Huaxiong Wang
Title
Cited by
Cited by
Year
Pushing the limits: A very compact and a threshold implementation of AES
A Moradi, A Poschmann, S Ling, C Paar, H Wang
Annual International Conference on the Theory and Applications of …, 2011
4362011
Universal designated-verifier signatures
R Steinfeld, L Bull, H Wang, J Pieprzyk
International Conference on the Theory and Application of Cryptology and …, 2003
2602003
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2202008
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004
H Wang, J Pieprzyk, V Varadharajan
Proceedings 3108, 0
190*
Side-channel resistant crypto for less than 2,300 GE
A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling
Journal of Cryptology 24 (2), 322-345, 2011
1702011
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
R Steinfeld, H Wang, J Pieprzyk
International Workshop on Public Key Cryptography, 86-100, 2004
1252004
Lattice-based group signature scheme with verifier-local revocation
A Langlois, S Ling, K Nguyen, H Wang
International Workshop on Public Key Cryptography, 345-361, 2014
1162014
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications
S Ling, K Nguyen, D Stehlé, H Wang
International Workshop on Public Key Cryptography, 107-124, 2013
1142013
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2
J Guo, S Ling, C Rechberger, H Wang
International Conference on the Theory and Application of Cryptology and …, 2010
1142010
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Annual International Conference on the Theory and Applications of …, 2016
1122016
Linear authentication codes: bounds and constructions
H Wang, C Xing, R Safavi-Naini
IEEE Transactions on Information Theory 49 (4), 866-872, 2003
1082003
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1012001
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions
B Libert, S Ling, F Mouhartem, K Nguyen, H Wang
International Conference on the Theory and Application of Cryptology and …, 2016
952016
Group signatures from lattices: simpler, tighter, shorter, ring-based
S Ling, K Nguyen, H Wang
IACR International Workshop on Public Key Cryptography, 427-449, 2015
952015
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
862013
Multireceiver authentication codes: models, bounds, constructions, and extensions
R Safavi-Naini, H Wang
Information and Computation 151 (1-2), 148-172, 1999
861999
256 bit standardized crypto for 650 GE–GOST revisited
A Poschmann, S Ling, H Wang
International Workshop on Cryptographic Hardware and Embedded Systems, 219-233, 2010
842010
New results on multi-receiver authentication codes
R Safavi-Naini, H Wang
International Conference on the Theory and Applications of Cryptographic …, 1998
801998
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups
P Wang, H Wang, J Pieprzyk
International conference on cryptology and network security, 178-195, 2008
742008
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
712012
The system can't perform the operation now. Try again later.
Articles 1–20