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang}, title = {Public key encryption with equality test from generic assumptions in the random oracle model}, journal = {Inf. Sci.}, volume = {500}, pages = {15--33}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.05.026}, doi = {10.1016/J.INS.2019.05.026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LeeLSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhangCLQW19, author = {Kai Zhang and Jie Chen and Hyung Tae Lee and Haifeng Qian and Huaxiong Wang}, title = {Efficient public key encryption with equality test in the standard model}, journal = {Theor. Comput. Sci.}, volume = {755}, pages = {65--80}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.06.048}, doi = {10.1016/J.TCS.2018.06.048}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhangCLQW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LibertLMNW19, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption}, journal = {Theor. Comput. Sci.}, volume = {759}, pages = {72--97}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2019.01.003}, doi = {10.1016/J.TCS.2019.01.003}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LibertLMNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AungLTW19, author = {Khin Mi Mi Aung and Hyung Tae Lee and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem}, journal = {Theor. Comput. Sci.}, volume = {771}, pages = {49--70}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.11.014}, doi = {10.1016/J.TCS.2018.11.014}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AungLTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LingNWX19, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease}, journal = {Theor. Comput. Sci.}, volume = {783}, pages = {71--94}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2019.03.023}, doi = {10.1016/J.TCS.2019.03.023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LingNWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLLTW19, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Private Compound Wildcard Queries Using Fully Homomorphic Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {743--756}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2763593}, doi = {10.1109/TDSC.2017.2763593}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLLTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenTWZ19, author = {Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {New Code-Based Privacy-Preserving Cryptographic Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {25--55}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_2}, doi = {10.1007/978-3-030-34621-8\_2}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenTWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangZHWL19, author = {Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {99--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_6}, doi = {10.1007/978-3-030-31578-8\_6}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/WangZHWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LinLWZ19, author = {Fuchun Lin and San Ling and Huaxiong Wang and Neng Zeng}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {Threshold Changeable Ramp Secret Sharing}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {308--327}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_17}, doi = {10.1007/978-3-030-31578-8\_17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/LinLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Xu0HWP19, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {297--321}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_11}, doi = {10.1007/978-3-030-26948-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LingNWX19, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, editor = {Mitsuru Matsui}, title = {Accountable Tracing Signatures from Lattices}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {556--576}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_28}, doi = {10.1007/978-3-030-12612-4\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LingNWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuNYWW19, author = {Zhen Liu and Khoa Nguyen and Guomin Yang and Huaxiong Wang and Duncan S. Wong}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {726--746}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_35}, doi = {10.1007/978-3-030-29959-0\_35}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiuNYWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/LiuYWNW19, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {215--230}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00025}, doi = {10.1109/EUROSP.2019.00025}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/LiuYWNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfpt/HuWCW19, author = {Jingwei Hu and Wen Wang and Ray C. C. Cheung and Huaxiong Wang}, title = {Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: {A} Case Study on {BIKE}}, booktitle = {International Conference on Field-Programmable Technology, {FPT} 2019, Tianjin, China, December 9-13, 2019}, pages = {231--234}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICFPT47387.2019.00035}, doi = {10.1109/ICFPT47387.2019.00035}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfpt/HuWCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/LinCGSW19, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Avrim Blum}, title = {Secret Sharing with Binary Shares}, booktitle = {10th Innovations in Theoretical Computer Science Conference, {ITCS} 2019, January 10-12, 2019, San Diego, California, {USA}}, series = {LIPIcs}, volume = {124}, pages = {53:1--53:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2019.53}, doi = {10.4230/LIPICS.ITCS.2019.53}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/LinCGSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LinSCW19, author = {Fuchun Lin and Reihaneh Safavi{-}Naini and Mahdi Cheraghchi and Huaxiong Wang}, title = {Non-Malleable Codes against Active Physical Layer Adversary}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {2753--2757}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849438}, doi = {10.1109/ISIT.2019.8849438}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/LinSCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LinLSW19, author = {Fuchun Lin and San Ling and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Non-malleable Coding for Arbitrary Varying Channels}, booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITW44776.2019.8989115}, doi = {10.1109/ITW44776.2019.8989115}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/LinLSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LibertNTW19, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, editor = {Dongdai Lin and Kazue Sako}, title = {Zero-Knowledge Elementary Databases with More Expressive Queries}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {255--285}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_9}, doi = {10.1007/978-3-030-17253-4\_9}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LibertNTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/LingNWX19, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Forward-Secure Group Signatures from Lattices}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {44--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_3}, doi = {10.1007/978-3-030-25510-7\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/LingNWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/WangWWXSW19, author = {Chenyu Wang and Ding Wang and Haowei Wang and Guoai Xu and Jing Sun and Huaxiong Wang}, editor = {Weizhi Meng and Steven Furnell}, title = {Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {95--109}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_8}, doi = {10.1007/978-981-15-0758-8\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/WangWWXSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-00240, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Accountable Tracing Signatures from Lattices}, journal = {CoRR}, volume = {abs/1901.00240}, year = {2019}, url = {http://arxiv.org/abs/1901.00240}, eprinttype = {arXiv}, eprint = {1901.00240}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-00240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06195, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Non-Malleable Secret Sharing against Affine Tampering}, journal = {CoRR}, volume = {abs/1902.06195}, year = {2019}, url = {http://arxiv.org/abs/1902.06195}, eprinttype = {arXiv}, eprint = {1902.06195}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-11066, author = {Fuchun Lin and San Ling and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Non-malleable Coding for Arbitrary Varying Channels}, journal = {CoRR}, volume = {abs/1906.11066}, year = {2019}, url = {http://arxiv.org/abs/1906.11066}, eprinttype = {arXiv}, eprint = {1906.11066}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-11066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-04472, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Provably Secure Group Signature Schemes from Code-Based Assumptions}, journal = {CoRR}, volume = {abs/1909.04472}, year = {2019}, url = {http://arxiv.org/abs/1909.04472}, eprinttype = {arXiv}, eprint = {1909.04472}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-04472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-06587, author = {Jun Zhao and Jing Tang and Zengxiang Li and Huaxiong Wang and Kwok{-}Yan Lam and Kaiping Xue}, title = {An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound}, journal = {CoRR}, volume = {abs/1909.06587}, year = {2019}, url = {http://arxiv.org/abs/1909.06587}, eprinttype = {arXiv}, eprint = {1909.06587}, timestamp = {Tue, 28 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-06587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanLWRA19, author = {Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung}, title = {Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2019}, url = {https://eprint.iacr.org/2019/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TanLWRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTWZ19, author = {Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng}, title = {New Code-Based Privacy-Preserving Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2019}, url = {https://eprint.iacr.org/2019/513}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu0HWP19, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2019}, url = {https://eprint.iacr.org/2019/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu0HWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZHWL19, author = {Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li}, title = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {917}, year = {2019}, url = {https://eprint.iacr.org/2019/917}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZHWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChangELW18, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {Construction of de Bruijn sequences from product of two irreducible polynomials}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {251--275}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0219-8}, doi = {10.1007/S12095-017-0219-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChangELW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChangELW18a, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {The cycle structure of {LFSR} with arbitrary characteristic polynomial over finite fields}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1183--1202}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0273-2}, doi = {10.1007/S12095-017-0273-2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChangELW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LingNRW18, author = {San Ling and Khoa Nguyen and Adeline Roux{-}Langlois and Huaxiong Wang}, title = {A lattice-based group signature scheme with verifier-local revocation}, journal = {Theor. Comput. Sci.