What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Huaxiong Wang
Google Scholar
108
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Cong Zuo
Shangqi Lai
Shi-Feng Sun
Xingliang Yuan
Joseph K. Liu
Jun Shao
Huaxiong Wang
Liehuang Zhu
Shujie Cui
2025
conf/acns
Everlasting Fully Dynamic Group Signatures.
Yimeng He
San Ling
Khai Hanh Tang
Huaxiong Wang
2025
conf/pkc
Bootstrapping with RMFE for Fully Homomorphic Encryption.
Khin Mi Mi Aung
Enhui Lim
Sim Jun Jie
Benjamin Hong Meng Tan
Huaxiong Wang
2025
conf/pkc
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality.
Yuejun Wang
Baocang Wang
Qiqi Lai
Huaxiong Wang
2024
journals/tifs
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing.
Jingwei Hu
Yongjun Zhao
Benjamin Hong Meng Tan
Khin Mi Mi Aung
Huaxiong Wang
2024
journals/tifs
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval.
Stanislav Kruglik
Son Hoang Dau
Han Mao Kiah
Huaxiong Wang
Liang Feng Zhang
2024
conf/esorics
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices.
Feixiang Zhao
Huaxiong Wang
Jian Weng
2024
conf/pkc
Fully Dynamic Attribute-Based Signatures for Circuits from Codes.
San Ling
Khoa Nguyen
Duong Hieu Phan
Khai Hanh Tang
Huaxiong Wang
Yanhong Xu
2024
conf/icics
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.
Yan Xu
Li-Ping Wang
Huaxiong Wang
2023
journals/istr
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption.
Kexin Xu
Benjamin Hong Meng Tan
Li-Ping Wang
Khin Mi Mi Aung
Huaxiong Wang
2023
journals/tifs
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
Xiaoqin Feng
Jianfeng Ma
Huaxiong Wang
Yinbin Miao
Ximeng Liu
Zhongyuan Jiang
2023
journals/joc
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2023
conf/asiacrypt
Non-interactive Zero-Knowledge Functional Proofs.
Gongxian Zeng
Junzuo Lai
Zhengan Huang
Linru Zhang
Xiangning Wang
Kwok-Yan Lam
Huaxiong Wang
Jian Weng
2022
conf/sp
Multi-Server Verifiable Computation of Low-Degree Polynomials.
Liang Feng Zhang
Huaxiong Wang
2022
conf/asiaccs
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Liang Feng Zhang
Huaxiong Wang
Li-Ping Wang
2022
conf/eurocrypt
Field Instruction Multiple Data.
Khin Mi Mi Aung
Enhui Lim
Sim Jun Jie
Benjamin Hong Meng Tan
Huaxiong Wang
Sze Ling Yeo
2022
conf/asiacrypt
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
Jun Xu
Santanu Sarkar
Huaxiong Wang
Lei Hu
2021
conf/pkc
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation.
Khoa Nguyen
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
Yanhong Xu
Neng Zeng
2020
conf/pkc
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
Shaoquan Jiang
Guang Gong
Jingnan He
Khoa Nguyen
Huaxiong Wang
2019
conf/crypto
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Jun Xu
Santanu Sarkar
Lei Hu
Huaxiong Wang
Yanbin Pan
2019
conf/eurosp
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Zhen Liu
Guomin Yang
Duncan S. Wong
Khoa Nguyen
Huaxiong Wang
2019
conf/esorics
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Zhen Liu
Khoa Nguyen
Guomin Yang
Huaxiong Wang
Duncan S. Wong
2019
conf/pkc
Zero-Knowledge Elementary Databases with More Expressive Queries.
Benoît Libert
Khoa Nguyen
Benjamin Hong Meng Tan
Huaxiong Wang
2019
conf/ctrsa
Accountable Tracing Signatures from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2019
conf/asiacrypt
New Code-Based Privacy-Preserving Cryptographic Constructions.
Khoa Nguyen
Hanh Tang
Huaxiong Wang
Neng Zeng
2019
conf/cans
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices.
Shixiong Wang
Juanyang Zhang
Jingnan He
Huaxiong Wang
Chao Li
2019
conf/cans
Threshold Changeable Ramp Secret Sharing.
Fuchun Lin
San Ling
Huaxiong Wang
Neng Zeng
2018
conf/acisp
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
Hyung Tae Lee
Huaxiong Wang
Kai Zhang
2018
conf/crypto
Lattice-Based Zero-Knowledge Arguments for Integer Relations.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2018
conf/pkc
Constant-Size Group Signatures from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2017
conf/acns
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
San Ling
Khoa Nguyen
Huaxiong Wang
Yanhong Xu
2017
conf/provsec
Revocable Predicate Encryption from Lattices.
San Ling
Khoa Nguyen
Huaxiong Wang
Juanyang Zhang
2017
conf/asiacrypt
Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2017
conf/asiacrypt
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2016
conf/eurocrypt
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Benoît Libert
San Ling
Khoa Nguyen
Huaxiong Wang
2016
conf/asiacrypt
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2016
conf/asiacrypt
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
Benoît Libert
San Ling
Fabrice Mouhartem
Khoa Nguyen
Huaxiong Wang
2016
conf/cans
Server-Aided Revocable Identity-Based Encryption from Lattices.
Khoa Nguyen
Huaxiong Wang
Juanyang Zhang
2015
conf/pkc
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.
San Ling
Khoa Nguyen
Huaxiong Wang
2015
conf/asiacrypt
A Provably Secure Group Signature Scheme from Code-Based Assumptions.
Martianus Frederic Ezerman
Hyung Tae Lee
San Ling
Khoa Nguyen
Huaxiong Wang
2014
conf/pkc
Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Adeline Langlois
San Ling
Khoa Nguyen
Huaxiong Wang
2014
conf/asiacrypt
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Sareh Emami
San Ling
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2013
conf/pkc
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
San Ling
Khoa Nguyen
Damien Stehlé
Huaxiong Wang
2013
conf/ctrsa
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
San Ling
Huaxiong Wang
2012
journals/joc
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Xiaoming Sun
Christophe Tartary
Huaxiong Wang
Andrew Chi-Chih Yao
2012
conf/fse
On the (In)Security of IDEA in Various Hashing Modes.
Lei Wei
Thomas Peyrin
Przemyslaw Sokolowski
San Ling
Josef Pieprzyk
Huaxiong Wang
2012
conf/acisp
Revocable Identity-Based Encryption from Lattices.
Jie Chen
Hoon Wei Lim
San Ling
Huaxiong Wang
Khoa Nguyen
2012
conf/provsec
Revisiting a Secret Sharing Approach to Network Codes.
ZhaoHui Tang
Hoon Wei Lim
Huaxiong Wang
2012
conf/pkc
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
2012
conf/asiacrypt
Differential Attacks against Stream Cipher ZUC.
Hongjun Wu
Tao Huang
Phuong Ha Nguyen
Huaxiong Wang
San Ling
2011
journals/joc
Side-Channel Resistant Crypto for Less than 2, 300 GE.
Axel Poschmann
Amir Moradi
Khoongming Khoo
Chu-Wee Lim
Huaxiong Wang
San Ling
2011
conf/acisp
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis.
Phuong Ha Nguyen
Hongjun Wu
Huaxiong Wang
2011
conf/acisp
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Lei Wei
Christian Rechberger
Jian Guo
Hongjun Wu
Huaxiong Wang
San Ling
2011
conf/acisp
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem.
Yun Zhang
Christophe Tartary
Huaxiong Wang
2011
conf/fc
Authenticated Key Exchange under Bad Randomness.
Guomin Yang
Shanshan Duan
Duncan S. Wong
Chik How Tan
Huaxiong Wang
2011
conf/eurocrypt
Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Amir Moradi
Axel Poschmann
San Ling
Christof Paar
Huaxiong Wang
2010
conf/acisp
On Multidimensional Linear Cryptanalysis.
Phuong Ha Nguyen
Lei Wei
Huaxiong Wang
San Ling
2010
conf/acns
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
Hassan Jameel Asghar
Josef Pieprzyk
Huaxiong Wang
2010
conf/ches
256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Axel Poschmann
San Ling
Huaxiong Wang
2010
conf/ctrsa
Plaintext-Awareness of Hybrid Encryption.
Shaoquan Jiang
Huaxiong Wang
2010
conf/asiacrypt
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Jian Guo
San Ling
Christian Rechberger
Huaxiong Wang
2009
conf/fse
Cryptanalysis of the LAKE Hash Family.
Alex Biryukov
Praveen Gauravaram
Jian Guo
Dmitry Khovratovich
San Ling
Krystian Matusiewicz
Ivica Nikolic
Josef Pieprzyk
Huaxiong Wang
2009
conf/icisc
Efficient Fuzzy Matching and Intersection on Private Datasets.
Qingsong Ye
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2009
conf/acsac
On the Security of PAS (Predicate-Based Authentication Service).
Shujun Li
Hassan Jameel Asghar
Josef Pieprzyk
Ahmad-Reza Sadeghi
Roland Schmitz
Huaxiong Wang
2009
conf/sacrypt
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Jian Guo
Krystian Matusiewicz
Lars R. Knudsen
San Ling
Huaxiong Wang
2008
conf/fse
Cryptanalysis of LASH.
