


default search action
Huaxiong Wang
- > Home > Persons > Huaxiong Wang
Publications
- 2020
[j89]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020)- 2015
[j56]Mehmet A. Orgun
, Atilla Elçi, Josef Pieprzyk
, Alexander G. Chefranov
, Rajan Shankaran
, Huaxiong Wang:
Special issue on trust and security in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3791-3793 (2015)- 2014
[j54]Sareh Emami, San Ling
, Ivica Nikolic
, Josef Pieprzyk
, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. Cryptogr. Commun. 6(3): 171-187 (2014)
[c101]Sareh Emami, San Ling
, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. ASIACRYPT (1) 2014: 141-157
[i34]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. IACR Cryptol. ePrint Arch. 2014: 56 (2014)- 2013
[j46]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the convex hull click human identification protocol. Int. J. Inf. Sec. 12(2): 83-96 (2013)
[i31]Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The Resistance of PRESENT-80 Against Related-Key Differential Attacks. IACR Cryptol. ePrint Arch. 2013: 522 (2013)- 2012
[j41]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Xiaoming Sun
, Christophe Tartary, Huaxiong Wang, Andrew Chi-Chih Yao:
Graph Coloring Applied to Secure Computation in Non-Abelian Groups. J. Cryptol. 25(4): 557-600 (2012)
[c91]Lei Wei, Thomas Peyrin
, Przemyslaw Sokolowski, San Ling
, Josef Pieprzyk
, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. FSE 2012: 163-179
[c89]Ron Steinfeld, San Ling
, Josef Pieprzyk
, Christophe Tartary, Huaxiong Wang:
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Public Key Cryptography 2012: 353-371
[i27]Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. IACR Cryptol. ePrint Arch. 2012: 264 (2012)- 2011
[j37]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
On the Hardness of the Sum of k Mins Problem. Comput. J. 54(10): 1652-1660 (2011)
[j36]Josef Pieprzyk
, Huaxiong Wang, Xian-Mo Zhang:
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions. Int. J. Comput. Math. 88(7): 1398-1416 (2011)- 2010
[j32]Hung-Min Sun, Huaxiong Wang, Bying-He Ku, Josef Pieprzyk
:
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time. SIAM J. Discret. Math. 24(2): 617-638 (2010)
[c79]Hassan Jameel Asghar
, Josef Pieprzyk
, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. ACNS 2010: 349-366
[c77]Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing. AISC 2010: 5-11
[c74]Hassan Jameel Asghar
, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. ISC 2010: 24-30
[i14]Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang:
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. IACR Cryptol. ePrint Arch. 2010: 316 (2010)
[i13]Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. IACR Cryptol. ePrint Arch. 2010: 478 (2010)- 2009
[j30]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
, Xian-Mo Zhang:
Unconditionally secure disjointness tests for private datasets. Int. J. Appl. Cryptogr. 1(3): 225-235 (2009)
[c73]Shujun Li
, Hassan Jameel Asghar
, Josef Pieprzyk
, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-Based Authentication Service). ACSAC 2009: 209-218
[c72]Alex Biryukov
, Praveen Gauravaram
, Jian Guo
, Dmitry Khovratovich, San Ling
, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. FSE 2009: 156-179
[c71]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
Privacy Enhancements for Hardware-Based Security Modules. ICETE (Selected Papers) 2009: 224-236
[c70]Qingsong Ye, Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Efficient Fuzzy Matching and Intersection on Private Datasets. ICISC 2009: 211-228
[c67]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Certified Pseudonyms Colligated with Master Secret Key. SECRYPT 2009: 190-197
[i11]Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang:
On the Security of PAS (Predicate-based Authentication Service). IACR Cryptol. ePrint Arch. 2009: 476 (2009)- 2008
[j29]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Security Analysis of Australian and E.U. E-passport Implementation. J. Res. Pract. Inf. Technol. 40(3): 187-206 (2008)
[j28]Jin Yuan, Cunsheng Ding
, Huaxiong Wang, Josef Pieprzyk
:
Permutation polynomials of the form (xp-x+delta)s+L(x). Finite Fields Their Appl. 14(2): 482-493 (2008)
[j27]Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk
:
Analysis of bilinear pairing-based accumulator for identity escrowing. IET Inf. Secur. 2(4): 99-107 (2008)
[j26]Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
:
A coding approach to the multicast stream authentication problem. Int. J. Inf. Sec. 7(4): 265-283 (2008)
[c64]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
, Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets. ACISP 2008: 155-169
[c63]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data. APSCC 2008: 1381-1386
[c61]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Formal Security Analysis of Australian E-passport Implementation. AISC 2008: 75-82
[c59]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. CANS 2008: 178-195
[c58]Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
, Jian Guo
, San Ling
, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223
[c57]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
An On-Line Secure E-Passport Protocol. ISPEC 2008: 14-28
[c56]Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
:
Secure Computation of the Vector Dominance Problem. ISPEC 2008: 319-333
[c55]Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
:
Distributed Private Matching and Set Operations. ISPEC 2008: 347-360
[c53]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
A Fair e-Tendering Protocol. SECRYPT 2008: 294-299
[c52]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Threshold Privacy Preserving Keyword Searches. SOFSEM 2008: 646-658
[c51]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. WISA 2008: 145-159- 2007
[j21]Henk van Tilborg, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang:
New constructions of anonymous membership broadcasting schemes. Adv. Math. Commun. 1(1): 29-44 (2007)
[j19]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. IEEE Trans. Inf. Theory 53(7): 2542-2559 (2007)
[c49]Christophe Tartary, Josef Pieprzyk
, Huaxiong Wang:
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Inscrypt 2007: 167-181
[c48]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Huaxiong Wang:
On Secure Multi-party Computation in Black-Box Groups. CRYPTO 2007: 591-612
[c47]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. CT-RSA 2007: 357-371
[c46]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
A New Dynamic Accumulator for Batch Updates. ICICS 2007: 98-112
[c45]Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. ProvSec 2007: 17-34
[c44]Peishun Wang, Huaxiong Wang, Josef Pieprzyk
:
Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Secure Data Management 2007: 108-123
[i7]Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. IACR Cryptol. ePrint Arch. 2007: 430 (2007)- 2006
[j18]Shoulun Long, Josef Pieprzyk
, Huaxiong Wang, Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptogr. 40(2): 191-209 (2006)
[j16]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Lattice-based threshold-changeability for standard CRT secret-sharing schemes. Finite Fields Their Appl. 12(4): 653-680 (2006)
[c43]Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices. ACSW 2006: 213-220
[c42]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ASIACRYPT 2006: 194-209
[c40]Gaurav Gupta
, Josef Pieprzyk
, Huaxiong Wang:
An attack-localizing watermarking scheme for natural language documents. AsiaCCS 2006: 157-165
[c37]Yvo Desmedt, Josef Pieprzyk
, Ron Steinfeld, Huaxiong Wang:
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ISC 2006: 459-475
[c35]Ron Steinfeld, Josef Pieprzyk
, Huaxiong Wang:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Public Key Cryptography 2006: 157-173
[i6]Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2006: 206 (2006)- 2005
[c32]Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk
:
Converse Results to the Wiener Attack on RSA. Public Key Cryptography 2005: 184-198
[c31]Vijayakrishnan Pasupathinathan, Josef Pieprzyk
, Huaxiong Wang:
Privacy Enhanced Electronic Cheque System. CEC 2005: 431-434- 2004
[j13]Huaxiong Wang, Josef Pieprzyk
:
Shared generation of pseudo-random functions. J. Complex. 20(2-3): 458-472 (2004)
[c28]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
:
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. ASIACRYPT 2004: 170-186
[c27]Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk
, Kris Gaj:
Securing Multicast Groups in Ad Hoc Networks. AWCC 2004: 194-207
[c26]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100
[e1]Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings. Lecture Notes in Computer Science 3108, Springer 2004, ISBN 3-540-22379-7 [contents]- 2003
[c25]Huaxiong Wang, Josef Pieprzyk
:
Efficient One-Time Proxy Signatures. ASIACRYPT 2003: 507-522
[c24]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
:
Universal Designated-Verifier Signatures. ASIACRYPT 2003: 523-542
[c23]Huaxiong Wang, Josef Pieprzyk
:
Shared Generation of Pseudo-Random Functions with Cumulative Maps. CT-RSA 2003: 281-294
[c22]Josef Pieprzyk
, Huaxiong Wang, Chaoping Xing
:
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Selected Areas in Cryptography 2003: 88-100
[i2]Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk:
Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 192 (2003)
[i1]Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. IACR Cryptol. ePrint Arch. 2003: 193 (2003)- 2002
[c20]Huaxiong Wang, Josef Pieprzyk
:
A Combinatorial Approach to Anonymous Membership Broadcast. COCOON 2002: 162-170
[c18]Keith M. Martin, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. ICISC 2002: 237-252- 2001
[j10]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
:
Broadcast anti-jamming systems. Comput. Networks 35(2-3): 223-236 (2001)- 1999
[j5]Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. Aust. Comput. J. 31(2): 34-43 (1999)
[c7]Keith M. Martin, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang:
Changing Thresholds in the Absence of Secure Channels. ACISP 1999: 177-191
[c4]Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Chris Charnes, Josef Pieprzyk
:
Broadcast anti-jamming systems. ICON 1999: 349-355- 1998
[c3]Hossein Ghodosi, Josef Pieprzyk
, Reihaneh Safavi-Naini, Huaxiong Wang:
On Construction of Cumulative Secret Sharing Schemes. ACISP 1998: 379-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-31 23:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