}, volume = {730}, pages = {1--20}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.03.027}, doi = {10.1016/J.TCS.2018.03.027}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LingNRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KimLLW18, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {On the Efficiency of FHE-Based Private Queries}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {2}, pages = {357--363}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2568182}, doi = {10.1109/TDSC.2016.2568182}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KimLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeWZ18, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from {ACISP} 2017}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {780--786}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_46}, doi = {10.1007/978-3-319-93638-3\_46}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertLNW18, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Lattice-Based Zero-Knowledge Arguments for Integer Relations}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {700--732}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_24}, doi = {10.1007/978-3-319-96881-0\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LibertLNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNWX18, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Constant-Size Group Signatures from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {58--88}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_3}, doi = {10.1007/978-3-319-76581-5\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LingNWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-07844, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, title = {Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation}, journal = {CoRR}, volume = {abs/1801.07844}, year = {2018}, url = {http://arxiv.org/abs/1801.07844}, eprinttype = {arXiv}, eprint = {1801.07844}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-07844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-08323, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Forward-Secure Group Signatures from Lattices}, journal = {CoRR}, volume = {abs/1801.08323}, year = {2018}, url = {http://arxiv.org/abs/1801.08323}, eprinttype = {arXiv}, eprint = {1801.08323}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-08323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-08737, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease}, journal = {CoRR}, volume = {abs/1801.08737}, year = {2018}, url = {http://arxiv.org/abs/1801.08737}, eprinttype = {arXiv}, eprint = {1801.08737}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-08737.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-05004, author = {Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Zero-Knowledge Password Policy Check from Lattices}, journal = {CoRR}, volume = {abs/1802.05004}, year = {2018}, url = {http://arxiv.org/abs/1802.05004}, eprinttype = {arXiv}, eprint = {1802.05004}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-05004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-02974, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Secret Sharing with Binary Shares}, journal = {CoRR}, volume = {abs/1808.02974}, year = {2018}, url = {http://arxiv.org/abs/1808.02974}, eprinttype = {arXiv}, eprint = {1808.02974}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-02974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX18, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Constant-size Group Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2018}, url = {http://eprint.iacr.org/2018/034}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeWZ18, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from {ACISP} 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2018}, url = {https://eprint.iacr.org/2018/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLNW18, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Lattice-Based Zero-Knowledge Arguments for Integer Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2018}, url = {https://eprint.iacr.org/2018/716}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinCGSW18, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Secret Sharing with Binary Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2018}, url = {https://eprint.iacr.org/2018/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinCGSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWNW18, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2018}, url = {https://eprint.iacr.org/2018/956}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX18a, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Accountable Tracing Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1251}, year = {2018}, url = {https://eprint.iacr.org/2018/1251}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XuLWZH17, author = {Chang Xu and Rongxing Lu and Huaxiong Wang and Liehuang Zhu and Cheng Huang}, title = {{TJET:} Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning}, journal = {{IEEE} Access}, volume = {5}, pages = {26973--26989}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2753778}, doi = {10.1109/ACCESS.2017.2753778}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XuLWZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XuLWZH17, author = {Chang Xu and Rongxing Lu and Huaxiong Wang and Liehuang Zhu and Cheng Huang}, title = {{PAVS:} {A} New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems}, journal = {Sensors}, volume = {17}, number = {3}, pages = {500}, year = {2017}, url = {https://doi.org/10.3390/s17030500}, doi = {10.3390/S17030500}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/XuLWZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LingNWX17, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {293--312}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_15}, doi = {10.1007/978-3-319-61204-1\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LingNWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertLNW17, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {304--335}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_11}, doi = {10.1007/978-3-319-70700-6\_11}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertLNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW17, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Adaptive Oblivious Transfer with Access Control from Lattice Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {533--563}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_19}, doi = {10.1007/978-3-319-70694-8\_19}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NguyenTW17, author = {Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Zero-Knowledge Password Policy Check from Lattices}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {92--113}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_6}, doi = {10.1007/978-3-319-69659-1\_6}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/NguyenTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LingNWZ17, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Revocable Predicate Encryption from Lattices}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {305--326}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_19}, doi = {10.1007/978-3-319-68637-0\_19}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LingNWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChangEFLW17, author = {Zuling Chang and Martianus Frederic Ezerman and Adamas Aqsa Fahreza and San Ling and Huaxiong Wang}, title = {Large Order Binary de Bruijn Sequences via Zech's Logarithms}, journal = {CoRR}, volume = {abs/1705.03150}, year = {2017}, url = {http://arxiv.org/abs/1705.03150}, eprinttype = {arXiv}, eprint = {1705.03150}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChangEFLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05462, author = {Fuchun Lin and Reihaneh Safavi{-}Naini and Mahdi Cheraghchi and Huaxiong Wang}, title = {Non-Malleable Codes with Leakage and Applications to Secure Communication}, journal = {CoRR}, volume = {abs/1708.05462}, year = {2017}, url = {http://arxiv.org/abs/1708.05462}, eprinttype = {arXiv}, eprint = {1708.05462}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05462.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX17, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2017}, url = {http://eprint.iacr.org/2017/353}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTW17, author = {Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Zero-Knowledge Password Policy Check from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2017}, url = {http://eprint.iacr.org/2017/854}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLNW17, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2017}, url = {http://eprint.iacr.org/2017/856}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LeeLSW16, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang}, title = {{CCA2} Attack and Modification of Huang \emph{et al}.'s Public Key Encryption with Authorized Equality Test}, journal = {Comput. J.}, volume = {59}, number = {11}, pages = {1689--1694}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw033}, doi = {10.1093/COMJNL/BXW033}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LeeLSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChengNW16, author = {Shantian Cheng and Khoa Nguyen and Huaxiong Wang}, title = {Policy-based signature scheme from lattices}, journal = {Des. Codes Cryptogr.}, volume = {81}, number = {1}, pages = {43--74}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0126-y}, doi = {10.1007/S10623-015-0126-Y}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChengNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LeeLSW16, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang}, title = {Semi-generic construction of public key encryption and identity-based encryption with equality test}, journal = {Inf. Sci.}, volume = {373}, pages = {419--440}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.09.013}, doi = {10.1016/J.INS.2016.09.013}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LeeLSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LeeLW16, author = {Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {Analysis of Gong et al.'s CCA2-secure homomorphic encryption}, journal = {Theor. Comput. Sci.}, volume = {640}, pages = {104--114}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.06.014}, doi = {10.1016/J.TCS.2016.06.014}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LeeLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW16, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {101--131}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_4}, doi = {10.1007/978-3-662-53890-6\_4}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LibertLMNW16a, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {373--403}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_13}, doi = {10.1007/978-3-662-53890-6\_13}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LibertLMNW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NguyenWZ16, author = {Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Server-Aided Revocable Identity-Based Encryption from Lattices}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {107--123}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_7}, doi = {10.1007/978-3-319-48965-0\_7}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/NguyenWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertLNW16, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {1--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_1}, doi = {10.1007/978-3-662-49896-5\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertLNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DengGLWY16, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {237--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_13}, doi = {10.1007/978-3-319-44618-9\_13}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DengGLWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChangELW16, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials}, journal = {CoRR}, volume = {abs/1604.04351}, year = {2016}, url = {http://arxiv.org/abs/1604.04351}, eprinttype = {arXiv}, eprint = {1604.04351}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChangELW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChangELW16a, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials}, journal = {CoRR}, volume = {abs/1611.10088}, year = {2016}, url = {http://arxiv.org/abs/1611.10088}, eprinttype = {arXiv}, eprint = {1611.10088}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChangELW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChangELW16b, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {The Cycle Structure of {LFSR} with Arbitrary Characteristic Polynomial over Finite Fields}, journal = {CoRR}, volume = {abs/1612.07928}, year = {2016}, url = {http://arxiv.org/abs/1612.07928}, eprinttype = {arXiv}, eprint = {1612.07928}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChangELW16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLW16, author = {Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2016}, url = {http://eprint.iacr.org/2016/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLMNW16, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2016}, url = {http://eprint.iacr.org/2016/101}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLMNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLLRTW16, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Shu Qin Ren and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Better Security for Queries on Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2016}, url = {http://eprint.iacr.org/2016/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLLRTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLMNW16a, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2016}, url = {http://eprint.iacr.org/2016/879}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLMNW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenWZ16, author = {Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, title = {Server-Aided Revocable Identity-Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2016}, url = {http://eprint.iacr.org/2016/974}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLSWY16, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek{-}Young Youn}, title = {Public Key Encryption with Equality Test in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2016}, url = {http://eprint.iacr.org/2016/1182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLSWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/OrgunEPCSW15, author = {Mehmet A. Orgun and Atilla El{\c{c}}i and Josef Pieprzyk and Alexander G. Chefranov and Rajan Shankaran and Huaxiong Wang}, title = {Special issue on trust and security in wireless sensor networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {15}, pages = {3791--3793}, year = {2015}, url = {https://doi.org/10.1002/cpe.3497}, doi = {10.1002/CPE.3497}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/OrgunEPCSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SunHCWLW15, author = {Hung{-}Min Sun and Bing{-}Zhe He and Chien{-}Ming Chen and Tsu{-}Yang Wu and Chia{-}Hsien Lin and Huaxiong Wang}, title = {A provable authenticated group key agreement protocol for mobile environment}, journal = {Inf. Sci.