Pushing the limits: A very compact and a threshold implementation of AES A Moradi, A Poschmann, S Ling, C Paar, H Wang Annual International Conference on the Theory and Applications of …, 2011 | 590 | 2011 |
Universal designated-verifier signatures R Steinfeld, L Bull, H Wang, J Pieprzyk International Conference on the Theory and Application of Cryptology and …, 2003 | 319 | 2003 |
Side-channel resistant crypto for less than 2,300 GE A Poschmann, A Moradi, K Khoo, CW Lim, H Wang, S Ling Journal of Cryptology 24 (2), 322-345, 2011 | 257 | 2011 |
Two-factor mutual authentication based on smart cards and passwords G Yang, DS Wong, H Wang, X Deng Journal of computer and system sciences 74 (7), 1160-1172, 2008 | 249 | 2008 |
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors B Libert, S Ling, K Nguyen, H Wang Annual International Conference on the Theory and Applications of …, 2016 | 231 | 2016 |
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications S Ling, K Nguyen, D Stehlé, H Wang International workshop on public key cryptography, 107-124, 2013 | 194 | 2013 |
Lattice-based group signature scheme with verifier-local revocation A Langlois, S Ling, K Nguyen, H Wang International workshop on public key cryptography, 345-361, 2014 | 181 | 2014 |
Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions B Libert, S Ling, F Mouhartem, K Nguyen, H Wang International Conference on the Theory and Application of Cryptology and …, 2016 | 169 | 2016 |
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures R Steinfeld, H Wang, J Pieprzyk International Workshop on Public Key Cryptography, 86-100, 2004 | 156 | 2004 |
Group signatures from lattices: simpler, tighter, shorter, ring-based S Ling, K Nguyen, H Wang IACR International Workshop on Public Key Cryptography, 427-449, 2015 | 154 | 2015 |
Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2 J Guo, S Ling, C Rechberger, H Wang International Conference on the Theory and Application of Cryptology and …, 2010 | 143 | 2010 |
FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things X Zhang, C Xu, H Wang, Y Zhang, S Wang IEEE Transactions on Dependable and Secure Computing, 2019 | 134 | 2019 |
Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen Australasian Conference on Information Security and Privacy, 390-403, 2012 | 132 | 2012 |
Understanding node capture attacks in user authentication schemes for wireless sensor networks C Wang, D Wang, Y Tu, G Xu, H Wang IEEE Transactions on Dependable and Secure Computing, 2020 | 130 | 2020 |
Linear authentication codes: bounds and constructions H Wang, C Xing, R Safavi-Naini IEEE Transactions on Information Theory 49 (4), 866-872, 2003 | 129 | 2003 |
Broadcast anti-jamming systems Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk Computer Networks 35 (2-3), 223-236, 2001 | 111 | 2001 |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang Cryptographers’ Track at the RSA Conference, 50-67, 2013 | 110 | 2013 |
256 bit standardized crypto for 650 GE–GOST revisited A Poschmann, S Ling, H Wang International Workshop on Cryptographic Hardware and Embedded Systems, 219-233, 2010 | 110 | 2010 |
Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups P Wang, H Wang, J Pieprzyk International conference on cryptology and network security, 178-195, 2008 | 104 | 2008 |
Lattice-based group signatures: achieving full dynamicity with ease S Ling, K Nguyen, H Wang, Y Xu International Conference on Applied Cryptography and Network Security, 293-312, 2017 | 103 | 2017 |