Huaxiong Wang
Titre
Citée par
Citée par
Année
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Annual International Conference on the Theory and Applications of …, 2011
4212011
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
2592003
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2162008
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004
H Wang, J Pieprzyk, V Varadharajan
Proceedings 3108, 0
187*
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24 (2), 322-345, 2011
1622011
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
1252004
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
International Conference on the Theory and Application of Cryptology and …, 2010
1132010
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
International Workshop on Public Key Cryptography, 345-361, 2014
1092014
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1072003
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Annual International Conference on the Theory and Applications of …, 2016
1052016
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
International Workshop on Public Key Cryptography, 107-124, 2013
1052013
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1002001
Group signatures from lattices: simpler, tighter, shorter, ring-based
S Ling, K Nguyen, H Wang
IACR International Workshop on Public Key Cryptography, 427-449, 2015
912015
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
B Libert, S Ling, F Mouhartem, K Nguyen, H Wang
International Conference on the Theory and Application of Cryptology and …, 2016
902016
256 bit standardized crypto for 650 GE–GOST revisited
A Poschmann, S Ling, H Wang
International Workshop on Cryptographic Hardware and Embedded Systems, 219-233, 2010
832010
Multireceiver authentication codes: models, bounds, constructions, and extensions
R Safavi-Naini, H Wang
Information and Computation 151 (1-2), 148-172, 1999
831999
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
802013
New results on multi-receiver authentication codes
R Safavi-Naini, H Wang
International Conference on the Theory and Applications of Cryptographic …, 1998
801998
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
712008
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
692012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20