


default search action
Huaxiong Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j132]Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2025(1): 440-455 (2025) - [i97]Xuankai Yang, Yan Wang, Xiuzhen Zhang, Shoujin Wang, Huaxiong Wang, Kwok-Yan Lam:
A Macro- and Micro-Hierarchical Transfer Learning Framework for Cross-Domain Fake News Detection. CoRR abs/2502.14403 (2025) - [i96]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang:
Bootstrapping with RMFE for Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2025: 350 (2025) - [i95]Yuejun Wang, Baocang Wang, Qiqi Lai, Huaxiong Wang:
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality. IACR Cryptol. ePrint Arch. 2025: 361 (2025) - 2024
- [j131]Jinlu Liu, Jing Qin
, Wenchao Wang, Lin Mei, Huaxiong Wang:
Key-aggregate based access control encryption for flexible cloud data sharing. Comput. Stand. Interfaces 88: 103800 (2024) - [j130]Linru Zhang
, Xiangning Wang
, Jiabo Wang
, Rachael Pung, Huaxiong Wang
, Kwok-Yan Lam
:
An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling. IEEE Internet Things J. 11(9): 15272-15284 (2024) - [j129]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian elimination hardware for cryptographic purposes. J. Cryptogr. Eng. 14(2): 383-397 (2024) - [j128]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group encryption: Full dynamicity, message filtering and code-based instantiation. Theor. Comput. Sci. 1007: 114678 (2024) - [j127]Hang Cheng
, Xibin Li
, Huaxiong Wang
, Xinpeng Zhang
, Ximeng Liu
, Meiqing Wang
, Fengyong Li
:
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models. IEEE Trans. Circuits Syst. Video Technol. 34(1): 97-109 (2024) - [j126]Yinbin Miao
, Feng Li
, Xiaohua Jia
, Huaxiong Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. IEEE Trans. Dependable Secur. Comput. 21(4): 3247-3261 (2024) - [j125]Kwok-Yan Lam
, Xianhui Lu
, Linru Zhang
, Xiangning Wang
, Huaxiong Wang
, Si Qi Goh
:
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service. IEEE Trans. Dependable Secur. Comput. 21(5): 4451-4468 (2024) - [j124]Jingwei Hu
, Yongjun Zhao
, Benjamin Hong Meng Tan
, Khin Mi Mi Aung
, Huaxiong Wang
:
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 6184-6196 (2024) - [j123]Stanislav Kruglik
, Son Hoang Dau
, Han Mao Kiah
, Huaxiong Wang
, Liang Feng Zhang
:
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval. IEEE Trans. Inf. Forensics Secur. 19: 8172-8187 (2024) - [j122]Han Mao Kiah
, Wilton Kim
, Stanislav Kruglik
, San Ling
, Huaxiong Wang
:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. IEEE Trans. Inf. Theory 70(8): 5552-5565 (2024) - [j121]Jinlu Liu
, Jing Qin
, Xi Zhang, Huaxiong Wang
:
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage. IEEE Trans. Knowl. Data Eng. 36(11): 6042-6055 (2024) - [c153]Haofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang:
Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency. CSCWD 2024: 163-168 - [c152]Xuankai Yang, Yan Wang, Xiuzhen Zhang, Shoujin Wang, Huaxiong Wang, Kwok-Yan Lam:
UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection. DSAA 2024: 1-10 - [c151]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. ESORICS (3) 2024: 238-258 - [c150]Yan Xu, Li-Ping Wang, Huaxiong Wang:
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. ICICS (2) 2024: 107-127 - [c149]Yan Xu, Guizhen Zhu, Huaxiong Wang, Li-Ping Wang:
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding. ISC (1) 2024: 252-272 - [c148]San Ling
, Khoa Nguyen
, Duong Hieu Phan
, Khai Hanh Tang
, Huaxiong Wang
, Yanhong Xu
:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Public Key Cryptography (1) 2024: 37-73 - [c147]San Ling
, Khai Hanh Tang
, Khu Vu
, Huaxiong Wang
, Yingfei Yan
:
Succinct Non-subsequence Arguments. SCN (1) 2024: 24-45 - [i94]Jiabo Wang, Elmo Xuyun Huang, Pu Duan, Huaxiong Wang, Kwok-Yan Lam:
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data. CoRR abs/2410.04746 (2024) - [i93]San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. IACR Cryptol. ePrint Arch. 2024: 22 (2024) - [i92]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 453 (2024) - [i91]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices. IACR Cryptol. ePrint Arch. 2024: 1023 (2024) - [i90]San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan:
Succinct Non-Subsequence Arguments. IACR Cryptol. ePrint Arch. 2024: 1264 (2024) - 2023
- [j120]Kexin Xu
, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Threshold Homomorphic Encryption From Provably Secure NTRU. Comput. J. 66(12): 2861-2873 (2023) - [j119]Jian Ding, Changlu Lin
, Fuchun Lin, Huaxiong Wang:
Full threshold change range of threshold changeable secret sharing. Des. Codes Cryptogr. 91(7): 2421-2447 (2023) - [j118]Kexin Xu
, Benjamin Hong Meng Tan
, Li-Ping Wang, Khin Mi Mi Aung
, Huaxiong Wang:
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption. J. Inf. Secur. Appl. 77: 103582 (2023) - [j117]Benoît Libert, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. J. Cryptol. 36(3): 23 (2023) - [j116]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field. J. Syst. Sci. Complex. 36(1): 129-150 (2023) - [j115]Jingting Xue, Shuqin Luo
, Qinfang Deng, Lingjie Shi, Xiaojun Zhang, Huaxiong Wang:
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government. J. Syst. Archit. 138: 102856 (2023) - [j114]Jingwei Hu
, Wen Wang
, Kris Gaj
, Liping Wang, Huaxiong Wang
:
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO. IEEE Trans. Computers 72(7): 2094-2110 (2023) - [j113]Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Sheng Wen
, Yang Xiang
, Yinbin Miao
:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j112]Kexin Xu
, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping. Theor. Comput. Sci. 968: 114026 (2023) - [j111]Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Yinbin Miao
, Ximeng Liu
, Zhongyuan Jiang
:
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies. IEEE Trans. Inf. Forensics Secur. 18: 4144-4156 (2023) - [j110]Jun Xu
, Santanu Sarkar
, Lei Hu
, Huaxiong Wang
, Yanbin Pan
:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [j109]Xiaojun Zhang
, Chao Huang
, Dawu Gu
, Jingwei Zhang, Huaxiong Wang
:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(1): 122-133 (2023) - [c146]Gongxian Zeng
, Junzuo Lai
, Zhengan Huang
, Linru Zhang
, Xiangning Wang
, Kwok-Yan Lam
, Huaxiong Wang
, Jian Weng
:
Non-interactive Zero-Knowledge Functional Proofs. ASIACRYPT (5) 2023: 236-268 - [c145]Stanislav Kruglik
, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling
, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. ISIT 2023: 1003-1008 - [c144]Stanislav Kruglik
, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. ISIT 2023: 1354-1359 - [c143]Stanislav Kruglik
, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. ISIT 2023: 1532-1537 - [c142]Han Mao Kiah, Wilton Kim, Stanislav Kruglik
, San Ling
, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. ISIT 2023: 1973-1978 - [i89]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. CoRR abs/2301.11730 (2023) - [i88]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. CoRR abs/2302.02230 (2023) - [i87]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. CoRR abs/2305.03442 (2023) - [i86]Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. IACR Cryptol. ePrint Arch. 2023: 647 (2023) - [i85]Jingwei Hu, Junyan Chen, Wangchen Dai, Huaxiong Wang:
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities. IACR Cryptol. ePrint Arch. 2023: 1407 (2023) - [i84]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-Interactive Zero-Knowledge Functional Proofs. IACR Cryptol. ePrint Arch. 2023: 1759 (2023) - 2022
- [j108]Shaoquan Jiang, Yeow Meng Chee
, San Ling
, Huaxiong Wang, Chaoping Xing
:
A new framework for deniable secure key exchange. Inf. Comput. 285(Part): 104866 (2022) - [j107]Chenyu Huang, Yongjun Zhao
, Huangxun Chen, Xu Wang, Qian Zhang
, Yanjiao Chen
, Huaxiong Wang
, Kwok-Yan Lam
:
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet Things J. 9(6): 4330-4342 (2022) - [j106]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Inf. Sci. 593: 398-414 (2022) - [j105]Yanhong Xu
, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable policy-based signatures and instantiation from lattices. Inf. Sci. 607: 1286-1310 (2022) - [j104]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Jingting Xue, Huaxiong Wang:
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 127: 102508 (2022) - [j103]Hang Cheng
, Ximeng Liu
, Huaxiong Wang
, Yan Fang, Meiqing Wang
, Xiaopeng Zhao:
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment. IEEE Trans. Cloud Comput. 10(2): 1413-1427 (2022) - [j102]Chenyu Wang, Ding Wang
, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 19(1): 507-523 (2022) - [j101]Haining Yang
, Ye Su
, Jing Qin
, Huaxiong Wang
:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. IEEE Trans. Dependable Secur. Comput. 19(2): 1320-1337 (2022) - [j100]Zhen Liu
, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang
, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [j99]Jian Ding
, Changlu Lin
, Huaxiong Wang
, Chaoping Xing
:
Communication Efficient Secret Sharing With Small Share Size. IEEE Trans. Inf. Theory 68(1): 659-669 (2022) - [j98]Xiaojun Zhang
, Jie Zhao
, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. IEEE Trans. Serv. Comput. 15(1): 334-345 (2022) - [c141]Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang:
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. AsiaCCS 2022: 1079-1085 - [c140]Jun Xu
, Santanu Sarkar
, Huaxiong Wang
, Lei Hu
:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ASIACRYPT (3) 2022: 771-799 - [c139]Khin Mi Mi Aung
, Enhui Lim
, Sim Jun Jie
, Benjamin Hong Meng Tan
, Huaxiong Wang
, Sze Ling Yeo:
Field Instruction Multiple Data. EUROCRYPT (1) 2022: 611-641 - [c138]Liang Feng Zhang, Huaxiong Wang:
Multi-Server Verifiable Computation of Low-Degree Polynomials. SP 2022: 596-613 - [i83]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. CoRR abs/2209.03251 (2022) - [i82]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. IACR Cryptol. ePrint Arch. 2022: 771 (2022) - [i81]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian Elimination Hardware for Cryptographic Purposes. IACR Cryptol. ePrint Arch. 2022: 928 (2022) - [i80]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1239 (2022) - 2021
- [j97]Xiaojun Zhang
, Chao Huang, Chunxiang Xu
, Yuan Zhang
, Jingwei Zhang, Huaxiong Wang
:
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet Things J. 8(10): 8234-8245 (2021) - [j96]Zuling Chang
, Martianus Frederic Ezerman
, Adamas Aqsa Fahreza
, San Ling
, Janusz Szmidt, Huaxiong Wang
:
Binary de Bruijn Sequences via Zech's Logarithms. SN Comput. Sci. 2(4): 314 (2021) - [j95]Xiaojun Zhang
, Jie Zhao, Chunxiang Xu
, Hongwei Li
, Huaxiong Wang, Yuan Zhang
:
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors. IEEE Trans. Cloud Comput. 9(4): 1362-1375 (2021) - [j94]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Adaptive oblivious transfer with access control from lattice assumptions. Theor. Comput. Sci. 891: 210-229 (2021) - [j93]Xiaojun Zhang, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 18(3): 1019-1032 (2021) - [j92]Hang Cheng
, Huaxiong Wang
, Ximeng Liu
, Yan Fang, Meiqing Wang
, Xiaojun Zhang
:
Person Re-Identification over Encrypted Outsourced Surveillance Videos. IEEE Trans. Dependable Secur. Comput. 18(3): 1456-1473 (2021) - [j91]Benjamin Hong Meng Tan
, Hyung Tae Lee
, Huaxiong Wang
, Shu Qin Ren, Khin Mi Mi Aung
:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. IEEE Trans. Dependable Secur. Comput. 18(6): 2861-2874 (2021) - [c137]Khoa Nguyen
, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu
, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c136]San Ling
, Khoa Nguyen
, Duong Hieu Phan
, Hanh Tang
, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. PQCrypto 2021: 339-359 - [e13]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6 [contents] - [e12]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13091, Springer 2021, ISBN 978-3-030-92074-6 [contents] - [e11]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III. Lecture Notes in Computer Science 13092, Springer 2021, ISBN 978-3-030-92077-7 [contents] - [e10]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8 [contents] - [i79]Jenn-Bing Ong, Wee Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C.-C. Jay Kuo:
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation. CoRR abs/2101.04194 (2021) - [i78]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i77]Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam:
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 786 (2021) - [i76]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - 2020
- [j90]Jinhua Ma
, Shih-Ya Lin
, Xin Chen
, Hung-Min Sun
, Yeh-Cheng Chen
, Huaxiong Wang
:
A Blockchain-Based Application System for Product Anti-Counterfeiting. IEEE Access 8: 77642-77652 (2020) - [j89]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j88]Yamin Wen, Fangguo Zhang
, Huaxiong Wang, Yinbin Miao, Zheng Gong:
Intersection-policy private mutual authentication from authorized private set intersection. Sci. China Inf. Sci. 63(2): 122101 (2020) - [j87]Hyung Tae Lee, San Ling
, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. Inf. Sci. 516: 89-108 (2020) - [j86]Yamin Wen, Fangguo Zhang
, Huaxiong Wang, Zheng Gong
, Yinbin Miao
, Yuqiao Deng:
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks. Inf. Sci. 520: 142-154 (2020) - [j85]Haining Yang
, Ye Su
, Jing Qin, Huaxiong Wang, Yongcheng Song:
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing. Inf. Sci. 539: 295-311 (2020) - [j84]Jingwei Hu
, Marco Baldi
, Paolo Santini
, Neng Zeng
, San Ling
, Huaxiong Wang:
Lightweight Key Encapsulation Using LDPC Codes on FPGAs. IEEE Trans. Computers 69(3): 327-341 (2020) - [j83]Jingwei Hu
, Yao Liu
, Ray C. C. Cheung
, Shivam Bhasin
, San Ling
, Huaxiong Wang
:
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(7): 2305-2316 (2020) - [j82]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j81]Martianus Frederic Ezerman
, Hyung Tae Lee
, San Ling
, Khoa Nguyen
, Huaxiong Wang
:
Provably Secure Group Signature Schemes From Code-Based Assumptions. IEEE Trans. Inf. Theory 66(9): 5754-5773 (2020) - [c135]Jun Zhao, Jing Tang
, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue
:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. ICDCS 2020: 179-189 - [c134]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. ITC 2020: 7:1-7:24 - [c133]Haining Yang
, Ye Su
, Jing Qin
, Jinhua Ma
, Huaxiong Wang
:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. ML4CS (1) 2020: 578-592 - [c132]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen
, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Public Key Cryptography (1) 2020: 396-427 - [e9]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7 [contents] - [e8]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6 [contents] - [e7]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12493, Springer 2020, ISBN 978-3-030-64839-8 [contents] - [e6]Khoa Nguyen
, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7 [contents] - [i75]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable Policy-Based Signatures and Instantiation from Lattices. CoRR abs/2007.00033 (2020) - [i74]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 140 (2020) - [i73]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. IACR Cryptol. ePrint Arch. 2020: 749 (2020)
2010 – 2019
- 2019
- [j80]Myungsun Kim
, Hyung Tae Lee
, San Ling
, Shu Qin Ren, Benjamin Hong Meng Tan
, Huaxiong Wang:
Search Condition-Hiding Query Evaluation on Encrypted Databases. IEEE Access 7: 161283-161295 (2019) - [j79]Shixiong Wang, Longjiang Qu, Chao Li, Huaxiong Wang:
Further improvement of factoring N = pr qs with partial known bits. Adv. Math. Commun. 13(1): 121-135 (2019) - [j78]San Ling
, Khoa Nguyen
, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. Comput. J. 62(12): 1849-1862 (2019) - [j77]Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials. Des. Codes Cryptogr. 87(5): 1137-1160 (2019) - [j76]Yali Liu, Martianus Frederic Ezerman
, Huaxiong Wang:
Double verification protocol via secret sharing for low-cost RFID tags. Future Gener. Comput. Syst. 90: 118-128 (2019) - [j75]Yong Yu
, Guomin Yang
, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j74]Xiaojun Zhang, Huaxiong Wang, Chunxiang Xu:
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 472: 223-234 (2019) - [j73]Xiaojun Zhang, Yao Tang, Huaxiong Wang, Chunxiang Xu, Yinbin Miao
, Hang Cheng:
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494: 193-207 (2019) - [j72]Hyung Tae Lee, San Ling
, Jae Hong Seo
, Huaxiong Wang:
Public key encryption with equality test from generic assumptions in the random oracle model. Inf. Sci. 500: 15-33 (2019) - [j71]Kai Zhang
, Jie Chen, Hyung Tae Lee
, Haifeng Qian, Huaxiong Wang:
Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755: 65-80 (2019) - [j70]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption. Theor. Comput. Sci. 759: 72-97 (2019) - [j69]Khin Mi Mi Aung
, Hyung Tae Lee
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem. Theor. Comput. Sci. 771: 49-70 (2019) - [j68]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease. Theor. Comput. Sci. 783: 71-94 (2019) - [j67]Myungsun Kim
, Hyung Tae Lee
, San Ling
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 16(5): 743-756 (2019) - [c131]Khoa Nguyen
, Hanh Tang
, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. ASIACRYPT (2) 2019: 25-55 - [c130]Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. CANS 2019: 99-119 - [c129]Fuchun Lin, San Ling
, Huaxiong Wang, Neng Zeng:
Threshold Changeable Ramp Secret Sharing. CANS 2019: 308-327 - [c128]Jun Xu, Santanu Sarkar
, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. CRYPTO (1) 2019: 297-321 - [c127]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Accountable Tracing Signatures from Lattices. CT-RSA 2019: 556-576 - [c126]Zhen Liu, Khoa Nguyen
, Guomin Yang
, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c125]Zhen Liu, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - [c124]Jingwei Hu, Wen Wang, Ray C. C. Cheung, Huaxiong Wang:
Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: A Case Study on BIKE. FPT 2019: 231-234 - [c123]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. ITCS 2019: 53:1-53:20 - [c122]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi
, Huaxiong Wang:
Non-Malleable Codes against Active Physical Layer Adversary. ISIT 2019: 2753-2757 - [c121]Fuchun Lin, San Ling
, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. ITW 2019: 1-5 - [c120]Benoît Libert, Khoa Nguyen
, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Elementary Databases with More Expressive Queries. Public Key Cryptography (1) 2019: 255-285 - [c119]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Forward-Secure Group Signatures from Lattices. PQCrypto 2019: 44-64 - [c118]Chenyu Wang, Ding Wang
, Haowei Wang, Guoai Xu, Jing Sun, Huaxiong Wang:
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. SocialSec 2019: 95-109 - [i72]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Accountable Tracing Signatures from Lattices. CoRR abs/1901.00240 (2019) - [i71]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-Malleable Secret Sharing against Affine Tampering. CoRR abs/1902.06195 (2019) - [i70]Fuchun Lin, San Ling, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. CoRR abs/1906.11066 (2019) - [i69]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