}, volume = {321}, pages = {224--237}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.01.037}, doi = {10.1016/J.INS.2015.01.037}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SunHCWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/EzermanLLNW15, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {260--285}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_12}, doi = {10.1007/978-3-662-48797-6\_12}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/EzermanLLNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LinLWZ15, author = {Changlu Lin and Fucai Luo and Huaxiong Wang and Yan Zhu}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {A Provable Data Possession Scheme with Data Hierarchy in Cloud}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {301--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_18}, doi = {10.1007/978-3-319-38898-4\_18}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LinLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNW15, author = {San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Jonathan Katz}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {427--449}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_19}, doi = {10.1007/978-3-662-46447-2\_19}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LingNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNW15, author = {San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2015}, url = {http://eprint.iacr.org/2015/014}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EzermanLLNW15, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2015}, url = {http://eprint.iacr.org/2015/479}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EzermanLLNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLLW15, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {On the Efficiency of FHE-based Private Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2015}, url = {http://eprint.iacr.org/2015/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EmamiLNPW14, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, title = {The resistance of {PRESENT-80} against related-key differential attacks}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {171--187}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0096-8}, doi = {10.1007/S12095-013-0096-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EmamiLNPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenLLW14, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {The relation and transformation between hierarchical inner product encryption and spatial encryption}, journal = {Des. Codes Cryptogr.}, volume = {71}, number = {2}, pages = {347--364}, year = {2014}, url = {https://doi.org/10.1007/s10623-012-9742-y}, doi = {10.1007/S10623-012-9742-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenLLSW14, author = {Jie Chen and Hoon Wei Lim and San Ling and Le Su and Huaxiong Wang}, title = {Spatial encryption supporting non-monotone access structure}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {731--746}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9823-6}, doi = {10.1007/S10623-013-9823-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenLLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenLLWW14, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, title = {Shorter identity-based encryption via asymmetric pairings}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {911--947}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9834-3}, doi = {10.1007/S10623-013-9834-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenLLWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/0001CZYWS14, author = {Chien{-}Ming Chen and Shuai{-}Min Chen and Xinying Zheng and Lijun Yan and Huaxiong Wang and Hung{-}Min Sun}, title = {Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost {RFID}}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {5}, number = {4}, pages = {642--648}, year = {2014}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2014/vol5/JIH-MSP-2014-04-006.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/0001CZYWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/LingSW14, author = {San Ling and Igor E. Shparlinski and Huaxiong Wang}, title = {On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function}, journal = {Math. Comput.}, volume = {83}, number = {289}, pages = {2429--2434}, year = {2014}, url = {https://doi.org/10.1090/S0025-5718-2014-02794-4}, doi = {10.1090/S0025-5718-2014-02794-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/LingSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/EmamiLNPW14, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Low Probability Differentials and the Cryptanalysis of Full-Round {CLEFIA-128}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {141--157}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_8}, doi = {10.1007/978-3-662-45611-8\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/EmamiLNPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangloisLNW14, author = {Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Hugo Krawczyk}, title = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {345--361}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_20}, doi = {10.1007/978-3-642-54631-0\_20}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LangloisLNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BoschPLLTWHJ14, author = {Christoph B{\"{o}}sch and Andreas Peter and Bram Leenders and Hoon Wei Lim and Qiang Tang and Huaxiong Wang and Pieter H. Hartel and Willem Jonker}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Distributed Searchable Symmetric Encryption}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {330--337}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890956}, doi = {10.1109/PST.2014.6890956}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BoschPLLTWHJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangloisLNW14, author = {Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Lattice-based Group Signature Scheme with Verifier-local Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2014}, url = {http://eprint.iacr.org/2014/033}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LangloisLNW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EmamiLNPW14, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, title = {Low Probability Differentials and the Cryptanalysis of Full-Round {CLEFIA-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2014}, url = {http://eprint.iacr.org/2014/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EmamiLNPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/CheeFLWZ13, author = {Yeow Meng Chee and Tao Feng and San Ling and Huaxiong Wang and Liang Feng Zhang}, title = {Query-Efficient Locally Decodable Codes of Subexponential Length}, journal = {Comput. Complex.}, volume = {22}, number = {1}, pages = {159--189}, year = {2013}, url = {https://doi.org/10.1007/s00037-011-0017-1}, doi = {10.1007/S00037-011-0017-1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cc/CheeFLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CruzW13, author = {Romar dela Cruz and Huaxiong Wang}, title = {Cheating-immune secret sharing schemes from codes and cumulative arrays}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {67--83}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0076-4}, doi = {10.1007/S12095-012-0076-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CruzW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AsgharLPW13, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, title = {Cryptanalysis of the convex hull click human identification protocol}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {83--96}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0161-x}, doi = {10.1007/S10207-012-0161-X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AsgharLPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CheeLWZ13, author = {Yeow Meng Chee and San Ling and Huaxiong Wang and Liang Feng Zhang}, title = {Upper Bounds on Matching Families in BBZ\({}_{\mbox{pq}}\)\({}^{\mbox{n}}\)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {8}, pages = {5131--5139}, year = {2013}, url = {https://doi.org/10.1109/TIT.2013.2257918}, doi = {10.1109/TIT.2013.2257918}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CheeLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YiLW13, author = {Xun Yi and San Ling and Huaxiong Wang}, title = {Efficient Two-Server Password-Only Authenticated Key Exchange}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {9}, pages = {1773--1782}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.282}, doi = {10.1109/TPDS.2012.282}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YiLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KutznerNPW13, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang}, editor = {Emmanuel Prouff}, title = {On 3-Share Threshold Implementations for 4-Bit S-boxes}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {99--113}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_7}, doi = {10.1007/978-3-642-40026-1\_7}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/KutznerNPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChenCLZFLW13, author = {Cheng Chen and Jie Chen and Hoon Wei Lim and Zhenfeng Zhang and Dengguo Feng and San Ling and Huaxiong Wang}, editor = {Ed Dawson}, title = {Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {50--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_4}, doi = {10.1007/978-3-642-36095-4\_4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChenCLZFLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/SuLLW13, author = {Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Revocable {IBE} Systems with Almost Constant-Size Key Update}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {168--185}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_10}, doi = {10.1007/978-3-319-04873-4\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/SuLLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LingNSW13, author = {San Ling and Khoa Nguyen and Damien Stehl{\'{e}} and Huaxiong Wang}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Improved Zero-Knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {107--124}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_8}, doi = {10.1007/978-3-642-36362-7\_8}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LingNSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-0980, author = {Yeow Meng Chee and San Ling and Huaxiong Wang and Liang Feng Zhang}, title = {Upper Bounds on Matching Families in {\textdollar}{\textbackslash}mathbb\{Z\}{\_}\{pq\}{\^{}}n{\textdollar}}, journal = {CoRR}, volume = {abs/1301.0980}, year = {2013}, url = {http://arxiv.org/abs/1301.0980}, eprinttype = {arXiv}, eprint = {1301.0980}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-0980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuLLW13, author = {Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {Revocable {IBE} Systems with Almost Constant-size Key Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2013}, url = {http://eprint.iacr.org/2013/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuLLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EmamiLNPW13, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, title = {The Resistance of {PRESENT-80} Against Related-Key Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2013}, url = {http://eprint.iacr.org/2013/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EmamiLNPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/BeimelCWZ12, author = {Amos Beimel and Yeow Meng Chee and Huaxiong Wang and Liang Feng Zhang}, title = {Communication-efficient distributed oblivious transfer}, journal = {J. Comput. Syst. Sci.