Huaxiong Wang
Titel
Citeras av
Citeras av
År
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Annual International Conference on the Theory and Applications of …, 2011
3912011
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
2512003
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2092008
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24 (2), 322-345, 2011
1512011
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
1212004
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
International Conference on the Theory and Application of Cryptology and …, 2010
1092010
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1062003
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
International Workshop on Public Key Cryptography, 345-361, 2014
1042014
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1042001
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
International Workshop on Public Key Cryptography, 107-124, 2013
972013
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Annual International Conference on the Theory and Applications of …, 2016
952016
Multireceiver authentication codes: models, bounds, constructions, and extensions
R Safavi-Naini, H Wang
Information and Computation 151 (1-2), 148-172, 1999
851999
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
B Libert, S Ling, F Mouhartem, K Nguyen, H Wang
International Conference on the Theory and Application of Cryptology and …, 2016
842016
Group signatures from lattices: simpler, tighter, shorter, ring-based
S Ling, K Nguyen, H Wang
IACR International Workshop on Public Key Cryptography, 427-449, 2015
842015
New results on multi-receiver authentication codes
R Safavi-Naini, H Wang
International Conference on the Theory and Applications of Cryptographic …, 1998
791998
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
782013
256 bit standardized crypto for 650 GE–GOST revisited
A Poschmann, S Ling, H Wang
International Workshop on Cryptographic Hardware and Embedded Systems, 219-233, 2010
772010
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
702012
Distributed private matching and set operations
Q Ye, H Wang, J Pieprzyk
International Conference on Information security practice and experience …, 2008
702008
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
672008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20