Provably Secure Group Signature Schemes from Code-Based Assumptions. CoRR abs/1909.04472 (2019) - [i68]Jun Zhao, Jing Tang, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. CoRR abs/1909.06587 (2019) - [i67]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. IACR Cryptol. ePrint Arch. 2019: 332 (2019) - [i66]Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. IACR Cryptol. ePrint Arch. 2019: 513 (2019) - [i65]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. IACR Cryptol. ePrint Arch. 2019: 604 (2019) - [i64]Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2019: 917 (2019) - 2018
- [j66]Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
Construction of de Bruijn sequences from product of two irreducible polynomials. Cryptogr. Commun. 10(2): 251-275 (2018) - [j65]Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields. Cryptogr. Commun. 10(6): 1183-1202 (2018) - [j64]San Ling
, Khoa Nguyen
, Adeline Roux-Langlois
, Huaxiong Wang:
A lattice-based group signature scheme with verifier-local revocation. Theor. Comput. Sci. 730: 1-20 (2018) - [j63]Myungsun Kim, Hyung Tae Lee
, San Ling
, Huaxiong Wang:
On the Efficiency of FHE-Based Private Queries. IEEE Trans. Dependable Secur. Comput. 15(2): 357-363 (2018) - [c117]Hyung Tae Lee, Huaxiong Wang, Kai Zhang
:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. ACISP 2018: 780-786 - [c116]Benoît Libert, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Lattice-Based Zero-Knowledge Arguments for Integer Relations. CRYPTO (2) 2018: 700-732 - [c115]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Constant-Size Group Signatures from Lattices. Public Key Cryptography (2) 2018: 58-88 - [i63]San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. CoRR abs/1801.07844 (2018) - [i62]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Forward-Secure Group Signatures from Lattices. CoRR abs/1801.08323 (2018) - [i61]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease. CoRR abs/1801.08737 (2018) - [i60]Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Password Policy Check from Lattices. CoRR abs/1802.05004 (2018) - [i59]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. CoRR abs/1808.02974 (2018) - [i58]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Constant-size Group Signatures from Lattices. IACR Cryptol. ePrint Arch. 2018: 34 (2018) - [i57]Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. IACR Cryptol. ePrint Arch. 2018: 369 (2018) - [i56]Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang:
Lattice-Based Zero-Knowledge Arguments for Integer Relations. IACR Cryptol. ePrint Arch. 2018: 716 (2018) - [i55]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. IACR Cryptol. ePrint Arch. 2018: 746 (2018) - [i54]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i53]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Accountable Tracing Signatures from Lattices. IACR Cryptol. ePrint Arch. 2018: 1251 (2018) - 2017
- [j62]Chang Xu
, Rongxing Lu, Huaxiong Wang, Liehuang Zhu
, Cheng Huang:
TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning. IEEE Access 5: 26973-26989 (2017) - [j61]Chang Xu
, Rongxing Lu, Huaxiong Wang, Liehuang Zhu, Cheng Huang:
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems. Sensors 17(3): 500 (2017) - [c114]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. ACNS 2017: 293-312 - [c113]Benoît Libert, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash. ASIACRYPT (3) 2017: 304-335 - [c112]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions. ASIACRYPT (1) 2017: 533-563 - [c111]Khoa Nguyen
, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Password Policy Check from Lattices. ISC 2017: 92-113 - [c110]San Ling
, Khoa Nguyen
, Huaxiong Wang, Juanyang Zhang:
Revocable Predicate Encryption from Lattices. ProvSec 2017: 305-326 - [i52]Zuling Chang, Martianus Frederic Ezerman, Adamas Aqsa Fahreza, San Ling, Huaxiong Wang:
Large Order Binary de Bruijn Sequences via Zech's Logarithms. CoRR abs/1705.03150 (2017) - [i51]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi, Huaxiong Wang:
Non-Malleable Codes with Leakage and Applications to Secure Communication. CoRR abs/1708.05462 (2017) - [i50]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. IACR Cryptol. ePrint Arch. 2017: 353 (2017) - [i49]Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Password Policy Check from Lattices. IACR Cryptol. ePrint Arch. 2017: 854 (2017) - [i48]Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash. IACR Cryptol. ePrint Arch. 2017: 856 (2017) - 2016
- [j60]Hyung Tae Lee, San Ling
, Jae Hong Seo, Huaxiong Wang:
CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. Comput. J. 59(11): 1689-1694 (2016) - [j59]Shantian Cheng
, Khoa Nguyen
, Huaxiong Wang:
Policy-based signature scheme from lattices. Des. Codes Cryptogr. 81(1): 43-74 (2016) - [j58]Hyung Tae Lee, San Ling
, Jae Hong Seo, Huaxiong Wang:
Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373: 419-440 (2016) - [j57]Hyung Tae Lee, San Ling
, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-secure homomorphic encryption. Theor. Comput. Sci. 640: 104-114 (2016) - [c109]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption. ASIACRYPT (2) 2016: 101-131 - [c108]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. ASIACRYPT (2) 2016: 373-403 - [c107]Khoa Nguyen
, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Identity-Based Encryption from Lattices. CANS 2016: 107-123 - [c106]Benoît Libert, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. EUROCRYPT (2) 2016: 1-31 - [c105]Yi Deng, Juan A. Garay, San Ling
, Huaxiong Wang, Moti Yung:
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs. SCN 2016: 237-253 - [i47]Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials. CoRR abs/1604.04351 (2016) - [i46]Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials. CoRR abs/1611.10088 (2016) - [i45]Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields. CoRR abs/1612.07928 (2016) - [i44]Hyung Tae Lee, San Ling, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 19 (2016) - [i43]Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. IACR Cryptol. ePrint Arch. 2016: 101 (2016) - [i42]Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:
Better Security for Queries on Encrypted Databases. IACR Cryptol. ePrint Arch. 2016: 470 (2016) - [i41]Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption. IACR Cryptol. ePrint Arch. 2016: 879 (2016) - [i40]Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Identity-Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2016: 974 (2016) - [i39]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public Key Encryption with Equality Test in the Standard Model. IACR Cryptol. ePrint Arch. 2016: 1182 (2016) - 2015
- [j56]Mehmet A. Orgun
, Atilla Elçi, Josef Pieprzyk
, Alexander G. Chefranov