}, volume = {78}, number = {4}, pages = {1142--1157}, year = {2012}, url = {https://doi.org/10.1016/j.jcss.2012.02.002}, doi = {10.1016/J.JCSS.2012.02.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/BeimelCWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/CheeWZ12, author = {Yeow Meng Chee and Huaxiong Wang and Liang Feng Zhang}, title = {On the Bringer-Chabanne {EPIR} protocol for polynomial evaluation}, journal = {J. Math. Cryptol.}, volume = {5}, number = {3-4}, pages = {277--301}, year = {2012}, url = {https://doi.org/10.1515/jmc-2012-0001}, doi = {10.1515/JMC-2012-0001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/CheeWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DesmedtPSSTWY12, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Xiaoming Sun and Christophe Tartary and Huaxiong Wang and Andrew Chi{-}Chih Yao}, title = {Graph Coloring Applied to Secure Computation in Non-Abelian Groups}, journal = {J. Cryptol.}, volume = {25}, number = {4}, pages = {557--600}, year = {2012}, url = {https://doi.org/10.1007/s00145-011-9104-3}, doi = {10.1007/S00145-011-9104-3}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DesmedtPSSTWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/LingSSW12, author = {San Ling and Igor E. Shparlinski and Ron Steinfeld and Huaxiong Wang}, title = {On the modular inversion hidden number problem}, journal = {J. Symb. Comput.}, volume = {47}, number = {4}, pages = {358--367}, year = {2012}, url = {https://doi.org/10.1016/j.jsc.2011.09.002}, doi = {10.1016/J.JSC.2011.09.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/LingSSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhangCLLW12, author = {Zhifang Zhang and Yeow Meng Chee and San Ling and Mulan Liu and Huaxiong Wang}, title = {Threshold changeable secret sharing schemes revisited}, journal = {Theor. Comput. Sci.}, volume = {418}, pages = {106--115}, year = {2012}, url = {https://doi.org/10.1016/j.tcs.2011.09.027}, doi = {10.1016/J.TCS.2011.09.027}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhangCLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LimKW12, author = {Hoon Wei Lim and Florian Kerschbaum and Huaxiong Wang}, title = {Workflow Signatures for Business Process Compliance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {756--769}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.38}, doi = {10.1109/TDSC.2012.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LimKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenLLWN12, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Revocable Identity-Based Encryption from Lattices}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {390--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_29}, doi = {10.1007/978-3-642-31448-3\_29}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenLLWN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WuHNWL12, author = {Hongjun Wu and Tao Huang and Phuong Ha Nguyen and Huaxiong Wang and San Ling}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Differential Attacks against Stream Cipher {ZUC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {262--277}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_17}, doi = {10.1007/978-3-642-34961-4\_17}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WuHNWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NguyenRMW12, author = {Phuong Ha Nguyen and Chester Rebeiro and Debdeep Mukhopadhyay and Huaxiong Wang}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Improved Differential Cache Attacks on {SMS4}}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {29--45}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_3}, doi = {10.1007/978-3-642-38519-3\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/NguyenRMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001PSLPW12, author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang}, editor = {Anne Canteaut}, title = {On the (In)Security of {IDEA} in Various Hashing Modes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {163--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_10}, doi = {10.1007/978-3-642-34047-5\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001PSLPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/ChenLLWW12, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, editor = {Michel Abdalla and Tanja Lange}, title = {Shorter {IBE} and Signatures via Asymmetric Pairings}, booktitle = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, pages = {122--140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36334-4\_8}, doi = {10.1007/978-3-642-36334-4\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/ChenLLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldLPTW12, author = {Ron Steinfeld and San Ling and Josef Pieprzyk and Christophe Tartary and Huaxiong Wang}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {{NTRUCCA:} How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {353--371}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_21}, doi = {10.1007/978-3-642-30057-8\_21}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldLPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TangLW12, author = {ZhaoHui Tang and Hoon Wei Lim and Huaxiong Wang}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Revisiting a Secret Sharing Approach to Network Codes}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {300--317}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_20}, doi = {10.1007/978-3-642-33272-2\_20}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TangLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-5190, author = {Yeow Meng Chee and Huaxiong Wang and Liang Feng Zhang}, title = {On Bringer-Chabanne {EPIR} Protocol for Polynomial Evaluation}, journal = {CoRR}, volume = {abs/1208.5190}, year = {2012}, url = {http://arxiv.org/abs/1208.5190}, eprinttype = {arXiv}, eprint = {1208.5190}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-5190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-6441, author = {Jie Chen and Hoon Wei Lim and San Ling and Le Su and Huaxiong Wang}, title = {Anonymous and Adaptively Secure Revocable {IBE} with Constant Size Public Parameters}, journal = {CoRR}, volume = {abs/1210.6441}, year = {2012}, url = {http://arxiv.org/abs/1210.6441}, eprinttype = {arXiv}, eprint = {1210.6441}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-6441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLWW12, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, title = {Shorter {IBE} and Signatures via Asymmetric Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2012}, url = {http://eprint.iacr.org/2012/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiPSLPW12, author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang}, title = {On the (In)Security of {IDEA} in Various Hashing Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2012}, url = {http://eprint.iacr.org/2012/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiPSLPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengGLWY12, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, title = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2012}, url = {http://eprint.iacr.org/2012/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutznerNPW12, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang}, title = {On 3-share Threshold Implementations for 4-bit S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2012}, url = {http://eprint.iacr.org/2012/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutznerNPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNSW12, author = {San Ling and Khoa Nguyen and Damien Stehl{\'{e}} and Huaxiong Wang}, title = {Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2012}, url = {http://eprint.iacr.org/2012/569}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/AsgharPW11, author = {Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang}, title = {On the Hardness of the Sum of \emph{k} Mins Problem}, journal = {Comput. J.}, volume = {54}, number = {10}, pages = {1652--1660}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxr070}, doi = {10.1093/COMJNL/BXR070}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/AsgharPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/PieprzykWZ11, author = {Josef Pieprzyk and Huaxiong Wang and Xian{-}Mo Zhang}, title = {M{\"{o}}bius transforms, coincident Boolean functions and non-coincidence property of Boolean functions}, journal = {Int. J. Comput. Math.}, volume = {88}, number = {7}, pages = {1398--1416}, year = {2011}, url = {https://doi.org/10.1080/00207160.2010.509428}, doi = {10.1080/00207160.2010.509428}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/PieprzykWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/TartaryWZ11, author = {Christophe Tartary and Huaxiong Wang and Yun Zhang}, title = {An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials}, journal = {Int. J. Found. Comput. Sci.}, volume = {22}, number = {6}, pages = {1395--1416}, year = {2011}, url = {https://doi.org/10.1142/S0129054111008775}, doi = {10.1142/S0129054111008775}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/TartaryWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PoschmannMKLWL11, author = {Axel Poschmann and Amir Moradi and Khoongming Khoo and Chu{-}Wee Lim and Huaxiong Wang and San Ling}, title = {Side-Channel Resistant Crypto for Less than 2, 300 {GE}}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {322--345}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9086-6}, doi = {10.1007/S00145-010-9086-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PoschmannMKLWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TartaryWL11, author = {Christophe Tartary and Huaxiong Wang and San Ling}, title = {Authentication of Digital Streams}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {9}, pages = {6285--6303}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2161960}, doi = {10.1109/TIT.2011.2161960}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/TartaryWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenWW11, author = {Phuong Ha Nguyen and Hongjun Wu and Huaxiong Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {61--74}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_5}, doi = {10.1007/978-3-642-22497-3\_5}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/NguyenWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangTW11, author = {Yun Zhang and Christophe Tartary and Huaxiong Wang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {259--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_17}, doi = {10.1007/978-3-642-22497-3\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {433--438}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_31}, doi = {10.1007/978-3-642-22497-3\_31}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/CheeWZ11, author = {Yeow Meng Chee and Huaxiong Wang and Liang Feng Zhang}, editor = {Bin Fu and Ding{-}Zhu Du}, title = {Oblivious Transfer and n-Variate Linear Function Evaluation}, booktitle = {Computing and Combinatorics - 17th Annual International Conference, {COCOON} 2011, Dallas, TX, USA, August 14-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6842}, pages = {627--637}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22685-4\_54}, doi = {10.1007/978-3-642-22685-4\_54}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/CheeWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11, author = {Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang}, editor = {Kenneth G. Paterson}, title = {Pushing the Limits: {A} Very Compact and a Threshold Implementation of {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {69--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_6}, doi = {10.1007/978-3-642-20465-4\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YangDWTW11, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, editor = {George Danezis}, title = {Authenticated Key Exchange under Bad Randomness}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {113--126}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_10}, doi = {10.1007/978-3-642-27576-0\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/YangDWTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NguyenRW11, author = {Phuong Ha Nguyen and Matthew J. B. Robshaw and Huaxiong Wang}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {On Related-Key Attacks and {KASUMI:} The Case of {A5/3}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {146--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_12}, doi = {10.1007/978-3-642-25578-6\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NguyenRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codcry/2011, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7}, doi = {10.1007/978-3-642-20901-7}, isbn = {978-3-642-20900-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codcry/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2011}, url = {http://eprint.iacr.org/2011/201}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangTW11, author = {Yun Zhang and Christophe Tartary and Huaxiong Wang}, title = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2011}, url = {http://eprint.iacr.org/2011/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLW11, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2011}, url = {http://eprint.iacr.org/2011/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLWN11, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen}, title = {Revocable Identity-Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2011}, url = {http://eprint.iacr.org/2011/583}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLWN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLW11a, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2011}, url = {http://eprint.iacr.org/2011/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDWTW11, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, title = {Authenticated Key Exchange under Bad Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2011}, url = {http://eprint.iacr.org/2011/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/SunWKP10, author = {Hung{-}Min Sun and Huaxiong Wang and Bying{-}He Ku and Josef Pieprzyk}, title = {Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time}, journal = {{SIAM} J. Discret. Math.