Ron Steinfeld
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
Jian Guo
San Ling
Huaxiong Wang
2008
conf/acisp
On the Improvement of the BDF Attack on LSBS-RSA.
Hung-Min Sun
Mu-En Wu
Huaxiong Wang
Jian Guo
2008
conf/acisp
Efficient Disjointness Tests for Private Datasets.
Qingsong Ye
Huaxiong Wang
Josef Pieprzyk
Xian-Mo Zhang
2008
conf/wisa
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2008
conf/asiacrypt
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Zhifang Zhang
Mulan Liu
Yeow Meng Chee
San Ling
Huaxiong Wang
2008
conf/cans
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Hung-Min Sun
Mu-En Wu
Ron Steinfeld
Jian Guo
Huaxiong Wang
2008
conf/cans
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2007
conf/acisp
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Christophe Tartary
Huaxiong Wang
2007
conf/crypto
On Secure Multi-party Computation in Black-Box Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Huaxiong Wang
2007
conf/provsec
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Christophe Tartary
Huaxiong Wang
Josef Pieprzyk
2007
conf/icics
A New Dynamic Accumulator for Batch Updates.
Peishun Wang
Huaxiong Wang
Josef Pieprzyk
2007
conf/ctrsa
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/ccs
An attack-localizing watermarking scheme for natural language documents.
Gaurav Gupta
Josef Pieprzyk
Huaxiong Wang
2006
conf/pkc
Anonymous Signature Schemes.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
Huaxiong Wang
2006
conf/pkc
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/icics
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Guomin Yang
Duncan S. Wong
Huaxiong Wang
Xiaotie Deng
2006
conf/iwsec
Rateless Codes for the Multicast Stream Authentication Problem.
Christophe Tartary
Huaxiong Wang
2006
conf/asiacrypt
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/cans
Achieving Multicast Stream Authentication Using MDS Codes.
Christophe Tartary
Huaxiong Wang
2005
conf/wisa
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.
Christophe Tartary
Huaxiong Wang
2005
conf/pkc
Converse Results to the Wiener Attack on RSA.
Ron Steinfeld
Scott Contini
Huaxiong Wang
Josef Pieprzyk
2004
conf/pkc
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2004
conf/asiacrypt
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2003
conf/ctrsa
Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Huaxiong Wang
Josef Pieprzyk
2003
conf/asiacrypt
Universal Designated-Verifier Signatures.
Ron Steinfeld
Laurence Bull
Huaxiong Wang
Josef Pieprzyk
2003
conf/asiacrypt
Efficient One-Time Proxy Signatures.
Huaxiong Wang
Josef Pieprzyk
2003
conf/sacrypt
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Josef Pieprzyk
Huaxiong Wang
Chaoping Xing
2002
conf/acisp
A Secure Re-keying Scheme with Key Recovery Property.
Hartono Kurnio
Reihaneh Safavi-Naini
Huaxiong Wang
2002
conf/fc
Redistribution of Mechanical Secret Shares.
Yvo Desmedt
Reihaneh Safavi-Naini
Huaxiong Wang
2002
conf/icisc
Threshold MACs.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
Peter R. Wild
2002
conf/icisc
A Dynamic Group Key Distribution Scheme with Flexible User Join.
Hartono Kurnio
Luke McAven
Reihaneh Safavi-Naini
Huaxiong Wang
2001
conf/acisp
How to Construct Fail-Stop Confirmer Signature Schemes.
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
2001
conf/icisc
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Beomsik Song
Huaxiong Wang
Jennifer Seberry
2001
conf/icisc
Efficient Revocation Schemes for Secure Multicast.
Hartono Kurnio
Reihaneh Safavi-Naini
Huaxiong Wang
2000
conf/ccs
New constructions for multicast re-keying schemes using perfect hash families.
Reihaneh Safavi-Naini
Huaxiong Wang
2000
conf/acisp
Key Management for Secure Multicast with Dynamic Controller.
Hartono Kurnio
Reihaneh Safavi-Naini
Willy Susilo
Huaxiong Wang
2000
conf/acisp
On Multiplicative Secret Sharing Schemes.
Huaxiong Wang
Kwok-Yan Lam
Guozhen Xiao
Huanhui Zhao
1999
conf/acisp
Changing Thresholds in the Absence of Secure Channels.
Keith M. Martin
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1999
conf/icisc
A New Approach to Robust Threshold RSA Signature Schemes.
Reihaneh Safavi-Naini
Huaxiong Wang
Kwok-Yan Lam
1999
conf/asiacrypt
Broadcast Authentication in Group Communication.
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/acisp
On Construction of Cumulative Secret Sharing Schemes.
Hossein Ghodosi
Josef Pieprzyk
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/eurocrypt
New Results on Multi-Receiver Authentication Codes.
Reihaneh Safavi-Naini
Huaxiong Wang
1998
conf/asiacrypt
Bounds and Constructions for Multireceiver Authentication Codes.
Reihaneh Safavi-Naini
Huaxiong Wang
Coauthors
Adeline Langlois
(1)
Ahmad-Reza Sadeghi
(1)
Alex Biryukov
(1)
Amir Moradi
(2)
Andrew Chi-Chih Yao
(1)
Axel Poschmann
(3)
Baocang Wang
(1)
Benjamin Hong Meng Tan
(5)
Benoît Libert
(8)
Beomsik Song
(1)
Chao Li
(1)
Chaoping Xing
(1)
Cheng Chen
(1)
Chik How Tan
(1)
Christian Rechberger
(2)
Christof Paar
(1)
Christophe Tartary
(8)
Chu-Wee Lim
(1)
Cong Zuo
(1)
Damien Stehlé
(1)
Dengguo Feng
(1)
Dmitry Khovratovich
(1)
Duncan S. Wong
(5)
Duong Hieu Phan
(1)
Enhui Lim
(2)
Fabrice Mouhartem
(3)
Feixiang Zhao
(1)
Fuchun Lin
(1)
Gaurav Gupta
(1)
Gongxian Zeng
(1)
Guang Gong
(1)
Guomin Yang
(5)
Guozhen Xiao
(1)
Han Mao Kiah
(1)
Hanh Tang
(1)
Hartono Kurnio
(4)
Hassan Jameel Asghar
(2)
Hongjun Wu
(3)
Hoon Wei Lim
(3)
Hossein Ghodosi
(1)
Huanhui Zhao
(1)
Huaxiong Wang
(108)
Hung-Min Sun
(2)
Hyung Tae Lee
(2)
Ivica Nikolic
(2)
Jennifer Seberry
(1)
Jian Guo
(7)
Jian Weng
(2)
Jianfeng Ma
(1)
Jie Chen
(2)
Jingnan He
(2)
Jingwei Hu
(1)
Josef Pieprzyk
(29)
Joseph K. Liu
(1)
Juanyang Zhang
(3)
Jun Shao
(1)
Jun Xu
(2)
Junzuo Lai
(1)
Kai Zhang
(1)
Keith M. Martin
(2)
Kexin Xu
(1)
Khai Hanh Tang
(2)
Khin Mi Mi Aung
(4)
Khoa Nguyen
(24)
Khoongming Khoo
(1)
Krystian Matusiewicz
(3)
Kwok-Yan Lam
(3)
Lars R. Knudsen
(1)
Laurence Bull
(1)
Lei Hu
(2)
Lei Wei
(3)
Li-Ping Wang
(3)
Liang Feng Zhang
(3)
Liehuang Zhu
(1)
Linru Zhang
(1)
Luke McAven
(1)
Martianus Frederic Ezerman
(1)
Mu-En Wu
(2)
Mulan Liu
(1)
Neng Zeng
(3)
Peishun Wang
(3)
Peter R. Wild
(1)
Phuong Ha Nguyen
(3)
Praveen Gauravaram
(1)
Przemyslaw Sokolowski
(1)
Qingsong Ye
(2)
Qiqi Lai
(1)
Reihaneh Safavi-Naini
(15)
Roland Schmitz
(1)
Ron Steinfeld
(13)
San Ling
(34)
Santanu Sarkar
(2)
Sareh Emami
(1)
Scott Contini
(2)
Shangqi Lai
(1)
Shanshan Duan
(1)
Shaoquan Jiang
(2)
Shi-Feng Sun
(1)
Shixiong Wang
(1)
Shujie Cui
(1)
Shujun Li
(1)
Sim Jun Jie
(2)
Son Hoang Dau
(1)
Stanislav Kruglik
(1)
Sze Ling Yeo
(1)
Tao Huang
(1)
Thomas Peyrin
(1)
Willy Susilo
(3)
Xian-Mo Zhang
(1)
Xiangning Wang
(1)
Xiaoming Sun
(1)
Xiaoqin Feng
(1)
Xiaotie Deng
(2)
Ximeng Liu
(1)
Xingliang Yuan
(1)
Yan Xu
(1)
Yanbin Pan
(1)
Yanhong Xu
(5)
Yeow Meng Chee
(1)
Yimeng He
(1)
Yinbin Miao
(1)
Yongjun Zhao
(1)
Yuejun Wang
(1)
Yun Zhang
(1)
Yvo Desmedt
(3)
ZhaoHui Tang
(1)
Zhen Liu
(2)
Zhenfeng Zhang
(1)
Zhengan Huang
(1)
Zhifang Zhang
(1)
Zhongyuan Jiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to