, Rajan Shankaran
, Huaxiong Wang:
Special issue on trust and security in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3791-3793 (2015) - [j55]Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen
, Tsu-Yang Wu
, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321: 224-237 (2015) - [c104]Martianus Frederic Ezerman
, Hyung Tae Lee, San Ling
, Khoa Nguyen
, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. ASIACRYPT (1) 2015: 260-285 - [c103]Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu
:
A Provable Data Possession Scheme with Data Hierarchy in Cloud. Inscrypt 2015: 301-321 - [c102]San Ling
, Khoa Nguyen
, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based. Public Key Cryptography 2015: 427-449 - [i38]San Ling, Khoa Nguyen, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. IACR Cryptol. ePrint Arch. 2015: 14 (2015) - [i37]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. IACR Cryptol. ePrint Arch. 2015: 479 (2015) - [i36]Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-based Private Queries. IACR Cryptol. ePrint Arch. 2015: 1176 (2015) - 2014
- [j54]Sareh Emami, San Ling
, Ivica Nikolic
, Josef Pieprzyk
, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. Cryptogr. Commun. 6(3): 171-187 (2014) - [j53]Jie Chen, Hoon Wei Lim, San Ling
, Huaxiong Wang:
The relation and transformation between hierarchical inner product encryption and spatial encryption. Des. Codes Cryptogr. 71(2): 347-364 (2014) - [j52]Jie Chen, Hoon Wei Lim, San Ling
, Le Su, Huaxiong Wang:
Spatial encryption supporting non-monotone access structure. Des. Codes Cryptogr. 73(3): 731-746 (2014) - [j51]Jie Chen, Hoon Wei Lim, San Ling
, Huaxiong Wang, Hoeteck Wee:
Shorter identity-based encryption via asymmetric pairings. Des. Codes Cryptogr. 73(3): 911-947 (2014) - [j50]Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Lijun Yan, Huaxiong Wang, Hung-Min Sun:
Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID. J. Inf. Hiding Multim. Signal Process. 5(4): 642-648 (2014) - [j49]San Ling
, Igor E. Shparlinski
, Huaxiong Wang:
On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function. Math. Comput. 83(289): 2429-2434 (2014) - [c101]Sareh Emami, San Ling
, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. ASIACRYPT (1) 2014: 141-157 - [c100]Adeline Langlois
, San Ling
, Khoa Nguyen
, Huaxiong Wang:
Lattice-Based Group Signature Scheme with Verifier-Local Revocation. Public Key Cryptography 2014: 345-361 - [c99]Christoph Bösch
, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang
, Huaxiong Wang, Pieter H. Hartel
, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - [i35]Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang:
Lattice-based Group Signature Scheme with Verifier-local Revocation. IACR Cryptol. ePrint Arch. 2014: 33 (2014) - [i34]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. IACR Cryptol. ePrint Arch. 2014: 56 (2014) - 2013
- [j48]Yeow Meng Chee
, Tao Feng
, San Ling
, Huaxiong Wang, Liang Feng Zhang:
Query-Efficient Locally Decodable Codes of Subexponential Length. Comput. Complex. 22(1): 159-189 (2013) - [j47]Romar dela Cruz
, Huaxiong Wang:
Cheating-immune secret sharing schemes from codes and cumulative arrays. Cryptogr. Commun. 5(1): 67-83 (2013) - [j46]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Sec. 12(2): 83-96 (2013) - [j45]Yeow Meng Chee
, San Ling
, Huaxiong Wang, Liang Feng Zhang:
Upper Bounds on Matching Families in BBZpqn. IEEE Trans. Inf. Theory 59(8): 5131-5139 (2013) - [j44]Xun Yi, San Ling
, Huaxiong Wang:
Efficient Two-Server Password-Only Authenticated Key Exchange. IEEE Trans. Parallel Distributed Syst. 24(9): 1773-1782 (2013) - [c98]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-Share Threshold Implementations for 4-Bit S-boxes. COSADE 2013: 99-113 - [c97]Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling
, Huaxiong Wang:
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. CT-RSA 2013: 50-67 - [c96]Le Su, Hoon Wei Lim, San Ling
, Huaxiong Wang:
Revocable IBE Systems with Almost Constant-Size Key Update. Pairing 2013: 168-185 - [c95]San Ling
, Khoa Nguyen
, Damien Stehlé, Huaxiong Wang:
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. Public Key Cryptography 2013: 107-124 - [i33]Yeow Meng Chee, San Ling, Huaxiong Wang, Liang Feng Zhang:
Upper Bounds on Matching Families in $\mathbb{Z}_{pq}^n$. CoRR abs/1301.0980 (2013) - [i32]Le Su, Hoon Wei Lim, San Ling, Huaxiong Wang:
Revocable IBE Systems with Almost Constant-size Key Update. IACR Cryptol. ePrint Arch. 2013: 495 (2013) - [i31]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The Resistance of PRESENT-80 Against Related-Key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 522 (2013) - 2012
- [j43]Amos Beimel
, Yeow Meng Chee
, Huaxiong Wang, Liang Feng Zhang:
Communication-efficient distributed oblivious transfer. J. Comput. Syst. Sci. 78(4): 1142-1157 (2012) - [j42]Yeow Meng Chee
, Huaxiong Wang, Liang Feng Zhang:
On the Bringer-Chabanne EPIR protocol for polynomial evaluation. J. Math. Cryptol. 5(3-4): 277-301 (2012) - [j41]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Xiaoming Sun
, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. J. Cryptol. 25(4): 557-600 (2012) - [j40]San Ling
, Igor E. Shparlinski
, Ron Steinfeld, Huaxiong Wang:
On the modular inversion hidden number problem. J. Symb. Comput. 47(4): 358-367 (2012) - [j39]Zhifang Zhang, Yeow Meng Chee
, San Ling
, Mulan Liu, Huaxiong Wang:
Threshold changeable secret sharing schemes revisited. Theor. Comput. Sci. 418: 106-115 (2012) - [j38]Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang:
Workflow Signatures for Business Process Compliance. IEEE Trans. Dependable Secur. Comput. 9(5): 756-769 (2012) - [c94]Jie Chen, Hoon Wei Lim, San Ling
, Huaxiong Wang, Khoa Nguyen
:
Revocable Identity-Based Encryption from Lattices. ACISP 2012: 390-403 - [c93]Hongjun Wu
, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
:
Differential Attacks against Stream Cipher ZUC. ASIACRYPT 2012: 262-277 - [c92]Phuong Ha Nguyen, Chester Rebeiro
, Debdeep Mukhopadhyay, Huaxiong Wang:
Improved Differential Cache Attacks on SMS4. Inscrypt 2012: 29-45 - [c91]Lei Wei, Thomas Peyrin
, Przemyslaw Sokolowski, San Ling
, Josef Pieprzyk
, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. FSE 2012: 163-179 - [c90]Jie Chen, Hoon Wei Lim, San Ling
, Huaxiong Wang, Hoeteck Wee:
Shorter IBE and Signatures via Asymmetric Pairings. Pairing 2012: 122-140 - [c89]Ron Steinfeld, San Ling
, Josef Pieprzyk
, Christophe Tartary, Huaxiong Wang:
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Public Key Cryptography 2012: 353-371 - [c88]ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang:
Revisiting a Secret Sharing Approach to Network Codes. ProvSec 2012: 300-317 - [i30]Yeow Meng Chee, Huaxiong Wang, Liang Feng Zhang:
On Bringer-Chabanne EPIR Protocol for Polynomial Evaluation. CoRR abs/1208.5190 (2012) - [i29]Jie Chen, Hoon Wei Lim, San Ling, Le Su, Huaxiong Wang:
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters. CoRR abs/1210.6441 (2012) - [i28]Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Hoeteck Wee:
Shorter IBE and Signatures via Asymmetric Pairings. IACR Cryptol. ePrint Arch. 2012: 224 (2012) - [i27]Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. IACR Cryptol. ePrint Arch. 2012: 264 (2012) - [i26]Yi Deng, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung:
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2012: 508 (2012) - [i25]Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Huaxiong Wang:
On 3-share Threshold Implementations for 4-bit S-boxes. IACR Cryptol. ePrint Arch. 2012: 509 (2012) - [i24]San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang:
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications. IACR Cryptol. ePrint Arch. 2012: 569 (2012) - 2011
- [j37]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
On the Hardness of the Sum of k Mins Problem. Comput. J. 54(10): 1652-1660 (2011) - [j36]Josef Pieprzyk
, Huaxiong Wang, Xian-Mo Zhang:
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Int. J. Comput. Math. 88(7): 1398-1416 (2011) - [j35]Christophe Tartary, Huaxiong Wang, Yun Zhang:
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials. Int. J. Found. Comput. Sci. 22(6): 1395-1416 (2011) - [j34]Axel Poschmann, Amir Moradi
, Khoongming Khoo, Chu-Wee Lim, Huaxiong Wang, San Ling
:
Side-Channel Resistant Crypto for Less than 2, 300 GE. J. Cryptol. 24(2): 322-345 (2011) - [j33]Christophe Tartary, Huaxiong Wang, San Ling
:
Authentication of Digital Streams. IEEE Trans. Inf. Theory 57(9): 6285-6303 (2011) - [c87]Phuong Ha Nguyen, Hongjun Wu
, Huaxiong Wang:
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. ACISP 2011: 61-74 - [c86]Yun Zhang, Christophe Tartary, Huaxiong Wang:
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. ACISP 2011: 259-275 - [c85]Lei Wei, Christian Rechberger, Jian Guo
, Hongjun Wu
, Huaxiong Wang, San Ling
:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438 - [c84]Yeow Meng Chee
, Huaxiong Wang, Liang Feng Zhang:
Oblivious Transfer and n-Variate Linear Function Evaluation. COCOON 2011: 627-637 - [c83]Amir Moradi
, Axel Poschmann, San Ling
, Christof Paar, Huaxiong Wang:
Pushing the Limits: A Very Compact and a Threshold Implementation of AES. EUROCRYPT 2011: 69-88 - [c82]Guomin Yang
, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. Financial Cryptography 2011: 113-126 - [c81]Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:
On Related-Key Attacks and KASUMI: The Case of A5/3. INDOCRYPT 2011: 146-159 - [e5]Yeow Meng Chee, Zhenbo Guo, San Ling
, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing:
Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings. Lecture Notes in Computer Science 6639, Springer 2011, ISBN 978-3-642-20900-0 [contents] - [i23]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. IACR Cryptol. ePrint Arch. 2011: 201 (2011) - [i22]Yun Zhang, Christophe Tartary, Huaxiong Wang:
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version). IACR Cryptol. ePrint Arch. 2011: 392 (2011) - [i21]Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption. IACR Cryptol. ePrint Arch. 2011: 455 (2011) - [i20]Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen:
Revocable Identity-Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2011: 583 (2011) - [i19]Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts. IACR Cryptol. ePrint Arch. 2011: 650 (2011) - [i18]Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. IACR Cryptol. ePrint Arch. 2011: 688 (2011) - 2010
- [j32]Hung-Min Sun, Huaxiong Wang, Bying-He Ku, Josef Pieprzyk
:
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time. SIAM J. Discret. Math. 24(2): 617-638 (2010) - [c80]Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
:
On Multidimensional Linear Cryptanalysis. ACISP 2010: 37-52 - [c79]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. ACNS 2010: 349-366 - [c78]Jian Guo
, San Ling
, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. ASIACRYPT 2010: 56-75 - [c77]Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. AISC 2010: 5-11 - [c76]Axel Poschmann, San Ling
, Huaxiong Wang:
256 Bit Standardized Crypto for 650 GE - GOST Revisited. CHES 2010: 219-233 - [c75]Shaoquan Jiang, Huaxiong Wang:
Plaintext-Awareness of Hybrid Encryption. CT-RSA 2010: 57-72 - [c74]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. ISC 2010: 24-30 - [i17]Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang, Liang Feng Zhang:
Query-Efficient Locally Decodable Codes of Subexponential Length. CoRR abs/1008.1617 (2010) - [i16]Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang, Liang Feng Zhang:
Query-Efficient Locally Decodable Codes. Electron. Colloquium Comput. Complex. TR10 (2010) - [i15]Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. IACR Cryptol. ePrint Arch. 2010: 16 (2010) - [i14]Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. IACR Cryptol. ePrint Arch. 2010: 316 (2010) - [i13]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. IACR Cryptol. ePrint Arch. 2010: 478 (2010)
2000 – 2009
- 2009
- [j31]Yvo Desmedt, Niels Duif, Henk van Tilborg, Huaxiong Wang:
Bounds and constructions for key distribution schemes. Adv. Math. Commun. 3(3): 273-293 (2009) - [j30]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
, Xian-Mo Zhang:
Unconditionally secure disjointness tests for private datasets. Int. J. Appl. Cryptogr. 1(3): 225-235 (2009) - [c73]Shujun Li
, Hassan Jameel Asghar
, Josef Pieprzyk
, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218 - [c72]Alex Biryukov
, Praveen Gauravaram
, Jian Guo
, Dmitry Khovratovich, San Ling
, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179 - [c71]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
Privacy Enhancements for Hardware-Based Security Modules. ICETE (Selected Papers) 2009: 224-236 - [c70]Qingsong Ye, Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Efficient Fuzzy Matching and Intersection on Private Datasets. ICISC 2009: 211-228 - [c69]Hao Chen, San Ling
, Carles Padró
, Huaxiong Wang, Chaoping Xing
:
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. IMACC 2009: 263-277 - [c68]Jian Guo
, Krystian Matusiewicz, Lars R. Knudsen, San Ling
, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Selected Areas in Cryptography 2009: 141-156 - [c67]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Certified Pseudonyms Colligated with Master Secret Key. SECRYPT 2009: 190-197 - [e4]Yeow Meng Chee, Chao Li, San Ling
, Huaxiong Wang, Chaoping Xing:
Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings. Lecture Notes in Computer Science 5557, Springer 2009, ISBN 978-3-642-01813-8 [contents] - [i12]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical pseudo-collisions for hash functions ARIRANG-224/384. IACR Cryptol. ePrint Arch. 2009: 197 (2009) - [i11]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009) - 2008
- [j29]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Security Analysis of Australian and E.U. E-passport Implementation. J. Res. Pract. Inf. Technol. 40(3): 187-206 (2008) - [j28]Jin Yuan, Cunsheng Ding
, Huaxiong Wang, Josef Pieprzyk
:
Permutation polynomials of the form (xp-x+delta)s+L(x). Finite Fields Their Appl. 14(2): 482-493 (2008) - [j27]Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk
:
Analysis of bilinear pairing-based accumulator for identity escrowing. IET Inf. Secur. 2(4): 99-107 (2008) - [j26]Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
:
A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008) - [j25]Guomin Yang
, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
:
Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) - [j24]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j23]Yan Wang
, Duncan S. Wong, Huaxiong Wang:
Employ a mobile agent for making a payment. Mob. Inf. Syst. 4(1): 51-68 (2008) - [j22]Huaxiong Wang, Duncan S. Wong:
On Secret Reconstruction in Secret Sharing Schemes. IEEE Trans. Inf. Theory 54(1): 473-480 (2008) - [c66]Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection. ARES 2008: 1332-1339 - [c65]Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97 - [c64]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
, Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169 - [c63]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data. APSCC 2008: 1381-1386 - [c62]Zhifang Zhang, Mulan Liu, Yeow Meng Chee
, San Ling
, Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. ASIACRYPT 2008: 19-36 - [c61]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Formal Security Analysis of Australian E-passport Implementation. AISC 2008: 75-82 - [c60]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo
, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 - [c59]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195 - [c58]Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
, Jian Guo
, San Ling
, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223 - [c57]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28 - [c56]Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
:
Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333 - [c55]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
:
Distributed Private Matching and Set Operations. ISPEC 2008: 347-360 - [c54]Yi Lu, Huaxiong Wang, San Ling
:
Cryptanalysis of Rabbit. ISC 2008: 204-214 - [c53]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
A Fair e-Tendering Protocol. SECRYPT 2008: 294-299 - [c52]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658 - [c51]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159 - [i10]Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling, Huaxiong Wang:
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes. CoRR abs/0812.2518 (2008) - [i9]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. IACR Cryptol. ePrint Arch. 2008: 296 (2008) - 2007
- [j21]Henk van Tilborg, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
New constructions of anonymous membership broadcasting schemes. Adv. Math. Commun. 1(1): 29-44 (2007) - [j20]Christophe Tartary, Huaxiong Wang:
Efficient multicast stream authentication for the fully adversarial network model. Int. J. Secur. Networks 2(3/4): 175-191 (2007) - [j19]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Trans. Inf. Theory 53(7): 2542-2559 (2007) - [c50]Christophe Tartary, Huaxiong Wang:
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. ACISP 2007: 293-307 - [c49]Christophe Tartary, Josef Pieprzyk
, Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181 - [c48]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612 - [c47]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371 - [c46]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112 - [c45]Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34 - [c44]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123 - [e3]Feng Bao, San Ling
, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings. Lecture Notes in Computer Science 4856, Springer 2007, ISBN 978-3-540-76968-2 [contents] - [i8]Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection. IACR Cryptol. ePrint Arch. 2007: 111 (2007) - [i7]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. IACR Cryptol. ePrint Arch. 2007: 430 (2007) - 2006
- [j18]Shoulun Long, Josef Pieprzyk
, Huaxiong Wang, Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptogr. 40(2): 191-209 (2006) - [j17]Reihaneh Safavi-Naini, Huaxiong Wang:
Secret sharing schemes with partial broadcast channels. Des. Codes Cryptogr. 41(1): 5-22 (2006) - [j16]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Lattice-based threshold-changeability for standard CRT secret-sharing schemes. Finite Fields Their Appl. 12(4): 653-680 (2006) - [j15]Reihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) - [c43]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices. ACSW 2006: 213-220 - [c42]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209 - [c41]Christophe Tartary, Huaxiong Wang:
Achieving Multicast Stream Authentication Using MDS Codes. CANS 2006: 108-125 - [c40]Gaurav Gupta
, Josef Pieprzyk
, Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents. AsiaCCS 2006: 157-165 - [c39]Christophe Tartary, Huaxiong Wang:
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Inscrypt 2006: 103-117 - [c38]Guomin Yang
, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91 - [c37]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475 - [c36]Christophe Tartary, Huaxiong Wang:
Rateless Codes for the Multicast Stream Authentication Problem. IWSEC 2006: 136-151 - [c35]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173 - [c34]Guomin Yang
, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363 - [i6]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2006: 206 (2006) - [i5]Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme. IACR Cryptol. ePrint Arch. 2006: 270 (2006) - 2005
