Browsing by Author Wang, Huaxiong


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 39  next >
Issue DateTitleAuthor(s)
2010256 bit standardized crypto for 650 GE – GOST revisitedPoschmann, Axel; Ling, San; Wang, Huaxiong
2010Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2Guo, Jian; Ling, San; Rechberger, Christian; Wang, Huaxiong
2016Analysis of Gong et al.'s CCA2-secure homomorphic encryptionLee, Hyung Tae; Ling, San; Wang, Huaxiong
2016CCA2 Attack and Modification of Huang et al .’s Public Key Encryption with Authorized Equality TestLee, Hyung Tae; Ling, San; Seo, Jae Hong; Wang, Huaxiong
2017Construction of de Bruijn sequences from product of two irreducible polynomialsChang, Zuling; Ezerman, Martianus Frederic; Ling, San; Wang, Huaxiong
2009Cryptanalysis of the LAKE hash familyBiryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikoli´c, Ivica; Pieprzyk, Josef; Wang, Huaxiong
2017The cycle structure of LFSR with arbitrary characteristic polynomial over finite fieldsChang, Zuling; Ezerman, Martianus Frederic; Ling, San; Wang, Huaxiong
2018Double verification protocol via secret sharing for low-cost RFID tagsLiu, Yali; Ezerman, Martianus Frederic; Wang, Huaxiong
 2018Efficient public key encryption with equality test in the standard modelZhang, Kai; Chen, Jie; Lee, Hyung Tae; Qian, Haifeng; Wang, Huaxiong
 2018Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problemAung, Khin Mi Mi; Lee, Hyung Tae; Tan, Benjamin Hong Meng; Wang, Huaxiong
 2011Graph coloring applied to secure computation in non-Abelian groupsYao, Andrew Chi-Chih; Wang, Huaxiong; Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Christophe
2015Group signatures from lattices : simpler, tighter, shorter, ring-basedLing, San; Nguyen, Khoa; Wang, Huaxiong
2011Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster)Wei, Lei; Rechberger, Christian; Guo, Jian; Wu, Hongjun; Wang, Huaxiong; Ling, San
 2018A lattice-based group signature scheme with verifier-local revocationLing, San; Nguyen, Khoa; Roux-Langlois, Adeline; Wang, Huaxiong
2019A lattice-based linkable ring signature supporting stealth addressesLiu, Zhen; Nguyen, Khoa; Yang, Guomin; Wang, Huaxiong; Wong, Duncan S.
2019Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storageZhang, Xiaojun; Tang, Yao; Wang, Huaxiong; Xu, Chunxiang; Miao, Yinbin; Cheng, Hang
2019New results on modular inversion hidden number problem and inversive congruential generatorXu, Jun; Sarkar, Santanu; Hu, Lei; Wang, Huaxiong; Pan, Yanbin
2013On 3-share threshold implementations for 4-Bit S-boxesKutzner, Sebastian; Nguyen, Phuong Ha; Poschmann, Axel; Wang, Huaxiong
2018On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomialsChang, Zuling; Ezerman, Martianus Frederic; Ling, San; Wang, Huaxiong
2010On multidimensional linear cryptanalysisNguyen, Phuong Ha; Wei, Lei; Wang, Huaxiong; Ling, San