Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Huaxiong Wang
Search web for home page
Program Committees
1
2008
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
pkc
353-371
2
2012
Differential Attacks against Stream Cipher ZUC
asiacrypt
262-277
3
2012
On the (In)Security of IDEA in Various Hashing Modes
fse
163-179
4
2011
Pushing the Limits: A Very Compact and a Threshold Implementation of AES
eurocrypt
69
5
2011
Side-Channel Resistant Crypto for Less than 2, 300 GE
jofc
322-345
6
2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
asiacrypt
56-75
7
2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
eprint
online
8
2010
256 Bit Standardized Crypto for 650 GE - GOST Revisited
ches
219-233
9
2010
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
eprint
online
10
2009
Cryptanalysis of the LAKE Hash Family
fse
156-179
11
2008
Cryptanalysis of LASH
fse
207-223
12
2008
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
eprint
online
13
2008
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
asiacrypt
19-36
14
2007
Privacy-Preserving Distributed Set Intersection
eprint
online
15
2007
On Secure Multi-party Computation in Black-Box Groups
crypto
591-612
16
2007
Cryptanalysis of LASH
eprint
online
17
2006
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
eprint
online
18
2006
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
eprint
online
19
2006
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
pkc
online
20
2006
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
eprint
online
21
2006
Anonymous Signature Schemes
pkc
online
22
2006
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
asiacrypt
online
23
2005
Converse Results to the Wiener Attack on RSA
pkc
online
24
2005
Anonymous Signature Schemes
eprint
online
25
2004
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures
pkc
online
26
2004
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
asiacrypt
online
27
2003
Efficient One-Time Proxy Signatures
asiacrypt
507-522
28
2003
Universal Designated-Verifier Signatures
eprint
online
29
2003
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
eprint
online
30
2003
Distributing the Encryption and Decryption of a Block Cipher
eprint
online
31
2003
Universal Designated-Verifier Signatures
asiacrypt
online
32
1999
Broadcast Authentication in Group Communication
asiacrypt
399-411
33
1998
Bounds and Constructions for Multireceiver Authentication Codes
asiacrypt
242-256
34
1998
New Results on Multi-Receiver Authentication Codes
eurocrypt
527-541
Coauthors of Huaxiong Wang
Lei Wei 0001
Amir Moradi
Hassan Jameel Asghar
Alex Biryukov
Laurence Bull
Yeow Meng Chee
Scott Contini
Xiaotie Deng
Yvo Desmedt
Praveen Gauravaram
Jian Guo
Tao Huang
Khoongming Khoo
Dmitry Khovratovich
Chu-Wee Lim
San Ling
Mulan Liu
Keith M. Martin
Krystian Matusiewicz
Amir Moradi
Phuong Ha Nguyen
Ivica Nikolić
Christof Paar
Thomas Peyrin
Josef Pieprzyk
Axel Poschmann
Christian Rechberger
Reihaneh Safavi-Naini
Przemyslaw Sokolowski
Ron Steinfeld
Hung-Min Sun
Christophe Tartary
Peter R. Wild
Duncan S. Wong
Mu-En Wu
Hongjun Wu
Guomin Yang
Qingsong Ye
Zhifang Zhang