}, volume = {24}, number = {2}, pages = {617--638}, year = {2010}, url = {https://doi.org/10.1137/080733802}, doi = {10.1137/080733802}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/SunWKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenWWL10, author = {Phuong Ha Nguyen and Lei Wei and Huaxiong Wang and San Ling}, editor = {Ron Steinfeld and Philip Hawkes}, title = {On Multidimensional Linear Cryptanalysis}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {37--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_3}, doi = {10.1007/978-3-642-14081-5\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenWWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AsgharPW10, author = {Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang}, editor = {Jianying Zhou and Moti Yung}, title = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {349--366}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_21}, doi = {10.1007/978-3-642-13708-2\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AsgharPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuoLRW10, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, editor = {Masayuki Abe}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA-2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {56--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_4}, doi = {10.1007/978-3-642-17373-8\_4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuoLRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/WangWP10, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Colin Boyd and Willy Susilo}, title = {Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing}, booktitle = {8th Australasian Information Security Conference 2010, {AISC} 2010, Brisbane, Australia, January 2010}, series = {{CRPIT}}, volume = {105}, pages = {5--11}, publisher = {Australian Computer Society}, year = {2010}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV105Wang.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/WangWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoschmannLW10, author = {Axel Poschmann and San Ling and Huaxiong Wang}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {256 Bit Standardized Crypto for 650 {GE} - {GOST} Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {219--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_15}, doi = {10.1007/978-3-642-15031-9\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoschmannLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JiangW10, author = {Shaoquan Jiang and Huaxiong Wang}, editor = {Josef Pieprzyk}, title = {Plaintext-Awareness of Hybrid Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {57--72}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_5}, doi = {10.1007/978-3-642-11925-5\_5}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JiangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AsgharLPW10, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Cryptanalysis of the Convex Hull Click Human Identification Protocol}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {24--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_3}, doi = {10.1007/978-3-642-18178-8\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AsgharLPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-1617, author = {Yeow Meng Chee and Tao Feng and San Ling and Huaxiong Wang and Liang Feng Zhang}, title = {Query-Efficient Locally Decodable Codes of Subexponential Length}, journal = {CoRR}, volume = {abs/1008.1617}, year = {2010}, url = {http://arxiv.org/abs/1008.1617}, eprinttype = {arXiv}, eprint = {1008.1617}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-1617.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/CheeFLWZ10, author = {Yeow Meng Chee and Tao Feng and San Ling and Huaxiong Wang and Liang Feng Zhang}, title = {Query-Efficient Locally Decodable Codes}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-173}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/173}, eprinttype = {ECCC}, eprint = {TR10-173}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/CheeFLWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LRW10, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2010}, url = {http://eprint.iacr.org/2010/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharPW10, author = {Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang}, title = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2010}, url = {http://eprint.iacr.org/2010/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharLPW10, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, title = {Cryptanalysis of the Convex Hull Click Human Identification Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2010}, url = {http://eprint.iacr.org/2010/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharLPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/DesmedtDTW09, author = {Yvo Desmedt and Niels Duif and Henk van Tilborg and Huaxiong Wang}, title = {Bounds and constructions for key distribution schemes}, journal = {Adv. Math. Commun.}, volume = {3}, number = {3}, pages = {273--293}, year = {2009}, url = {https://doi.org/10.3934/amc.2009.3.273}, doi = {10.3934/AMC.2009.3.273}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/DesmedtDTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YeWPZ09, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Xian{-}Mo Zhang}, title = {Unconditionally secure disjointness tests for private datasets}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {225--235}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023471}, doi = {10.1504/IJACT.2009.023471}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YeWPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiAPSSW09, author = {Shujun Li and Hassan Jameel Asghar and Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Roland Schmitz and Huaxiong Wang}, title = {On the Security of {PAS} (Predicate-Based Authentication Service)}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.27}, doi = {10.1109/ACSAC.2009.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiAPSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09, author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {LAKE} Hash Family}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_10}, doi = {10.1007/978-3-642-03317-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Pasupathinathan09, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Privacy Enhancements for Hardware-Based Security Modules}, booktitle = {e-Business and Telecommunications - 6th International Joint Conference, {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {130}, pages = {224--236}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20077-9\_16}, doi = {10.1007/978-3-642-20077-9\_16}, timestamp = {Sat, 19 Oct 2019 20:35:36 +0200}, biburl = {https://dblp.org/rec/conf/icete/Pasupathinathan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YeSPW09, author = {Qingsong Ye and Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Efficient Fuzzy Matching and Intersection on Private Datasets}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {211--228}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_15}, doi = {10.1007/978-3-642-14423-3\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YeSPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ChenLPWX09, author = {Hao Chen and San Ling and Carles Padr{\'{o}} and Huaxiong Wang and Chaoping Xing}, editor = {Matthew Geoffrey Parker}, title = {Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {263--277}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_16}, doi = {10.1007/978-3-642-10868-6\_16}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/ChenLPWX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Pseudo-collisions for Hash Functions {ARIRANG-224/384}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {141--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_9}, doi = {10.1007/978-3-642-05445-7\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW09, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Certified Pseudonyms Colligated with Master Secret Key}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {190--197}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codcry/2009, editor = {Yeow Meng Chee and Chao Li and San Ling and Huaxiong Wang and Chaoping Xing}, title = {Coding and Cryptology, Second International Workshop, {IWCC} 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5557}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01877-0}, doi = {10.1007/978-3-642-01877-0}, isbn = {978-3-642-01813-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codcry/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMKLW09, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, title = {Practical pseudo-collisions for hash functions {ARIRANG-224/384}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2009}, url = {http://eprint.iacr.org/2009/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoMKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiAPSSW09, author = {Shujun Li and Hassan Jameel Asghar and Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Roland Schmitz and Huaxiong Wang}, title = {On the Security of {PAS} (Predicate-based Authentication Service)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2009}, url = {http://eprint.iacr.org/2009/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiAPSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/PasupathinathanPW08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, title = {Security Analysis of Australian and {E.U.} E-passport Implementation}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {3}, pages = {187--206}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.3.187.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/PasupathinathanPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/YuanDWP08, author = {Jin Yuan and Cunsheng Ding and Huaxiong Wang and Josef Pieprzyk}, title = {Permutation polynomials of the form (x\({}^{\mbox{p}}\)-x+delta)\({}^{\mbox{s}}\)+L(x)}, journal = {Finite Fields Their Appl.}, volume = {14}, number = {2}, pages = {482--493}, year = {2008}, url = {https://doi.org/10.1016/j.ffa.2007.05.003}, doi = {10.1016/J.FFA.2007.05.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/YuanDWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TartaryZLWP08, author = {Christophe Tartary and Sujing Zhou and Dongdai Lin and Huaxiong Wang and Josef Pieprzyk}, title = {Analysis of bilinear pairing-based accumulator for identity escrowing}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {99--107}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070091}, doi = {10.1049/IET-IFS:20070091}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TartaryWP08, author = {Christophe Tartary and Huaxiong Wang and Josef Pieprzyk}, title = {A coding approach to the multicast stream authentication problem}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {265--283}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0048-4}, doi = {10.1007/S10207-007-0048-4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TartaryWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/YangWWD08, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, title = {Two-factor mutual authentication based on smart cards and passwords}, journal = {J. Comput. Syst. Sci.}, volume = {74}, number = {7}, pages = {1160--1172}, year = {2008}, url = {https://doi.org/10.1016/j.jcss.2008.04.002}, doi = {10.1016/J.JCSS.2008.04.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/YangWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/WangWW08, author = {Yan Wang and Duncan S. Wong and Huaxiong Wang}, title = {Employ a mobile agent for making a payment}, journal = {Mob. Inf. Syst.}, volume = {4}, number = {1}, pages = {51--68}, year = {2008}, url = {https://doi.org/10.1155/2008/402519}, doi = {10.1155/2008/402519}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/WangWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangW08, author = {Huaxiong Wang and Duncan S. Wong}, title = {On Secret Reconstruction in Secret Sharing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {1}, pages = {473--480}, year = {2008}, url = {https://doi.org/10.1109/TIT.2007.911179}, doi = {10.1109/TIT.2007.911179}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YeWT08, author = {Qingsong Ye and Huaxiong Wang and Christophe Tartary}, title = {Privacy-Preserving Distributed Set Intersection}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1332--1339}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.134}, doi = {10.1109/ARES.2008.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/YeWT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunWWG08, author = {Hung{-}Min Sun and Mu{-}En Wu and Huaxiong Wang and Jian Guo}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {On the Improvement of the {BDF} Attack on {LSBS-RSA}}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {84--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_7}, doi = {10.1007/978-3-540-70500-0\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunWWG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YeWPZ08, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Efficient Disjointness Tests for Private Datasets}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {155--169}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_12}, doi = {10.1007/978-3-540-70500-0\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/YeWPZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/WangWP08, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, title = {Improvement of a Dynamic Accumulator at {ICICS} 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {1381--1386}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.98}, doi = {10.1109/APSCC.2008.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/WangWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangLCLW08, author = {Zhifang Zhang and Mulan Liu and Yeow Meng Chee and San Ling and Huaxiong Wang}, editor = {Josef Pieprzyk}, title = {Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {19--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_2}, doi = {10.1007/978-3-540-89255-7\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangLCLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Pasupathinathan08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Formal Security Analysis of Australian E-passport Implementation}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {75--82}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Vijayakrishnan.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Pasupathinathan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunWSGW08, author = {Hung{-}Min Sun and Mu{-}En Wu and Ron Steinfeld and Jian Guo and Huaxiong Wang}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant Bits}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {49--63}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_4}, doi = {10.1007/978-3-540-89641-8\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SunWSGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangWP08, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {178--195}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_13}, doi = {10.1007/978-3-540-89641-8\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/WangWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08, author = {Ron Steinfeld and Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Jian Guo and San Ling and Huaxiong Wang}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of {LASH}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {207--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_13}, doi = {10.1007/978-3-540-71039-4\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PasupathinathanPW08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {An On-Line Secure E-Passport Protocol}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {14--28}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_2}, doi = {10.1007/978-3-540-79104-1\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PasupathinathanPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuanYWP08, author = {Jin Yuan and Qingsong Ye and Huaxiong Wang and Josef Pieprzyk}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Secure Computation of the Vector Dominance Problem}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {319--333}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_23}, doi = {10.1007/978-3-540-79104-1\_23}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YuanYWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YeWP08, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Distributed Private Matching and Set Operations}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {347--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_25}, doi = {10.1007/978-3-540-79104-1\_25}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YeWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuWL08, author = {Yi Lu and Huaxiong Wang and San Ling}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Cryptanalysis of Rabbit}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {204--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_14}, doi = {10.1007/978-3-540-85886-7\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LuWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Fair e-Tendering Protocol}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {294--299}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/WangWP08, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Viliam Geffert and Juhani Karhum{\"{a}}ki and Alberto Bertoni and Bart Preneel and Pavol N{\'{a}}vrat and M{\'{a}}ria Bielikov{\'{a}}}, title = {Threshold Privacy Preserving Keyword Searches}, booktitle = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 19-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4910}, pages = {646--658}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77566-9\_56}, doi = {10.1007/978-3-540-77566-9\_56}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sofsem/WangWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangWP08, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {145--159}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_11}, doi = {10.1007/978-3-642-00306-6\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0812-2518, author = {Zhifang Zhang and Mulan Liu and Yeow Meng Chee and San Ling and Huaxiong Wang}, title = {Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes}, journal = {CoRR}, volume = {abs/0812.2518}, year = {2008}, url = {http://arxiv.org/abs/0812.2518}, eprinttype = {arXiv}, eprint = {0812.2518}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0812-2518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunWSGW08, author = {Hung{-}Min Sun and Mu{-}En Wu and Ron Steinfeld and Jian Guo and Huaxiong Wang}, title = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2008}, url = {http://eprint.iacr.org/2008/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/TilborgPSW07, author = {Henk van Tilborg and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang}, title = {New constructions of anonymous membership broadcasting schemes}, journal = {Adv. Math. Commun.}, volume = {1}, number = {1}, pages = {29--44}, year = {2007}, url = {https://doi.org/10.3934/amc.2007.1.29}, doi = {10.3934/AMC.2007.1.29}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/TilborgPSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, title = {Efficient multicast stream authentication for the fully adversarial network model}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {175--191}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013172}, doi = {10.1504/IJSN.2007.013172}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SteinfeldPW07, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, title = {Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {7}, pages = {2542--2559}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.899541}, doi = {10.1109/TIT.2007.899541}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SteinfeldPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Combining Prediction Hashing and {MDS} Codes for Efficient Multicast Stream Authentication}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {293--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_22}, doi = {10.1007/978-3-540-73458-1\_22}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TartaryPW08, author = {Christophe Tartary and Josef Pieprzyk and Huaxiong Wang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {167--181}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_14}, doi = {10.1007/978-3-540-79499-8\_14}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TartaryPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtPSW07, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang}, editor = {Alfred Menezes}, title = {On Secure Multi-party Computation in Black-Box Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {591--612}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_33}, doi = {10.1007/978-3-540-74143-5\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtPSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SteinfeldPW07, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, editor = {Masayuki Abe}, title = {How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {357--371}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_23}, doi = {10.1007/11967668\_23}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/SteinfeldPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWP07, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {A New Dynamic Accumulator for Batch Updates}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {98--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_8}, doi = {10.1007/978-3-540-77048-0\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TartaryWP07, author = {Christophe Tartary and Huaxiong Wang and Josef Pieprzyk}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {17--34}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_2}, doi = {10.1007/978-3-540-75670-5\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/TartaryWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WangWP07, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Willem Jonker and Milan Petkovic}, title = {Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {108--123}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_8}, doi = {10.1007/978-3-540-75248-6\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/WangWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2007, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9}, doi = {10.1007/978-3-540-76969-9}, isbn = {978-3-540-76968-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YeWT07, author = {Qingsong Ye and Huaxiong Wang and Christophe Tartary}, title = {Privacy-Preserving Distributed Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2007}, url = {http://eprint.iacr.org/2007/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YeWT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ContiniMPSGLW07, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang}, title = {Cryptanalysis of {LASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2007}, url = {http://eprint.iacr.org/2007/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LongPWW06, author = {Shoulun Long and Josef Pieprzyk and Huaxiong Wang and Duncan S. Wong}, title = {Generalised Cumulative Arrays in Secret Sharing}, journal = {Des. Codes Cryptogr.}, volume = {40}, number = {2}, pages = {191--209}, year = {2006}, url = {https://doi.org/10.1007/s10623-006-0007-5}, doi = {10.1007/S10623-006-0007-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LongPWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Safavi-NainiW06, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Secret sharing schemes with partial broadcast channels}, journal = {Des. Codes Cryptogr.}, volume = {41}, number = {1}, pages = {5--22}, year = {2006}, url = {https://doi.org/10.1007/s10623-006-0027-1}, doi = {10.1007/S10623-006-0027-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Safavi-NainiW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/SteinfeldPW06, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, title = {Lattice-based threshold-changeability for standard {CRT} secret-sharing schemes}, journal = {Finite Fields Their Appl.}, volume = {12}, number = {4}, pages = {653--680}, year = {2006}, url = {https://doi.org/10.1016/j.ffa.2005.04.007}, doi = {10.1016/J.FFA.2005.04.007}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/SteinfeldPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/Safavi-NainiWW06, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang and Duncan S. Wong}, title = {Resilient Lkh: Secure Multicast Key Distribution Schemes}, journal = {Int. J. Found. Comput. Sci.}, volume = {17}, number = {5}, pages = {1205--1222}, year = {2006}, url = {https://doi.org/10.1142/S0129054106004340}, doi = {10.1142/S0129054106004340}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/Safavi-NainiWW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/PasupathinathanPWC06, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang and Joo Yeon Cho}, editor = {Rajkumar Buyya and Tianchi Ma and Reihaneh Safavi{-}Naini and Chris Steketee and Willy Susilo}, title = {Formal analysis of card-based payment systems in mobile devices}, booktitle = {The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania, Australia, January 2006}, series = {{CRPIT}}, volume = {54}, pages = {213--220}, publisher = {Australian Computer Society}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1151853}, timestamp = {Mon, 26 Nov 2018 12:14:45 +0100}, biburl = {https://dblp.org/rec/conf/acsw/PasupathinathanPWC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SteinfeldPW06, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, editor = {Xuejia Lai and Kefei Chen}, title = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {194--209}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_13}, doi = {10.1007/11935230\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SteinfeldPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TartaryW06, author = {Christophe Tartary and Huaxiong Wang}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Achieving Multicast Stream Authentication Using {MDS} Codes}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {108--125}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_7}, doi = {10.1007/11935070\_7}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/TartaryW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaPW06, author = {Gaurav Gupta and Josef Pieprzyk and Huaxiong Wang}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {An attack-localizing watermarking scheme for natural language documents}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {157--165}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128842}, doi = {10.1145/1128817.1128842}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GuptaPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TartaryW06, author = {Christophe Tartary and Huaxiong Wang}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {103--117}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_9}, doi = {10.1007/11937807\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TartaryW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangWWD06, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {82--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_7}, doi = {10.1007/11935308\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YangWWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtPSW06, author = {Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Huaxiong Wang}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {459--475}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_33}, doi = {10.1007/11836810\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/DesmedtPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TartaryW06, author = {Christophe Tartary and Huaxiong Wang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Rateless Codes for the Multicast Stream Authentication Problem}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {136--151}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_10}, doi = {10.1007/11908739\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TartaryW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldPW06, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {157--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_11}, doi = {10.1007/11745853\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YangWDW06, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Anonymous Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {347--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_23}, doi = {10.1007/11745853\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YangWDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldPW06, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, title = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2006}, url = {http://eprint.iacr.org/2006/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWWD06, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, title = {Formal Analysis and Systematic Construction of Two-factor Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2006}, url = {http://eprint.iacr.org/2006/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartinSWW05, author = {Keith M. Martin and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, title = {Distributing the Encryption and Decryption of a Block Cipher}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {263--287}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1719-4}, doi = {10.1007/S10623-003-1719-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MartinSWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/DesmedtWSW05, author = {Yvo Desmedt and Yongge Wang and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Lusheng Wang}, title = {Radio Networks with Reliable Communication}, booktitle = {Computing and Combinatorics, 11th Annual International Conference, {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3595}, pages = {156--166}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533719\_18}, doi = {10.1007/11533719\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/DesmedtWSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldCWP05, author = {Ron Steinfeld and Scott Contini and Huaxiong Wang and Josef Pieprzyk}, editor = {Serge Vaudenay}, title = {Converse Results to the Wiener Attack on {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {184--198}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_13}, doi = {10.1007/978-3-540-30580-4\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldCWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/PasupathinathanPW05, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, title = {Privacy Enhanced Electronic Cheque System}, booktitle = {7th {IEEE} International Conference on E-Commerce Technology {(CEC} 2005), 19-22 July 2005, M{\"{u}}nchen, Germany}, pages = {431--434}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECT.2005.68}, doi = {10.1109/ICECT.2005.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/PasupathinathanPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wine/WuLCW05, author = {Bangyu Wu and Kwok{-}Yan Lam and Siu Leung Chung and Huaxiong Wang}, editor = {Xiaotie Deng and Yinyu Ye}, title = {Secure Construction of Virtual Organizations in Grid Computing Systems}, booktitle = {Internet and Network Economics, First International Workshop, {WINE} 2005, Hong Kong, China, December 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3828}, pages = {959--968}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11600930\_97}, doi = {10.1007/11600930\_97}, timestamp = {Sun, 18 Dec 2022 19:02:44 +0100}, biburl = {https://dblp.org/rec/conf/wine/WuLCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TartaryW05, author = {Christophe Tartary and Huaxiong Wang}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient Multicast Stream Authentication for the Fully Adversarial Network Model}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {108--125}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_9}, doi = {10.1007/11604938\_9}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TartaryW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2005, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371}, doi = {10.1007/11599371}, isbn = {3-540-30849-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWDW05, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, title = {Anonymous Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2005}, url = {http://eprint.iacr.org/2005/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWDW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/WangP04, author = {Huaxiong Wang and Josef Pieprzyk}, title = {Shared generation of pseudo-random functions}, journal = {J. Complex.}, volume = {20}, number = {2-3}, pages = {458--472}, year = {2004}, url = {https://doi.org/10.1016/j.jco.2003.08.021}, doi = {10.1016/J.JCO.2003.08.021}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/WangP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SteinfeldWP04, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, editor = {Pil Joong Lee}, title = {Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {170--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_13}, doi = {10.1007/978-3-540-30539-2\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SteinfeldWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/awcc/KurnioWPG04, author = {Hartono Kurnio and Huaxiong Wang and Josef Pieprzyk and Kris Gaj}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Securing Multicast Groups in Ad Hoc Networks}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {194--207}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_24}, doi = {10.1007/978-3-540-30483-8\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/awcc/KurnioWPG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SteinfeldWP04, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {86--100}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_7}, doi = {10.1007/978-3-540-24632-9\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/SteinfeldWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2004, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98755}, doi = {10.1007/B98755}, isbn = {3-540-22379-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangXS03, author = {Huaxiong Wang and Chaoping Xing and Reihaneh Safavi{-}Naini}, title = {Linear authentication codes: bounds and constructions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {4}, pages = {866--872}, year = {2003}, url = {https://doi.org/10.1109/TIT.2003.809567}, doi = {10.1109/TIT.2003.809567}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangXS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangP03, author = {Huaxiong Wang and Josef Pieprzyk}, editor = {Chi{-}Sung Laih}, title = {Efficient One-Time Proxy Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {507--522}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_32}, doi = {10.1007/978-3-540-40061-5\_32}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SteinfeldBWP03, author = {Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk}, editor = {Chi{-}Sung Laih}, title = {Universal Designated-Verifier Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {523--542}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_33}, doi = {10.1007/978-3-540-40061-5\_33}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SteinfeldBWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangP03, author = {Huaxiong Wang and Josef Pieprzyk}, editor = {Marc Joye}, title = {Shared Generation of Pseudo-Random Functions with Cumulative Maps}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {281--294}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_19}, doi = {10.1007/3-540-36563-X\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/WangP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PieprzykWX03, author = {Josef Pieprzyk and Huaxiong Wang and Chaoping Xing}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {88--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_7}, doi = {10.1007/978-3-540-24654-1\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/PieprzykWX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinSWW03, author = {Keith M. Martin and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, title = {Distributing the Encryption and Decryption of a Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2003}, url = {http://eprint.iacr.org/2003/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinSWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldBWP03, author = {Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk}, title = {Universal Designated-Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2003}, url = {http://eprint.iacr.org/2003/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldBWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldWP03, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, title = {Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2003}, url = {http://eprint.iacr.org/2003/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/Safavi-NainiW02, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Bounds and Constructions for Threshold Shared Generation of Authenticators}, journal = {Int. J. Comput. Math.}, volume = {79}, number = {12}, pages = {1285--1301}, year = {2002}, url = {https://doi.org/10.1080/00207160214648}, doi = {10.1080/00207160214648}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/Safavi-NainiW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Secure Re-keying Scheme with Key Recovery Property}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {40--55}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_4}, doi = {10.1007/3-540-45450-0\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/WangP02, author = {Huaxiong Wang and Josef Pieprzyk}, editor = {Oscar H. Ibarra and Louxin Zhang}, title = {A Combinatorial Approach to Anonymous Membership Broadcast}, booktitle = {Computing and Combinatorics, 8th Annual International Conference, {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2387}, pages = {162--170}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45655-4\_19}, doi = {10.1007/3-540-45655-4\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/WangP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DesmedtSW02, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Matt Blaze}, title = {Redistribution of Mechanical Secret Shares}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {238--252}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_17}, doi = {10.1007/3-540-36504-4\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DesmedtSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MartinPSWW02, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Threshold MACs}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {237--252}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_17}, doi = {10.1007/3-540-36552-4\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MartinPSWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KurnioMSW02, author = {Hartono Kurnio and Luke McAven and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Dynamic Group Key Distribution Scheme with Flexible User Join}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {478--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_33}, doi = {10.1007/3-540-36552-4\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A Group Key Distribution Scheme with Decentralised User Join}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {146--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_11}, doi = {10.1007/3-540-36413-7\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DesmedtSWBCP01, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang and Lynn Margaret Batten and Chris Charnes and Josef Pieprzyk}, title = {Broadcast anti-jamming systems}, journal = {Comput. Networks}, volume = {35}, number = {2-3}, pages = {223--236}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(00)00169-9}, doi = {10.1016/S1389-1286(00)00169-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DesmedtSWBCP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/WangX01, author = {Huaxiong Wang and Chaoping Xing}, title = {Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields}, journal = {J. Comb. Theory, Ser. {A}}, volume = {93}, number = {1}, pages = {112--124}, year = {2001}, url = {https://doi.org/10.1006/jcta.2000.3068}, doi = {10.1006/JCTA.2000.3068}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/WangX01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Safavi-NainiSW01, author = {Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, title = {An Efficient Construction for Fail-Stop Signature for Long Messages}, journal = {J. Inf. Sci. Eng.}, volume = {17}, number = {6}, pages = {879--898}, year = {2001}, url = {http://www.iis.sinica.edu.tw/page/jise/2001/200111\_02.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Safavi-NainiSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Safavi-NainiW01, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Broadcast authentication for group communication}, journal = {Theor. Comput. Sci.}, volume = {269}, number = {1-2}, pages = {1--21}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(00)00184-5}, doi = {10.1016/S0304-3975(00)00184-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Safavi-NainiW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01, author = {Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Vijay Varadharajan and Yi Mu}, title = {How to Construct Fail-Stop Confirmer Signature Schemes}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {435--444}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_34}, doi = {10.1007/3-540-47719-5\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SongWS01, author = {Beomsik Song and Huaxiong Wang and Jennifer Seberry}, editor = {Kwangjo Kim}, title = {A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {18--31}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_2}, doi = {10.1007/3-540-45861-1\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SongWS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KurnioSW01, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kwangjo Kim}, title = {Efficient Revocation Schemes for Secure Multicast}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {160--177}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_13}, doi = {10.1007/3-540-45861-1\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KurnioSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Safavi-Naini1WX01, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang and Chaoping Xing}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {Linear Authentication Codes: Bounds and Constructions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {127--135}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_13}, doi = {10.1007/3-540-45311-3\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Safavi-Naini1WX01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/XingWL00, author = {Chaoping Xing and Huaxiong Wang and Kwok{-}Yan Lam}, title = {Constructions of authentication codes from algebraic curves over finite fields}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {886--892}, year = {2000}, url = {https://doi.org/10.1109/18.841168}, doi = {10.1109/18.841168}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/XingWL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSSW00, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Key Management for Secure Multicast with Dynamic Controller}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {178--190}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_15}, doi = {10.1007/10718964\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangLXZ00, author = {Huaxiong Wang and Kwok{-}Yan Lam and Guozhen Xiao and Huanhui Zhao}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {On Multiplicative Secret Sharing Schemes}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {342--351}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_28}, doi = {10.1007/10718964\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangLXZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Safavi-NainiW00, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {New constructions for multicast re-keying schemes using perfect hash families}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {228--234}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352637}, doi = {10.1145/352600.352637}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Safavi-NainiW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Safavi-NainiSW00, author = {Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Fail-Stop Signature for Long Messages}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {165--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_15}, doi = {10.1007/3-540-44495-5\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Safavi-NainiSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/MartinPSW99, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Changing Thresholds in the Absence of Secure Channels}, journal = {Aust. Comput. J.}, volume = {31}, number = {2}, pages = {34--43}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/MartinPSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MartinRW99, author = {Keith M. Martin and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures}, journal = {Comput. J.}, volume = {42}, number = {8}, pages = {638--649}, year = {1999}, url = {https://doi.org/10.1093/comjnl/42.8.638}, doi = {10.1093/COMJNL/42.8.638}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MartinRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Safavi-NainiW99, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions}, journal = {Inf. Comput.}, volume = {151}, number = {1-2}, pages = {148--172}, year = {1999}, url = {https://doi.org/10.1006/inco.1998.2769}, doi = {10.1006/INCO.1998.2769}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Safavi-NainiW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MartinPSW99, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Changing Thresholds in the Absence of Secure Channels}, booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1587}, pages = {177--191}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48970-3\_15}, doi = {10.1007/3-540-48970-3\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW99, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Broadcast Authentication in Group Communication}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {399--411}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_32}, doi = {10.1007/978-3-540-48000-6\_32}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Safavi-NainiWL99, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang and Kwok{-}Yan Lam}, editor = {JooSeok Song}, title = {A New Approach to Robust Threshold {RSA} Signature Schemes}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {184--196}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_15}, doi = {10.1007/10719994\_15}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Safavi-NainiWL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/DesmedtSWCP99, author = {Yvo Desmedt and Reihaneh Safavi{-}Naini and Huaxiong Wang and Chris Charnes and Josef Pieprzyk}, title = {Broadcast anti-jamming systems}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 1999, {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October 1, 1999}, pages = {349--355}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICON.1999.796197}, doi = {10.1109/ICON.1999.796197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/DesmedtSWCP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Wang98, author = {Huaxiong Wang}, title = {On Syntactic Nuclei of Rational Languages}, journal = {Inf. Process. Lett.}, volume = {67}, number = {5}, pages = {221--226}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00120-3}, doi = {10.1016/S0020-0190(98)00120-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Wang98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Wang98b, author = {Huaxiong Wang}, title = {On Rational Series and Rational Languages}, journal = {Theor. Comput. Sci.}, volume = {205}, number = {1-2}, pages = {329--336}, year = {1998}, url = {https://doi.org/10.1016/S0304-3975(98)00103-0}, doi = {10.1016/S0304-3975(98)00103-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Wang98b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GhodosiPSW98, author = {Hossein Ghodosi and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Colin Boyd and Ed Dawson}, title = {On Construction of Cumulative Secret Sharing Schemes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {379--390}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053749}, doi = {10.1007/BFB0053749}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GhodosiPSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW98, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Bounds and Constructions for Multireceiver Authentication Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {242--256}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_20}, doi = {10.1007/3-540-49649-1\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Safavi-NainiW98, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kaisa Nyberg}, title = {New Results on Multi-Receiver Authentication Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {527--541}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054151}, doi = {10.1007/BFB0054151}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Safavi-NainiW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.