Follow
Huaxiong Wang
Title
Cited by
Cited by
Year
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Annual International Conference on the Theory and Applications of …, 2011
5972011
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
3272003
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24 (2), 322-345, 2011
2622011
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2522008
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Annual International Conference on the Theory and Applications of …, 2016
2392016
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
International workshop on public key cryptography, 107-124, 2013
2002013
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
International workshop on public key cryptography, 345-361, 2014
1832014
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
B Libert, S Ling, F Mouhartem, K Nguyen, H Wang
International Conference on the Theory and Application of Cryptology and …, 2016
1792016
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
1602004
Group signatures from lattices: simpler, tighter, shorter, ring-based
S Ling, K Nguyen, H Wang
IACR International Workshop on Public Key Cryptography, 427-449, 2015
1562015
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing, 2020
1472020
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
International Conference on the Theory and Application of Cryptology and …, 2010
1462010
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things
X Zhang, C Xu, H Wang, Y Zhang, S Wang
IEEE Transactions on Dependable and Secure Computing, 2019
1422019
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
1342012
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1302003
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
1142013
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1112001
256 bit standardized crypto for 650 GE–GOST revisited
A Poschmann, S Ling, H Wang
International Workshop on Cryptographic Hardware and Embedded Systems, 219-233, 2010
1102010
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
1072008
Lattice-based group signatures: achieving full dynamicity with ease
S Ling, K Nguyen, H Wang, Y Xu
International Conference on Applied Cryptography and Network Security, 293-312, 2017
1052017
The system can't perform the operation now. Try again later.
Articles 1–20