- [j14]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. Des. Codes Cryptogr. 36(3): 263-287 (2005) - [c33]Yvo Desmedt, Yongge Wang
, Reihaneh Safavi-Naini, Huaxiong Wang:
Radio Networks with Reliable Communication. COCOON 2005: 156-166 - [c32]Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk
:
Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198 - [c31]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434 - [c30]Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang:
Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968 - [c29]Christophe Tartary, Huaxiong Wang:
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. WISA 2005: 108-125 - [e2]Yvo Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li:
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings. Lecture Notes in Computer Science 3810, Springer 2005, ISBN 3-540-30849-0 [contents] - [i4]Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. IACR Cryptol. ePrint Arch. 2005: 407 (2005) - 2004
- [j13]Huaxiong Wang, Josef Pieprzyk
:
Shared generation of pseudo-random functions. J. Complex. 20(2-3): 458-472 (2004) - [c28]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186 - [c27]Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk
, Kris Gaj:
Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207 - [c26]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100 - [e1]Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings. Lecture Notes in Computer Science 3108, Springer 2004, ISBN 3-540-22379-7 [contents] - 2003
- [j12]Huaxiong Wang, Chaoping Xing
, Reihaneh Safavi-Naini:
Linear authentication codes: bounds and constructions. IEEE Trans. Inf. Theory 49(4): 866-872 (2003) - [c25]Huaxiong Wang, Josef Pieprzyk
:
Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522 - [c24]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
:
Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542 - [c23]Huaxiong Wang, Josef Pieprzyk
:
Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294 - [c22]Josef Pieprzyk
, Huaxiong Wang, Chaoping Xing
:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100 - [i3]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Distributing the Encryption and Decryption of a Block Cipher. IACR Cryptol. ePrint Arch. 2003: 5 (2003) - [i2]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk:
Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 192 (2003) - [i1]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 193 (2003) - 2002
- [j11]Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Constructions for Threshold Shared Generation of Authenticators. Int. J. Comput. Math. 79(12): 1285-1301 (2002) - [c21]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property. ACISP 2002: 40-55 - [c20]Huaxiong Wang, Josef Pieprzyk
:
A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170 - [c19]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang:
Redistribution of Mechanical Secret Shares. Financial Cryptography 2002: 238-252 - [c18]Keith M. Martin, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. ICISC 2002: 237-252 - [c17]Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join. ICISC 2002: 478-496 - [c16]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
A Group Key Distribution Scheme with Decentralised User Join. SCN 2002: 146-163 - 2001
- [j10]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
:
Broadcast anti-jamming systems. Comput. Networks 35(2-3): 223-236 (2001) - [j9]Huaxiong Wang, Chaoping Xing
:
Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields. J. Comb. Theory A 93(1): 112-124 (2001) - [j8]Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang:
An Efficient Construction for Fail-Stop Signature for Long Messages. J. Inf. Sci. Eng. 17(6): 879-898 (2001) - [j7]Reihaneh Safavi-Naini, Huaxiong Wang:
Broadcast authentication for group communication. Theor. Comput. Sci. 269(1-2): 1-21 (2001) - [c15]Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang:
How to Construct Fail-Stop Confirmer Signature Schemes. ACISP 2001: 435-444 - [c14]Beomsik Song, Huaxiong Wang, Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ICISC 2001: 18-31 - [c13]Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast. ICISC 2001: 160-177 - [c12]Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing
:
Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135 - 2000
- [j6]Chaoping Xing
, Huaxiong Wang, Kwok-Yan Lam:
Constructions of authentication codes from algebraic curves over finite fields. IEEE Trans. Inf. Theory 46(3): 886-892 (2000) - [c11]Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang:
Key Management for Secure Multicast with Dynamic Controller. ACISP 2000: 178-190 - [c10]Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao:
On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351 - [c9]Reihaneh Safavi-Naini, Huaxiong Wang:
New constructions for multicast re-keying schemes using perfect hash families. CCS 2000: 228-234 - [c8]Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang:
Fail-Stop Signature for Long Messages. INDOCRYPT 2000: 165-177
1990 – 1999
- 1999
- [j5]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. Aust. Comput. J. 31(2): 34-43 (1999) - [j4]Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures. Comput. J. 42(8): 638-649 (1999) - [j3]Reihaneh Safavi-Naini, Huaxiong Wang:
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions. Inf. Comput. 151(1-2): 148-172 (1999) - [c7]Keith M. Martin, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191 - [c6]Reihaneh Safavi-Naini, Huaxiong Wang:
Broadcast Authentication in Group Communication. ASIACRYPT 1999: 399-411 - [c5]Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam:
A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196 - [c4]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Chris Charnes, Josef Pieprzyk
:
Broadcast anti-jamming systems. ICON 1999: 349-355 - 1998
- [j2]Huaxiong Wang:
On Syntactic Nuclei of Rational Languages. Inf. Process. Lett. 67(5): 221-226 (1998) - [j1]Huaxiong Wang:
On Rational Series and Rational Languages. Theor. Comput. Sci. 205(1-2): 329-336 (1998) - [c3]Hossein Ghodosi, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390 - [c2]Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Constructions for Multireceiver Authentication Codes. ASIACRYPT 1998: 242-256 - [c1]Reihaneh Safavi-Naini, Huaxiong Wang:
New Results on Multi-Receiver Authentication Codes. EUROCRYPT 1998: 527-541
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 01:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint