default search action
Mingsheng Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Nianzhong Zhang, Qiang Song, Mingsheng Wang, Wei Zhang:
A dead-time compensation method for motor drive inverters based on nonlinear observer. Comput. Electr. Eng. 120: 109668 (2024) - [j36]Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. Cybersecur. 7(1): 33 (2024) - [j35]Man Kang, Lin Jiao, Yongqiang Li, Mingsheng Wang:
An iterative correction method for practically LPN solving. Inf. Sci. 679: 121080 (2024) - [j34]Jinling Tang, Haixia Xu, Mingsheng Wang, Tao Tang, Chunying Peng, Huimei Liao:
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 4174-4187 (2024) - [j33]Fen Liu, Yongqiang Li, Huiqin Chen, Lin Jiao, Ming Luo, Mingsheng Wang:
YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation. IEEE Trans. Inf. Theory 70(5): 3729-3749 (2024) - [j32]Qing Yao, Kaiwen Xu, Taotao Li, Yichao Zhou, Mingsheng Wang:
A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments. Wirel. Networks 30(6): 5157-5169 (2024) - [c37]Han Xia, Mingsheng Wang:
LightPIR: Single-Server PIR via FHE without Gaussian Noise. AsiaCCS 2024 - [c36]Han Xia, Mingsheng Wang:
Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster. EuroS&P 2024: 293-310 - [c35]Yang Zhou, Heyang Cao, Mingsheng Wang:
Deep LLL on Module Lattices. ISC (2) 2024: 24-40 - [i26]Xingwei Ren, Yongqiang Li, Mingsheng Wang:
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity. IACR Cryptol. ePrint Arch. 2024: 1304 (2024) - 2023
- [j31]Yuting Liu, Yongqiang Li, Huiqin Chen, Mingsheng Wang:
Full-round impossible differential attack on shadow block cipher. Cybersecur. 6(1): 52 (2023) - [j30]Mingsheng Wang, Qiang Song, Wuxuan Lai:
On Model-Based Transfer Learning Method for the Detection of Inter-Turn Short Circuit Faults in PMSM. Sensors 23(22): 9145 (2023) - [c34]Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. ACISP 2023: 431-451 - [c33]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. ACNS Workshops 2023: 3-22 - [c32]Zhuo An, Mingsheng Wang, Dongdong Liu, Taotao Li, Qiang Lai:
Hydra: An Efficient Asynchronous DAG-Based BFT Protocol. SciSec 2023: 439-459 - [i25]Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang:
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. IACR Cryptol. ePrint Arch. 2023: 496 (2023) - [i24]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1353 (2023) - 2022
- [j29]Man Kang, Mingsheng Wang:
New Genetic Operators for Developing S-Boxes With Low Boomerang Uniformity. IEEE Access 10: 10898-10906 (2022) - [j28]Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. Comput. J. 65(6): 1560-1573 (2022) - [j27]Taotao Li, Dequan Li, Mingsheng Wang:
Blockchain-based Fair and Decentralized Data Trading Model. Comput. J. 65(8): 2133-2145 (2022) - [j26]Zheng Xu, Yongqiang Li, Mingsheng Wang:
Observations on the Security of COMET. Comput. J. 65(9): 2247-2261 (2022) - [j25]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
On the upper bound of squared correlation of SIMON-like functions and its applications. IET Inf. Secur. 16(3): 220-234 (2022) - [j24]Qiang Song, Mingsheng Wang, Wuxuan Lai, Sifang Zhao:
Multiscale Kernel-Based Residual CNN for Estimation of Inter-Turn Short Circuit Fault in PMSM. Sensors 22(18): 6870 (2022) - [c31]Dongdong Liu, Mingsheng Wang, Taotao Li, Ya Han:
A Faster Blockchain Sharding Protocol for Decentralized Ledger. TrustCom 2022: 864-873 - [i23]Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. IACR Cryptol. ePrint Arch. 2022: 135 (2022) - 2021
- [j23]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Trans. Inf. Theory 67(2): 1054-1068 (2021) - [c30]Taotao Li, Mingsheng Wang, Zhihong Deng, Dongdong Liu:
SEPoW: Secure and Efficient Proof of Work Sidechains. ICA3PP (3) 2021: 376-396 - [c29]Parhat Abla, Mingsheng Wang:
Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size. SAC 2021: 398-418 - [c28]Parhat Abla, Mingsheng Wang:
An Efficient Post-Quantum PKE from RLWR with Simple Security Proof. SecureComm (2) 2021: 407-423 - 2020
- [j22]Qiang Song, Sifang Zhao, Mingsheng Wang:
On the Accuracy of Fault Diagnosis for Rolling Element Bearings Using Improved DFA and Multi-Sensor Data Fusion Method. Sensors 20(22): 6465 (2020) - [c27]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. ASIACRYPT (1) 2020: 415-445 - [i22]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version). IACR Cryptol. ePrint Arch. 2020: 1093 (2020)
2010 – 2019
- 2019
- [c26]Peiyao Li, Heyang Cao, Mingsheng Wang:
BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification. GLOBECOM 2019: 1-6 - [c25]Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. WASA 2019: 358-369 - [i21]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IACR Cryptol. ePrint Arch. 2019: 1438 (2019) - 2018
- [j21]Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang:
On the Generalization of Butterfly Structure. IACR Trans. Symmetric Cryptol. 2018(1): 160-179 (2018) - [c24]Ya Han, Yongqiang Li, Mingsheng Wang:
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. ICICS 2018: 647-663 - 2017
- [j20]Wei Li, Zhixiong Gong, Yingbin Chai, Cong Cheng, Tianyun Li, Qifan Zhang, Mingsheng Wang:
Hybrid gradient smoothing technique with discrete shear gap method for shell structures. Comput. Math. Appl. 74(8): 1826-1855 (2017) - [j19]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 358-379 (2017) - [c23]Zhedong Wang, Xiong Fan, Mingsheng Wang:
Compact Inner Product Encryption from LWE. ICICS 2017: 141-153 - [c22]Weijuan Zhang, Xiaoqi Jia, Jianwei Tai, Mingsheng Wang:
CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds. WASA 2017: 665-677 - [i20]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. IACR Cryptol. ePrint Arch. 2017: 178 (2017) - [i19]Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
The Security of SIMON-like Ciphers Against Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2017: 576 (2017) - [i18]Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei:
Designing Proof of Transaction Puzzles for Cryptocurrency. IACR Cryptol. ePrint Arch. 2017: 1242 (2017) - 2016
- [j18]Shaoquan Jiang, Zailiang Tang, Mingsheng Wang:
On the CLD Attack to a Statistical Model of a Key Stream Generator. Int. J. Netw. Secur. 18(5): 987-992 (2016) - [j17]Shuhong Gao, Frank Volny IV, Mingsheng Wang:
A new framework for computing Gröbner bases. Math. Comput. 85(297): 449-465 (2016) - [j16]Suqing Lin, Rui Zhang, Mingsheng Wang:
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. Secur. Commun. Networks 9(12): 1748-1758 (2016) - [c21]Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. EUROCRYPT (1) 2016: 168-195 - [c20]Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. FSE 2016: 121-139 - [c19]Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu:
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. ICICS 2016: 361-375 - [i17]Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. IACR Cryptol. ePrint Arch. 2016: 275 (2016) - [i16]Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 406 (2016) - 2015
- [j15]Bingbing Xia, Xianfeng Zhao, Dengguo Feng, Mingsheng Wang:
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter. Trans. Data Hiding Multim. Secur. 10: 1-20 (2015) - [c18]Lin Jiao, Bin Zhang, Mingsheng Wang:
Two Generic Methods of Analyzing Stream Ciphers. ISC 2015: 379-396 - [i15]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. IACR Cryptol. ePrint Arch. 2015: 159 (2015) - 2014
- [j14]Yongqiang Li, Mingsheng Wang:
Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1). Des. Codes Cryptogr. 72(2): 249-264 (2014) - [j13]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A matrix approach for constructing quadratic APN functions. Des. Codes Cryptogr. 73(2): 587-600 (2014) - [c17]Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. ACISP 2014: 131-147 - [c16]Yongqiang Li, Mingsheng Wang:
Constructing S-boxes for Lightweight Cryptography with Feistel Structure. CHES 2014: 127-146 - [c15]Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter. ICICS 2014: 132-142 - [c14]Lin Jiao, Bin Zhang, Mingsheng Wang:
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks. ISC 2014: 104-119 - 2013
- [j12]Yuyin Yu, Mingsheng Wang:
Permutation polynomials and their differential properties over residue class rings. Discret. Appl. Math. 161(18): 3104-3108 (2013) - [j11]Yongqiang Li, Mingsheng Wang:
The Nonexistence of Permutations EA-Equivalent to Certain AB Functions. IEEE Trans. Inf. Theory 59(1): 672-679 (2013) - [c13]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE. ASIACRYPT (1) 2013: 377-404 - [c12]Shengbao Wu, Mingsheng Wang:
Integral Attacks on Reduced-Round PRESENT. ICICS 2013: 331-345 - [c11]Lin Jiao, Bin Zhang, Mingsheng Wang:
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. ISC 2013: 169-184 - [i14]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
A Matrix Approach for Constructing Quadratic APN Functions. IACR Cryptol. ePrint Arch. 2013: 7 (2013) - [i13]Yuyin Yu, Mingsheng Wang:
Permutation Polynomials and Their Differential Properties over Residue Class Rings. IACR Cryptol. ePrint Arch. 2013: 251 (2013) - [i12]Yongqiang Li, Mingsheng Wang, Yuyin Yu:
Constructing Differentially 4-uniform Permutations over GF(22k) from the Inverse Function Revisited. IACR Cryptol. ePrint Arch. 2013: 731 (2013) - 2012
- [c10]Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li:
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. Inscrypt 2012: 294-310 - [c9]Shengbao Wu, Mingsheng Wang:
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers. INDOCRYPT 2012: 283-302 - [c8]Shengbao Wu, Mingsheng Wang, Wenling Wu:
Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. Selected Areas in Cryptography 2012: 355-371 - [i11]Shengbao Wu, Mingsheng Wang:
Automatic Search of Truncated Impossible Differentials and Applications. IACR Cryptol. ePrint Arch. 2012: 214 (2012) - [i10]Xiao Zhong, Mingsheng Wang:
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions. IACR Cryptol. ePrint Arch. 2012: 338 (2012) - 2011
- [j10]Yongqiang Li, Mingsheng Wang:
Permutation polynomials EA-equivalent to the inverse function over GF (2n). Cryptogr. Commun. 3(3): 175-186 (2011) - [j9]Jinwang Liu, Dongmei Li, Mingsheng Wang:
On General Factorizations for n-D Polynomial Matrices. Circuits Syst. Signal Process. 30(3): 553-566 (2011) - [j8]Yongqiang Li, Mingsheng Wang:
On EA-equivalence of certain permutations to power mappings. Des. Codes Cryptogr. 58(3): 259-269 (2011) - [c7]Yuyin Yu, Mingsheng Wang:
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. ICICS 2011: 136-142 - [i9]Yuyin Yu, Mingsheng Wang, Yongqiang Li:
Constructing differential 4-uniform permutations from know ones. IACR Cryptol. ePrint Arch. 2011: 47 (2011) - [i8]Shengbao Wu, Mingsheng Wang:
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures. IACR Cryptol. ePrint Arch. 2011: 551 (2011) - [i7]Yongqiang Li, Mingsheng Wang:
Constructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1. IACR Cryptol. ePrint Arch. 2011: 642 (2011) - 2010
- [j7]Jinwang Liu, Mingsheng Wang:
Notes on factor prime factorizations for n-D polynomial matrices. Multidimens. Syst. Signal Process. 21(1): 87 (2010) - [i6]Shengbao Wu, Mingsheng Wang, Zheng Yuan:
A Flaw in The Internal State Recovery Attack on ALPHA-MAC. IACR Cryptol. ePrint Arch. 2010: 160 (2010) - [i5]Yongqiang Li, Mingsheng Wang:
On permutation polynomials EA-equivalent to the inverse function over GF(2n). IACR Cryptol. ePrint Arch. 2010: 573 (2010) - [i4]Shuhong Gao, Frank Volny, Mingsheng Wang:
A new algorithm for computing Groebner bases. IACR Cryptol. ePrint Arch. 2010: 641 (2010)
2000 – 2009
- 2009
- [j6]Shuhong Gao, Daqing Wan, Mingsheng Wang:
Primary decomposition of zero-dimensional ideals over finite fields. Math. Comput. 78(265): 509-521 (2009) - [c6]Wensheng Zhang, Hongfu Chen, Mingsheng Wang:
A Forecast Model of Agricultural and Livestock Products Price. CCTA 2009: 40-48 - [i3]Yuyin Yu, Mingsheng Wang:
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. IACR Cryptol. ePrint Arch. 2009: 301 (2009) - 2008
- [j5]Mingsheng Wang, Jinwang Liu:
Factorization problems on n-D polynomial matrices (abstract only). ACM Commun. Comput. Algebra 42(1-2): 88-89 (2008) - [j4]Mingsheng Wang:
Remarks on n -D Polynomial Matrix Factorization Problems. IEEE Trans. Circuits Syst. II Express Briefs 55-II(1): 61-64 (2008) - [i2]Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang:
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation. IACR Cryptol. ePrint Arch. 2008: 34 (2008) - 2007
- [j3]Mingsheng Wang:
Parameter choices on Guruswami-Sudan algorithm for polynomial reconstruction. Finite Fields Their Appl. 13(4): 877-886 (2007) - [j2]Mingsheng Wang:
On Factor Prime Factorizations for n-D Polynomial Matrices. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(6): 1398-1405 (2007) - 2005
- [c5]Zuowen Tan, Zhuojun Liu, Mingsheng Wang:
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. ISPEC 2005: 374-385 - 2003
- [j1]Jinwang Liu, Zhuojun Liu, Mingsheng Wang:
The term orderings which are compatible with composition II. J. Symb. Comput. 35(2): 153-168 (2003) - [i1]Chunming Tang, Zhuojun Liu, Mingsheng Wang:
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge. IACR Cryptol. ePrint Arch. 2003: 222 (2003) - 2001
- [c4]Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:
Threshold Undeniable RSA Signature Scheme. ICICS 2001: 221-232 - [c3]Jinwang Liu, Zhuojun Liu, Xiaoqi Liu, Mingsheng Wang:
The membership problem for ideals of binomial skew polynomial rings. ISSAC 2001: 192-195 - [c2]Mingsheng Wang, Zhuojun Liu:
Remarks on Gröbner basis for ideals under composition. ISSAC 2001: 237-244 - 2000
- [c1]Mingsheng Wang, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint