Publications
|
||
Book 1.
San Ling, Huaxiong Wang
& Chaoping Xing, Algebraic Curves
in Cryptography, CRC Press, 2013, 320 pp. Edited Books 1.
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun,
Huaxiong Wang & RajanShankaran, Theory and Practice of Cryptography
Solutions for Secure Information Systems, IGI, 2013. 2.
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing
Shao, Yuansheng Tang, Huaxiong Wang & Chaoping Xing,
Coding and Cryptology -
Proceedings of the Third International Workshop, IWCC 2011 (Qingdao, China),
Lecture Notes in Computer Science 6639, Springer, 2011, viii + 293 pp. 3.
Yeow Meng Chee, Chao Li,
Sang Ling, Huaxiong Wang & Chaoping Xing, Coding and Cryptology, Proceedings of the Second International Workshop,
IWCC 2009, (Zhang Jia Jie, China), Lecture Notes in Computer Science 5557,
Springer, 2009, viii + 273 pp. 4.
Yongqing Li, San Ling,
Harald Niederreiter, Huaxiong Wang, Chaoping Xing
& Shengyuan Zhang, Coding and Cryptology, Proceedings of the First International
Workshop (Wuyi Mountain, Fujian, China), Series on
Coding Theory and Cryptology - Vol. 4, World Scientific, 2008. 5.
Feng Bao,
San Ling, Tatsuaki Okamoto, Huaxiong Wang &
Chaoping Xing, Cryptology and Net- work
Security, Proceedings of 6th International Conference, CANS 2007, Lecture
Notes in Computer Science, Vol. 4856, Springer 2007. 6.
Yvo Desmedt, Huaxiong Wang,
Yi Mu & Yongqing Li, Cryptology
and Network Security (edited), Proceedings of 4th International
Conference, CANS 2005, Lecture Notes in Computer Science Vol. 3810, Springer
2005. 7.
Huaxiong Wang, Josef
Pieprzyk & Vijay Varadharajan, Information Security and Privacy
(edited), Proceedings of 9th Australasian Conference, ACISP'04, Lecture Notes
in Computer Science, Vol. 3108, 2004. 8.
Kwok Yan Lam, Igor Shparlinski, Huaxiong Wang & Chaoping Xing, Cryptography and Computational Number
Theory (edited), Proceedings of Workshop of Cryptography and
Computational Number Theory, Birkhauser, 2001. Book Chapters 1.
San Ling, Huaxiong Wang
& Chaoping Xing, Cover-free Families and Their Applications, in Book Security in Distributed and Networking
Systems, World Scientific, 2007. 2.
Harald Niederreiter,
Huaxiong Wang & Chaoping Xing, Function Fields over Finite Fields and
Their Applications to Cryptography, in Book Topics in Geometry, Coding Theory and Cryptography, by Aenaldo Garcia and Henning Stichtenoth
(editors), Springer, 59 - 104, 2007. Journal Papers 1.
Zuling Chang, Martianus Frederic Ezerman, San Ling, & Huaxiong Wang,
Construction of de Bruijn Sequences from Product of
Two Irreducible Polynomials, Cryptography
and Communications, Accepted: 26 February 2017. 2.
Chang Xu, Rongxing Lu,
Huaxiong Wang, Liehuang Zhu & Cheng Huang,
PAVS: A New Privacy- Preserving Data Aggregation Scheme for Vehicle Sensing
Systems, Sensors, 2017, 17(3), 1-
18 (2017). 3.
Hyung Tae Lee, San Ling, Jae
Hong Seo & Huaxiong Wang, Semi-generic construction of public key encryption
and identity-based encryption with equality test, Inf. Sci. 373: 419-440 (2016). 4.
Hyung Tae Lee, San Ling, Jae
Hong Seo, & Huaxiong Wang, CCA2 Attack and Modification of Huang et al.'s
Public Key Encryption with Authorized Equality Test, The Computer Journal, 59(11): 1689-1694 (2016). 5.
Myungsun Kim, Hyung Tae Lee,
San Ling, & Huaxiong Wang, On the Efficiency of FHE-based Private Queries,
Accepted to IEEE Transactions on
Dependable and Secure Computing, May 2016. 6.
Hyung Tae Lee, San Ling,
& Huaxiong Wang, Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption,
Theoretical Computer Science, 640:
104-114 (2016). 7.
Shantian Cheng, Khoa Nguyen, & Huaxiong Wang, Policy-based signature
scheme from lattices, Designs, Codes
and Cryptography, 81(1): 43-74 (2016). 8.
Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin & Huaxiong Wang, A Provable
Authenticated Group Key Agreement Protocol for Mobile Environment, Information Sciences, Vol. 321:
224-237 (2015). 9.
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk & Huaxiong Wang,
The resistance of PRESENT-80 against related-key differential attacks, Cryptography and Communications 6(3):
171-187 (2014). 10.
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Hoeteck Wee, Shorter identity-based encryption via
asymmetric pairings, Designs, Codes
and Cryptography, 73(3): 911-947 (2014). 11.
Jie Chen, Hoon Wei Lim, San Ling, Le Su & Huaxiong Wang,
Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography,
73(3): 731-746 (2014). 12.
Yeow Meng Chee, San Ling,
Huaxiong Wang & Liangfeng Zhang, Upper bounds
on matching families in Z_{pq}^n. IEEE Transactions on Information Theory,
Vol. 58, No. 8 (2013), 5231 - 5139. - 1782. 13.
San Ling, Igor Shparlinski & Huaxiong Wang, On the Multidimensional
Distribution of the Naor-Reingold Pseudo-Random
Function, Mathematics of Computation,
83(289) (2014) 14.
Xun Yi, San Ling &
Huaxiong Wang, Efficient two-server password-only authenticated key exchange,
IEEE Transactions on Parallel and
Distributed Systems, Vol. 24, No. 9 (2013), 1173 - 1782. 15.
Jie Chen, Hoon Wei Lim, San Ling & Huaxiong Wang, The relation
and transformation between hierarchical inner product encryption and spatial
encryption, Designs, Codes and
Cryptography 71(2): 347-364 (2014). 16.
Hoon Wei Lim, Florian Kerschbaum & Huaxiong
Wang. Workflow Signatures for Business Process Compliance, IEEE Transactions on Dependable and
Secure Computing, vol. 9, no. 5 (2012), 756-769. 17.
Romar dela Cruz & Huaxiong Wang,
Cheating-immune secret sharing schemes from codes and cumulative arrays, Cryptography and Communications, vol.
5, no. 1 (2013), 67-83. 18.
Hassan Jammel
Asghar, Shujun Li, Josef
Pieprzyk & Huaxiong Wang, Cryptanalysis of the Convex Hull Click Human
Identification Protocol, International
Journal of Information Security, vol. 12, no.2 (2013), 83-96. 19.
Yeow Meng Chee, Tao Feng,
San Ling, Huaxiong Wang & Liangfeng Zhang, Query-Efficient
Locally Decodable Codes of Subexponential Length, Computational Complexity, Vol. 22,
No. 1 (2013), 159 - 189. 20.
Amos Biemel,
Yeow Meng Chee, Huaxiong Wang & Liangfeng
Zhang, Communication-efficient distributed oblivious transfer, Journal of Computer and System Sciences,
vol. 78, no. 4 (2012), 1142-1157. 21.
Yvo Desmedt, Josef Pieprzyk,
Ron Steinfeld, Xiaoming Sun, Christophe Tartary,
Huaxiong Wang & Andrew Chi-Chih Yao, Graph
Coloring Applied to Secure Computation in Non-Abelian Groups, Journal of Cryptology, vol. 25, no. 4
(2012), 557-600. 22.
Yeow Meng Chee, Huaxiong
Wang & Liangfeng Zhang, On Bringer-Chabanne EPIR protocol for polynomial evaluation, Journal of Mathematical Cryptology,
vol. 5, no. 34 (2012), 277301. 23.
Zhifang Zhang, Yeow Meng Chee, San Ling, Mulan Liu & Huaxiong Wang,
Threshold changeable secret sharing schemes revisited, Theoretical Computer Science, vol. 418 (2012), 106115. 24.
San Ling, Igor Shparlinski, Ron Steinfeld & Huaxiong Wang, On the
Modular Inversion Hidden Number Problem, Journal
of Symbolic Computation, Vol. 47 (2012), 358-367. 25.
Christophe Tartary, Huaxiong
Wang & San Ling, Authentication of Digital Streams, IEEE Trans. on Info. Theory, vol. 57, no. 9 (2011), 6285 - 6303. 26.
Christophe Tartary, Huaxiong
Wang & Yun Zhang, An Efficient and Information Theoretic Secure Rational
Secret Sharing Scheme Based on Bivariate Polynomials, International Journal of Foundations of Computer Science (Special
Issue on Cryptography), vol. 22, no. 6 (2011), 1395 - 1416. 27.
Hassan Jammel
Asghar, Shujun Li, Josef
Pieprzyk & Huaxiong Wang, On the Hardness of the Sum of k Mins Problem, The
Computer Journal, vol. 54, no. 10 (2011), 1652-1660. 28.
Josef Pieprzyk, Huaxiong
Wang & Xianmo Zhang, Mobius Transforms,
Coincident Boolean Functions and Noncoincidence
Property of Boolean Functions, International
Journal of Computer Mathematics, Vol. 88, No. 7 (2011), 1398 - 1416. 29.
A. Poschmann,
A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S.
Ling, Side-Channel Resistant Crypto for less than 2,300 GE, Journal of Cryptology, Vol. 24, No. 2
(2011), 322 - 345. 30.
Hung-Min Sun, Huaxiong Wang,
Bying-He Ku & Josef Pieprzyk, Decomposition
Construction for Secret Sharing Schemes with Graph Access Structures in
Polynomial Time, SIAM J. on Discrete Math,
Vol. 24, No. 2 (2010), pp. 617 - 638. 31.
Yvo Desmedt, Niels Duif, Henk van Tilborg & Huaxiong Wang, Bounds and constructions for
key distribution schemes, Advances in
Mathematics of Communications, Vol. 3, No. 3(2009), 273 - 293. 32.
Qingsong Ye, Huaxiong Wang, Josef Pieprzyk & Xian-Mo Zhang,
Unconditionally Secure Disjointness Tests for
Private Datasets, Int. J. Applied
Cryptography, Vol.1, No.3 (2009), 225 -235. 33.
Christophe Tartary, Sujing Zhou, Dongdai Lin,
Huaxiong Wang & Josef Pieprzyk, Analysis of Bilinear Pairing-based
Accumulator for Identity Escrowing, IET
Information Security, vol. 2, no. 4 (2008), 99 - 107. 34.
Guomin Yang, Duncan S. Wong,
Huaxiong Wang & Xiaotie Deng, Two-factor mutual
authentication based on smart cards and passwords, Journal of Computer and System Sciences, Vol. 74, No. 7 (2008), 1160
- 1172. 35.
Jin Yuan, Cunsheng Ding, Huaxiong Wang & Josef Pieprzyk,
Permutation polynomials of the form (x^p-x +\delta)^s
+ L(x), Finite Fields and Their
Applications, Vol. 14, No. 2 (2008), 482-493. 36.
Yan Wang, Duncan S Wong
& Huaxiong Wang, Employ A Mobile Agent for Making A Payment, Mobile Information Systems: An
International Journal, Vol. 4, No. 1 (2008), 51 - 68. 37.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk &
Huaxiong Wang, Security Analysis of Australian and E.U. E-passport
Implementation, Journal of Research
and Practice in Information Technology, Vol. 40, No. 3 (2008), 187 - 205. 38.
Huaxiong Wang & Duncan SWong, On Secret Reconstruction in Secret Sharing
Schemes, IEEE Trans. on Info. Theory,
Vol. 54, No. 1 (2008), 473 - 480. 39.
Christophe Tartary, Huaxiong
Wang & Josef Pieprzyk, A Coding Approach to the Multicast Stream Authentication
Problem, International Journal of
Information Security, Vol. 7 (2008), 265-283 40.
Ron Steinfeld, Josef
Pieprzyk & Huaxiong Wang, Lattice-Based Threshold-Changeability for
Standard Shamir Secret-Sharing Schemes, IEEE
Trans. on Info. Theory, Vol. 53, No. 7 (2007), 2542-2559. 41.
Christophe Tartary &
Huaxiong Wang, Efficient Multicast Stream Authentication for Fully
Adversarial Network Model, International
Journal of Security and Network (Special Issue on Cryptography in Networks),
Vol. 2, No.3/4(2007), 175 - 191. 42.
Henk van Tilborg, Josef Pieprzyk, Ron Steinfeld
& Huaxiong Wang, New constructions of anonymous membership broadcasting
schemes, Advances in Mathematics of
Communications, 1:1 (2007), 29 - 44. 43.
Reihaneh Safavi-Naini, Huaxiong Wang & Duncan S Wong, Resilient LKH:
Secure Multicast Key Distribution Schemes, International Journal of Foundations of Computer Science, 17:5
(2006), 1205-1221. 44.
Reihaneh Safavi-Naini & Huaxiong Wang, Secret Sharing Schemes with Partial
Broadcast Channels, Designs, Codes and
Cryptography, 41:1 (2006), 5 - 22. 45.
Saolung Long, Josef Pieprzyk, Huaxiong Wang & Duncan S. Wong, Generalised Cumulative Arrays in Secret Sharing, Designs, Codes and Cryptography, 40
(2006), 191 - 209. 46.
Ron Steinfeld, Josef
Pieprzyk & Huaxiong Wang, Lattice-Based Threshold-Changeability for
Standard CRT Secret-Sharing Schemes, Finite
Fields and Their Applications, 12:4 (2006), 653 - 680. 47.
Keith Martin, Reihaneh Safavi-Naini, Huaxiong Wang & Peter Wild,
Distributing the encryption and decryption of a block cipher, Designs, Codes and Cryptography, 36
(2005), 263-287. 48.
Huaxiong & Josef
Pieprzyk, Shared generation of pseudo-random functions, Journal of Complexity, 20 (2004), 458 - 472. 49.
Huaxiong Wang, Chaoping Xing
& Reihaneh Safavi-Naini, Linear Authentication
Codes: Bounds and Constructions, IEEE
Trans. on Info. Theory, Vol. 49, No. 4 (2003), 866-872. 50.
Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Shared
generation of authenticators, International
Journal of Computer Mathematics, Vol. 79, No. 12 (2002), 1285-1301. 51.
Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, Fail-stop signature
for long messages, Journal of
Information Science and Engineering, Vol. 17 (2001), 879-898. 52.
Reihaneh Safavi-Naini & Huaxiong Wang, Efficient Authentication for Group
Communication, Theoretical Computer
Science, Vol. 269, No. 1/2 (2001), 1-21. 53.
Huaxiong Wang & Chaoping
Xing, Explicit Constructions of Perfect Hash Families from Algebraic Curve
over Finite Fields, Journal of
Combinatorial Theory, Series A, Vol. 93 (2001), 112-124. 54.
Yvo Desmedt, Reihaneh Safavi-Naini, Lynn Batten, Chris Charnes & Josef Pieprzyk, Broadcast Antijamming Systems, Computer
Networks, Vol. 35, No. 2-3 (2001), 223-236. 55.
Chaoping Xing, Huaxiong Wang
& Kwok Yan Lam, Constructions of Authentication Codes from Algebraic
Curves over Finite Fields, IEEE Trans.
on Info. Theory, Vol. 46 (2000), 886-892. 56.
Keith M. Martin, Reihaneh Safavi-Naini & Huaxiong Wang Bounds and
Techniques for Efficient Redistribution of Secret Shares to New Access Structures,
The Computer Journal, Vol. 42,
No.8 (1999), 638-649. 57.
Keith M. Martin, Joesf Pieprzyk, Reihaneh
Safavi-Naini & Huaxiong Wang, Changing thresholds in the absence of
secure channels, Australian Computer
Journal, Vol. 31, No. 2 (1999), 34-43. 58.
Reihaneh Safavi-Naini & Huaxiong Wang, Multireceiver
Authentication Codes: Model, Bounds, Constructions and Extensions, Information and Computation, Vol.
151, No. 1/2 (1999), 148-172. 59.
Huaxiong Wang, On Syntactic
Nuclei of Rational Languages, Information
Processing Letters, Vol. 67, No. 5 (1998), 221-226. 60.
Huaxiong Wang, On Rational
Languages and Rational Series, Theoretical
Computer Science, Vol. 205, No. 1-2 (1998), 329-336. 61.
Huaxiong Wang On Characters
of Semirings, Houston
J. Math. Vol. 23, No. 3 (1997), 391-405. 62.
Jonathan Golan &
Huaxiong Wang On Embedding in Complete Semirings, Communications in Algebra, Vol. 24,
No. 9 (1996), 2945-2962. 63.
Huaxiong Wang Injective
Hulls of Semimodules over Additively-idempotent Semirings, Semigroup
Forum, Vol. 48 (1994), 377-379. 64.
C. S. Hoo
& Huaxiong Wang, Extensions of BCI, BCK and MV-algebras, Southeast Asian Bull. Math., Vol. 18
(1994), 47-53. 65.
Michihiro Takahashi, Injective Semimodules over
2-semirings, Kobe J. Math., Vol.
10 (1993), 57-70. 66.
Zhaomu Chen & Huaxiong Wang, Closed Ideals and Congruences
on BCI algebras, Kobe J. Math., Vol.
8 (1991), 1-9. 67.
Zhaomu Chen & Huaxiong Wang, On Simple BCI Algebras, Math. Japon.,
Vol. 36, No. 4 (1991), 627-633. 68.
Zhaomu Chen & Huaxiong Wang, On Ideals in BCI Algebras, Math. Japon.,
Vol. 36, No. 3 (1991), 497-501. 69.
Huaxiong Wang, Injective in
BCI Algebras, Math. Japon., Vol. 35, No. 4 (1990), 797-798. 70.
Huaxiong Wang & Michihiro Takahashi, On Epimorphisms
of Semimodules, Kobe J. Math., Vol. 6 (1989),
287-289. 71.
Zhaomu Chen & Huaxiong Wang, Some Universal Properties of BCI-Algebras, Kobe J. Math., Vol. 6, No. 1 (1989),
43-48. 72.
Huaxiong Wang, A Note on
Endomorphism Semirings of Semimodules,
Kobe J. Math., Vol. 5, No. 1 (1988),
155-160. Conference Papers 1.
Huaxiong Wang, Combinatorics in Information-Theoretic Cryptography
(invited talk), Asiacrypt 2017, to appear. 2.
Benoit Libert, San Ling,
Khoa Nguyen & Huaxiong Wang, Zero-Knowledge Arguments for Lattice- Based
PRFs and Applications to E-Cash, Asiacrypt 2017,
to appear. 3.
Benoit Libert, San Ling,
Fabrice Mouhartem, Khoa Nguyen, & Huaxiong Wang, Adaptive Oblivious Transfer
with Access Control from Lattice Assumptions, Asiacrypt, 2017, to appear 4.
Khoa Nguyen, Benjamin Hong
Meng Tan & Huaxiong Wang, Zero-Knowledge Password Policy Check from
Lattices, ISC 2017, to appear. 5.
San Ling, Khoa Nguyen,
Huaxiong Wang & Juanyang Zhang, Revocable
Predicate Encryption from Lattices , ProvSec 2017,
to appear. 6.
San Ling, Khoa Nguyen,
Huaxiong Wang & Yanhong Xu, Lattice-Based Group
Signatures: Achieving Full Dynamicity with Ease, ACNS 2017, Lecture Notes in Computer Science (10355), 293-312. 7.
Benoit Libert, San Ling,
Fabrice Mouhartem, Khoa Nguyen, & Huaxiong Wang, Signature Schemes with
Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions, Asiacrypt 2016, Lecture Notes in Computer
Science (10032) 373-403. 8.
Benoit Libert, San Ling,
Fabrice Mouhartem, Khoa Nguyen, &Huaxiong Wang, Zero-Knowledge Arguments for
Matrix-Vector Relations and Lattice-Based Group Encryption, Asiacrypt 2016, Lecture Notes in Computer
Science (10032) 101-131. 9.
Khoa Nguyen, Huaxiong Wang
& Juanyang Zhang Server-Aided Revocable
Identity-Based Encryption from Lattices, CANS
2016, Lecture Notes in Computer Science (10052), 107-123. 10.
Yi Deng, Juan A. Garay, San
Ling, Huaxiong Wang, & Moti Yung, On the Implausibility
of Constant-Round Public-Coin Zero-Knowledge Proofs, SCN 2016, Lecture Notes in Computer Science (9841)237-253. 11.
Zuling Chang, Martianus Frederic Ezerman, San Ling, & Huaxiong Wang. The
Cyclic Structure of LFSR with Arbitrary Characteristic Polynomial, Accepted Sequences and Their Applications (SETA),
2016. 12.
Changlu Lin, Fucai Luo, Huaxiong Wang & Yan Zhu, A Provable Data
Possession Scheme with Data Hierarchy in Cloud, Inscrypt 2015, Lecture Notes in Computer Science, 9589(2015), 301 - 321. 13.
Benoit Libert, San Ling,
Khoa Nguyen & Huaxiong Wang, Zero-Knowledge Arguments for Lattice-Based
Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without
Trapdoors, Eurocrypt 2016, Lecture Notes in Computer
Science 9666 (2016), 1- 31. 14.
Martianus Frederic Ezerman,
Hyung Tae Lee, San Ling, Khoa Nguyen & Huaxiong Wang, A Provably Secure
Group Signature Scheme from Code-Based Assumptions, ASIACRYPT 2015 Lecture Notes in Computer Science, 9425(2015),
260-285. 15.
San Ling, Khoa Nguyen &
Huaxiong Wang, Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based,
Public Key Cryptography 2015,
Lecture Notes in Computer Science 9020(2015), 427-449. 16.
Christoph Bsch, Andreas Peter, Bram Leenders,
Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel & Willem Jonker,
Distributed Searchable Symmetric Encryption, in Proceedings of the 12th
IEEE International Conference on
Privacy, Security and Trust (PST), pages 330-337. IEEE Computer Society,
Jul 2014. 17.
Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk & Huaxiong Wang, Low
Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, ASIACRYPT 2014, Lecture Notes in
Computer Science, 8873 (2014), 141-157 18.
Adeline Langlois, San Ling,
Khoa Nguyen & Huaxiong Wang: Lattice-Based Group Signature Scheme with
Verifier-Local Revocation. Public Key
Cryptography 2014, Lecture Notes in Computer Science, 8383 (2014),
345-361 19.
Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling & Huaxiong Wang, Fully secure
attribute-based systems with short ciphertexts/signatures
and threshold access structures, CT-RSA
2013, Lecture Notes in Computer Science, 7779 (2013), 50-67. 20.
San Ling, Khoa Nguyen,
Damien Stehle & Huaxiong Wang, Improved
Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications, Public Key Cryptography 2013, Lecture
Notes in Computer Science, (2013), 107-124, Springer. 21.
Hongjun Wu, Tao Huang,
Phuong Ha Nguyen, Huaxiong Wang & San Ling, Differential Attacks against
Stream Cipher ZUC, ASIACRYPT 2012,
Lecture Notes in Computer Science, 7658(2012), 262-277, Springer. 22.
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Khoa Nguyen,
Revocable identity-based encryption from lattices, In Proceedings of the 17th
Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in
Computer Science, 7372(2012), 390-403, Springer. 23.
Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Hoeteck Wee, Compact IBE and signatures via asymmetric
pairings, In: Pairings 2012,
Lecture Notes in Computer Science, 7708(2012), 122-140,Springer. 24.
Ron Steinfeld, San Ling,
Josef Pieprzyk, Christophe Tartary & Huaxiong Wang, NTRUCCA: How to Strengthen
NTRUEncrypt to Chosen-Ciphertext
Security in the Standard Model, PKC
2012, Lecture Notes in Computer Science, 7293(2012), 353-371, Springer. 25.
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San
Ling, Josef Pieprzyk & Huaxiong Wang, On the (In)Security of IDEA in
Various Hashing Modes, FSE 2012,
Lecture Notes in Computer Science, 7549 (2012), 163-179, Springer. 26.
Zhao Hui Tang, Hoon Wei Lim & Huaxiong Wang, Revisiting a Secret
Sharing Approach to Network Codes, ProvSec 2012,
Lecture Notes in Computer Science, 7496(2012), 300-317, Springer. 27.
Phuong Ha Nguyen, Matthew J.
B. Robshaw & Huaxiong Wang, On Related-Key Attacks and KASUMI: The Case
of A5/3, INDOCRYPT 2011, Lecture
Notes in Computer Science, 7107(2011), 146-159, Springer. 28.
Yeow Meng Chee, Huaxiong
Wang & Liangfeng Zhang, Oblivious Transfer and
n-Variate Linear Function Evaluation, Cocoon'2011,
17th Annual International Computing and Combinatorics
Conference, Lecture Notes in Computer Science, 6842 (2011), 627 - 637,
Springer. 29.
Lei Wei, Christian Rechberger, Jian Guo, Honjun
Wu, Huaxiong Wang & San Ling, Improved Meet-in-the-Middle Cryptanalysis
of KTANTAN (Poster) , 16th Australasian Conference on Information Security
and Privacy, ACISP 2011, Lecture
Notes in Computer Science, 6812 (2011), 433 - 438, Springer. 30.
Yun Zhang, Christophe
Tartary & Huaxiong Wang, Efficient Rational Secret Sharing Scheme Based
on the Chinese Remainder Theorem, 16th Australasian Conference on Information
Security and Privacy, ACISP 2011,
Lecture Notes in Computer Science, 6812 (2011), 259 - 275, Springer. 31.
Phuong Ha Nguyen, Hongjun Wu
& Huaxiong Wang, Improving the Time Complexity of the Algorithm 2 of the
Multidimensional Linear Cryptanalysis, 16th Australasian Conference on
Information Security and Privacy, ACISP
2011, Lecture Notes in Computer Science, Vo. 6812 (2011), 61 - 74,
Springer. 32.
Amir Moradi,
Axel Poschmann, San Ling, Christof
Paar & Huaxiong Wang, Pushing the Limits: A Very
Compact and a Threshold Implementation of AES, Eurocrypt 2011, Lecture Notes in Computer Science, Vol. 6632 (2011), 69 -
88, Springer. 33.
Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik
How Tan & Huaxiong Wang, Authenticated Key Exchange under Bad Randomness,
Financial Cryptography and Data
Security 2011, Lecture Notes in Computer Science, Springer. 34.
Jian Guo, San Ling,
Christian Rechberger & Huaxiong Wang, Advanced
Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and
Improved Results on MD4 and SHA-2, Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in
Computer Science, vol. 6477 (2010), 56 - 75, Springer. 35.
Hassan Jammel
Asghar, Shujun Li, Josef
Pieprzyk & Huaxiong Wang, Cryptanalysis of the Convex Hull Click Human
Identification Protocol, 13th Information Security Conference (ISC 2010), Lecture Notes in Computer
Science, vol. 6531 (2011), 24 - 30, Springer. 36.
Axel Poschmann,
Huaxiong Wang & San Ling, 256 bit Standardized Crypto for 650 GE – GOST Revisite, Workshop on Cryptographic Hardware and Embedded
Systems (CHES 2010), Lecture Notes
in Computer Science Vol. 6225 (2010), 219 - 233, Springer. 37.
Hassan Jameel
Asghar, Josef Pieprzyk and Huaxiong Wang, A New
Human Identification Protocol and Coppersmith's Baby-Step Giant-Step
Algorithm, 8th International Conference on Applied Cryptography and Network
Security (ACNS '10), Lecture Notes
in Computer Science, 6123 (2010), 349 - 366, Springer. 38.
Phuong Ha Nguyen, Lei Wei,
Huaxiong Wang and San Ling, On Multidimensional Linear Cryptanalysis, 15th
Australasian Conference on Information Security and Privacy (ACISP 2010), Lecture Notes in
Computer Science, 6168(2010), 37 - 52, Springer. 39.
Shaoquan Jiang &
Huaxiong Wang, Plaintext-Awareness of Hybrid Encryption, CT-RSA 2010, Lecture Notes in Computer Science, 5985 (2010),
57-72, Springer. 40.
Qingsong Ye, Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, Efficient
Fuzzy Matching and Intersection on Private Datasets, International Conference
on Information Security and Cryptology (ICISC
'09), Lecture Notes in Computer Science, vol. 5984 (2010), 211 - 228,
Springer. 41.
Hao Chen, San Ling, Carles Padro,
Huaxiong Wang & Chaoping Xing, Key Predistribution
Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry
Codes, Cryptography and Coding, Twelfth IMA International Conference on
Cryptography and Coding (IMACC '09),
Lecture Notes in Computer Science, 5921(2009), 263-277, Springer. 42.
Jian Guo, Krystian Matusiewicz, Lars R.
Knudsen, San Ling and Huaxiong Wang, Practical Pseudo- Collisions for Hash
Functions ARIRANG-224/384, Proc SAC 2009, Lecture Notes in Computer
Science, Vol.5867, pp. 141-156, Springer. 43.
Alex Biryukov,
Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian
Matusiewicz, Ivica Nikolic, Josef Pieprzyk, &
Huaxiong Wang, Cryptanalysis of the LAKE Hash Family, In proceedings of FSE 2009, Lecture Notes in Computer
Science, 5665 (2009), 156-179, Springer. 44.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk &
Huaxiong Wang, Certified pseudonyms colligated with master secret key, In
proceedings of International Conference on Security and Cryptography (SECRYPT 2009),pp. 190 - 197, Milan,
Italy, July 2009. (Best Student Paper
Award) 45.
Shujun Li, Hassan Jameel, Josef Pieprzyk,
Ahmad-Reza Sadeghi, Roland Schmitz & Huaxiong
Wang, On the Security of PAS (Predicate-based Authentication Service), 25th
Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, December 7-11, 2009, Honolulu, Hawaii,
USA. 46.
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling & Huaxiong Wang,
Strongly multiplicative and 3-multiplicative linear secret sharing schemes,
Advances in Cryptology - Asiacrypt 2008,
Lecture Notes in Computer Science, 5350 (2008), 19- 36, Springer. 47.
Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Keyword Field-Free Conjunctive
Keyword Searches on Encrypted Data and Extension for Dynamic Groups, CANS2008, Lecture Notes in Computer Science,
5339 (2008), 178-195, Springer-Verlag. 48.
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo & Huaxiong Wang,
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant
Bits, In proceedings of CANS2008,
Lecture Notes in Computer Science, 5339 (2008), 49-63, Springer-Verlag. 49.
Yi Lu, HuaxiongWang
& San Ling, Cryptanalysis of Rabbit, 11th International Conference on
Information Security, ISC 2008,
Lecture Notes in Computer Science, 5222 (2008), 204 - 214, Springer-Verlag. 50.
Qingsong Ye, Huaxiong Wang, Josef Pieprzyk & Xian-mo
Zhang, Efficient Disjointness Tests for Private
Database, 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Lecture Notes in Computer
Science, 5107(2008), 155 - 169, Springer-Verlag. 51.
Hung-Min Sun, Mu-En Wu, Huaxiong Wang & Jian Guo, On the Improvement
of the BDF Attack on LSBS-RSA, 13th Australasian Conference on Information
Security and Privacy, ACISP 2008,
Lecture Notes in Computer Science, 5107(2008), 84 - 97, Springer-Verlag. 52.
Jin Yuan, Qingsong Ye, Huaxiong Wang & Josef Pieprzyk, Secure
Computation of the Vector Dominance Problem, Information Security Practice
and Experience (ISPEC 2008),
Lecture Notes in Computer Science, 4991(2008), 319 - 333, Springer-Verlag. 53.
Qingsong Ye, Huaxiong Wang & Pieprzyk J, Distributed Private Matching and
Set Operations, Information Security Practice and Experience (ISPEC 2008), Lecture Notes in
Computer Science, 4991(2008), 347 - 360, Springer-Verlag. 54.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk &
Huaxiong Wang, An On-Line Secure E-passport Protocol, Information Security
Practice and Experience (ISPEC 2008),
Lecture Notes in Computer Science, 4991(2008),14 - 28, Springer-Verlag. 55.
Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling &
Huaxiong Wang, Cryptanalysis of LASH, Fast Software Encryption Lecture Notes
in Computer Science, 5086( FSE 2008),
207 - 223, Springer-Verlag. 56.
Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Threshold Privacy
Preserving Keyword Searches, Theory and Practice of Computer Science (SOFSEM 2008), Lecture Notes in
Computer Science, 4910(2008), 646 - 658, Springer-Verlag. 57.
Peishun Wang, Josef Pieprzyk & Huaxiong Wang, A New Dynamic Accumulator
for Batch Updates, Ninth International Conference on Information and
Communications Security (ICICS 2007),
Lecture Notes in Computer Science, 4861(2008), 98 - 112, Springer-Verlag. 58.
Josef Pieprzyk, Huaxiong
Wang & Xianmo Zhang, Mobius commutative
functions and partially coincident functions, Fourth International Workshop
on Boolean Functions: Cryptography, Applications and Boolean aspects of
Automata Theory, BFCA 2008.
Proceedings (online http://www.liafa.jussieu.fr/bfca/bfca08),
pp. 135 - 150. 59.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk &
Huaxiong Wang, A Fair E-Tendering Protocol, In proceedings of International
Conference on Security and Cryptography (SECRYPT
2008), Porto, Portugal, July 2008, INSTICC Press, ISBN:
978-989-8111-59-3. 60.
Qingsong Ye, Huaxiong. Wang & Christophe Tartary, Privacy-Preserving
Distributed Set Intersection, Proceedings of the 2nd International Workshop
on Advances in Information Security (WAIS
2008), the Proceedings of the 3rd International Conference on
Availability, Security and Reliability (ARES 2008), 1332 - 1339. IEEE
Computer Society. 61.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk &
Huaxiong Wang, Formal Security Analysis of Australian E-passport
Implementation, Proceedings of Australasian Information Security Conference (AISC2008), Wollongong, Australia, Jan
2008, Conferences in Research and Practice in Information Technology (CRIPT),
Vol 81. 62.
Christophe Tartary, Huaxiong
Wang & Josef Pieprzyk, Verifiable Multi-Secret Sharing Schemes for Multiple
Threshold Access Structures, Inscrypt 2007.
Lecture Notes in Computer Science, Springer-Verlag. 63.
Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Common Secure Index for
Conjunctive Keyword-Based Retrieval over Encrypted Data, Lecture Notes in
Computer Science, 4721, Secure Data
Management 2007, 108-123, Springer-Verlag. 64.
Christophe Tartary, Huaxiong
Wang & Josef Pieprzyk, An Hybrid Approach for Efficient Multicast Stream
Authentication over Unsecured Channels, International Conference on Provable
Security ProvSec 2007, Lecture Notes in Computer
Science, 4784(2007), 17 - 34, Springer-Verlag. 65.
Yvo Desmedt, Jose Pieprzyk,
Ron Steinfeld & Huaxiong Wang, On Secure Multi-Party Computation in Black
Box Groups, Crypto 2007, Lecture
Notes in Computer Science, Vol. 4622 (2007), 591- 612, Springer-Verlag. 66.
Christophe Tartary &
Huaxiong Wang, Combining Prediction Hashing and MDS Codes for Efficient Multicast
Stream Authentication, 12th Australasian Conference on Information Security
and Privacy, ACISP 2007, Lecture
Notes in Computer Science, 4586(2007), 293 - 307, Springer-Verlag. 67.
Ron Steinfeld, Josef
Pieprzyk & Huaxiong Wang, How to Strengthen any Weakly Unforgeable
Signature into a Strongly Unforgeable Signature, CT-RSA 2007, Lecture Notes in Computer Science, 4377(2007), 357 -
371, Springer-Verlag. 68.
Guomin Yang, Duncan S. Wong,
Huaxiong Wang & Xiaotie Deng, Formal Analysis
and Systematic Construction of Two-Factor Authentication Scheme, 8th
International Conference on Information and Communications Security (ICICS 2006), Lecture Notes in
Computer Science, 4307(2006), 82 - 91, Springer-Verlag. 69.
Christophe Tartary &
Huaxiong Wang, Achieving Multicast Stream Authentication using MDS Codes, 5th
International Conference on Cryptology and Network Security (CANS 2006), Lecture Notes in Computer
Science, 4301(2006), 108 - 125, Springer-Verlag. 70.
Christophe Tartary &
Huaxiong Wang, Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing
Scheme, 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006), Lecture Notes in
Computer Science, 4318(2006), 103 - 117, Springer-Verlag. 71.
Ron Steinfeld, Josef
Pieprzyk & Huaxiong Wang, On the Provable Security of an Efficient
RSA-Based Pseudorandom Generator, Advances in Cryptology - ASIACRYPT 2006, Lecture Notes in
Computer Science, 4284(2006), 194 - 209, Springer-Verlag. 72.
Christophe Tartary &
Huaxiong Wang, Rateless Codes for the Multicast
Stream Authentication Problem, The 1st International Workshop on Security (IWSEC 2006), Lecture Notes in
Computer Science, 3786(2006), 108 - 125, Springer-Verlag. 73.
Yvo Desmedt, Josef Pieprzyk,
Ron Steinfeld & Huaxiong Wang, A Non-Malleable Group Key Exchange Protocol
Robust Against Active Insiders, ISC 2006,
Lecture Notes in Computer Science, 4176(2006), 459-475, Springer-Verlag. 74.
Guomin Yang, Duncan S. Wong,
Huaxiong Wang & Xiaotie Deng, Anonymous
Signature Schemes. International Workshop on Practice and Theory in Public
Key Cryptography (PKC 2006).
Lecture Notes in Computer Science, Vol. 3958, 2006, 347 - 343, Springer-Verlag. 75.
Ron Steinfeld, Josef
Pieprzyk & Huaxiong Wang, Higher Order Universal One-Way Hash Functions from
the Subset Sum Assumption. International Workshop on Practice and Theory in
Public Key Cryptography (PKC 2006).
Lecture Notes in Computer Science, Vol. 3958, 2006, 157 - 173, Springer-Verlag. 76.
Gaurav Gupta, Josef Pieprzyk
& Huaxiong Wang, An attack-localizing watermarking scheme for natural language
documents. Proceedings of the ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2006)
ACM Press, 2006, 157 - 165. 77.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong
Wang & Joo Yeon Cho,
Formal Analysis of Card-based Payment Systems in Mobile devices. The
Australasian Information Security Workshop - Network Security, Hobart,
Tasmania, January 16-19, 2006, Conferences in Research and Practice in Information
Technology (CRIPT 2006),
Australian Computers Society Inc., Vol 54, pp. 213-220. 78.
Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung & Huaxiong Wang, Secure
Construction of Virtual Organizations in Grid Computing Systems, Proceedings
of Internet and Network Economics, First International Workshop, WINE 2005, Lecture Notes in Computer
Science 3828, 2005, 959-968, Springer-Verlag. 79.
Christophe Tartary &
Huaxiong Wang, Efficient Multicast Stream Authentication for the Fully
Adversarial Network Model, The 6th International Workshop on Information
Security Applications (WISA 2005),
Lecture Notes in Computer Science, Vol. 3786, 2005, 108 - 125, Springer-Verlag. 80.
Yvo Desmedt, Yongge Wang, Reihaneh
Safavi-Naini & Huaxiong Wang, Radio Networks with Reliable Communication. Cocoon 2005, 11th Annual
International Computing and Combinatorics
Conference, Lecture Notes in Computer Science, Vol. 3595, 2005, 156 - 166,
Springer-Verlag. 81.
Ron Steinfeld, Scott Contini, HuaxiongWang &
Josef Pieprzyk, Converse Results to the Wiener Attack on RSA, International
Workshop on Practice and Theory in Public Key Cryptography (PKC 2005). Lecture Notes in Computer
Science, Vol. 3386, 2005, 184 - 198, Springer-Verlag. 82.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, HuaxiongWang, Privacy Enhanced Electronic Cheque System. 7th IEEE
International Conference on E-Commerce Technology, IEEE Computer Science,
2005, 431-434. 83.
Hartono Kurnio,
Huaxiong Wang, Josef Pieprzyk & Kris Gaj,
Securing Multicast Groups in Ad Hoc Networks, Advanced Workshop on Content
Computing (AWCC 2004), Zhenjiang,
China, 2004. Lecture Notes in Computer Science, Vol. 3309, 2004, 194 - 207,
Springer-Verlag. 84.
Ron Steinfeld, Huaxiong Wang
& Josef Pieprzyk, Lattice-Based Threshold-Changeability for Standard Shamir
Secret-Sharing Schemes. 10th International Conference on the Theory and
Application of Cryptology and Information Security, Asiacrypt 2004. Lecture Notes in Computer Science, Vol. 3329, 2004, 170 -
186, Springer-Verlag. 85.
Ron Steinfeld, HuaxiongWang, Josef Pieprzyk, Efficient extension of
standard Schnorr/RSA signature into universal
designated-verifier. International Workshop on Practice and Theory in Public
Key Cryptography (PKC 2004).
Lecture Notes in Computer Science, Vol. 2942, 2004, 86 - 100, Springer-Verlag. 86.
Josef Pieprzyk &
Huaxiong Wang, Malleability Attacks on Multi-party Key Agreement Protocols,
Coding, Cryptography and Combinatorics (CCC 2003), Birkhauser,
Basel, 2004, 277 - 288. 87.
Josef Pieprzyk, Huaxiong
Wang & Chaoping Xing, Multiple-Time Signature Schemes Secure against Adaptive
Chosen Message Attacks, 10th Workshop on Selected Areas in Cryptography (SAC 2003). Lecture Notes in Computer
Science, Vol. 3006, 2004, 88 - 100, Springer-Verlag. 88.
Huaxiong Wang & Josef
Pieprzyk, Efficient one-time proxy signatures, 9th International Conference on
the Theory and Application of Cryptology and Information Security, Asiacrypt 2003. Lecture Notes in Computer
Science, Vol 2894, 2003, 507 - 522, Springer-Verlag. 89.
Ron Steinfeld, Laurence
Bull, Huaxiong Wang & Josef Pieprzyk, Universal designated-verifier
signatures, 9th International Conference on the Theory and Application of
Cryptology and Information Security, Asiacrypt 2003.
Lecture Notes in Computer Science, Vol 2894, 2003, 523 - 542, Springer-Verlag. 90.
Huaxiong Wang & Josef
Pieprzyk, Shared generation of pseudo-random function with cumulative maps, CT-RSA 2003. Lecture Notes in
Computer Science Vol. 2612, 2003, 281-294, Springer-Verlag. 91.
Keith M. Martin, Josef
Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang
& Peter R. Wild, Threshold MACs, The 5th international conference on
information security and cryptology, ICISC
2002. Lecture Notes in Computer Science, Vol. 2587, 2003, 237-252,
Springer-Verlag. 92.
Hartono Kurnio,
Luke McAven, Reihaneh
Safavi-Naini & Huaxiong Wang, A Dynamic Group Key Distribution Scheme
with Flexible User Join. The 5th international conference on information
security and cryptology, ICISC 2002.
Lecture Notes in Computer Science, Vol. 2587, 2003, 478-496, 2003, Springer-Verlag. 93.
Reihaneh Safavi-Naini & Huaxiong Wang, Resilient LKH: secure multicast key
distribution schemes (invited), Proceedings in 2003 International Workshop of
Advanced Developments in Software and Systems Security (WADIS 2003), 2003, 44-50. 94.
Hartono Kurnio,
Reihaneh Safavi-Naini & Huaxiong Wang, A group
key distribution scheme with decentralised user
join. Third Conference on Security in Communication Networks, SCN 2002, September 12-13, 2002
Amalfi Italy. Lecture Notes in Computer Science, Vol. 2576, 2003, 146-163,
Springer-Verlag. 95.
Huaxiong Wang & Josef
Pieprzyk, A Combinatorial Approach to Anonymous Membership Broadcast, Cocoon 2002, 8th Annual International
Computing and Combinatorics Conference, Lecture
Notes in Computer Science, Vol. 2387, 2002, 162 - 170, Springer-Verlag. 96.
Hartono Kurnio,
Reihaneh Safavi-Naini & Huaxiong Wang, A Secure
Re-keying Scheme with Key Recovery Property, 7th Australasian Conference on
Information Security and Privacy, ACISP
2002, Lecture Notes in Computer Science, Vol. 2384, 2002, 40 - 55,
Springer-Verlag. 97.
Yvo Desmedt, Reihaneh Safavi-Naini & Huaxiong Wang, Redistribution
of a mechanical secret's shares, Financial
Cryptography 2002, Lecture Notes in Computer Science, Vol. 2357, 2002,
238-252, Springer-Verlag. 98.
Hartono Kurnio, Reihaneh Safavi-Naini & Huaxiong Wang, Efficient
Revocation Schemes for Secure Multicast, International Conference on Information
Security and Cryptology – ICISC 2001,
Lecture Notes in Computer Science, Vol. 2288, 2002, 160-177, Springer-Verlag. 99.
Beomsik Song, Huaxiong Wang & Jennifer Seberry,
A new cryptanalysis method using the distribution characteristics of
substitution distance, International Conference on Information Security and Cryptology,
ICISC 2001, Lecture Notes in
Computer Science, Vol. 2288, 2002, 18-31, Springer-Verlag. 100.
Reihaneh Safavi-Naini, Huaxiong Wang & Chaoping Xing, Linear
Authentication Codes: Bounds and Constructions, Indocrypt 2001, Lecture Notes in Computer Science, Vol. 2247, 2001, 127-35. 101.
Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, How to construct fail-stop
confirmer signature schemes, 6th Australasian Conference on Information
Security and Privacy, ACISP 2001,
Lecture Notes in Computer Science, 2119(2001), 435-444, Springer-Verlag. 102.
Reihaneh Safavi-Naini & Huaxiong Wang, Robust Secret Sharing Schemes over
Abelian Group Z_m, Cryptography and Combinatorial
Number Theory (CCNT 1999),
Progress in Computer Science and Applied Logic, Vol. 20, Bikhauser,
2001, 244-257. 103.
Yvo Desmedt, Mike Burmester,
Reihaneh Safavi-Naini & Huaxiong Wang,
Threshold Things That Thinks (T4): security requirements to cope with theft
of handheld/handless internet devices, The
Symposium on Requirements Engineering for Information Security, West
Lafayette, Indiana, USA, 2001. 104.
Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, Fail-Stop Signature
for long messages, Indocrypt 2000, Lecture Notes in Computer
Science, 1977(2000), 165-177, Springer-Verlag. 105.
Hartono Kurnio,
Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang,
Key Management for Secure Multicast with Dynamic Controllers, Fifth
Australasian Conference on Information Security and Privacy, ACISP 2000, Lecture Notes in Computer
Science 1841 (2000) 178{190, Springer-Verlag. 106.
Huaxiong Wang, Kwok-Yan Lam,
Guozhen Xiao & Huanhui
Zhao, On Multiplicative Secret Sharing Schemes, Fifth Australasian Conference
on Information Security and Privacy, ACISP
2000, Lecture Notes in Computer Science 1841 (2000) 241- 251, Springer-Verlag. 107.
Reihaneh Safavi-Naini & Huaxiong Wang, New Constructions of secure
multicast re-keying schemes using perfect hash families, 7th ACM Conference
on Computer and Communication Security, ACM
CCS 2000, ACM Press, 2000, 228-234. 108.
Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Shared
generation of authenticators, Proceedings of the Eleventh Australasian
Workshop on Combinatorial Algorithms, AWOCA
2000, 93 - 110. 109.
Reihaneh Safavi-Naini & Huaxiong Wang, Broadcast authentication in group
communication, ASIACRYPT 1999,
Lecture Notes in Computer Science, Vol. 1716, 1999, 399-41, Springer-Verlag. 110.
Keith M. Martin, Josef
Pieprzyk, Reihaneh Safavi-Naini & Huaxiong
Wang, Changing thresholds in the absence of secure channels, Proceedings of
Information Security and Privacy Conference, ACISP 1999 Lecture Notes in Computer Science, Vol. 1578, Spring-Verlag, 177-191, 1999, Springer-Verlag. 111.
Reihaneh Safavi-Naini, Huaxiong Wang & Kwok-Yan Lam, A new approach to
robust threshold RSA signature Proceedings of Information Security and
Cryptology- ICISC 1999, Lecture
Notes in Computer Science, 1787(2000), 184-196, Springer-Verlag. 112.
Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Chris Charnes & Josef Pieprzyk: Broadcast Anti-jamming
Systems, ICON 1999, IEEE International Conference on
Networks, IEEE Computer Society, 1999, 349-355. 113.
Reihaneh Safavi-Naini & Huaxiong Wang, New Results on Multireceiver
Authentication Codes, In Advances in Cryptology - EUROCRYPT 1998, Lecture
Notes in Computer Science 1403, 527-541, 1998, Springer-Verlag. 114.
Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Multireceiver Authentication Codes, In Advances in
Cryptology - ASIACRYPT 1998,
Lecture Notes in Comp. Sci. 1514(1998), 242-256, Springer-Verlag. 115.
Hossein Ghodosi,
Josef Pieprzyk, Reihaneh Safavi-Naini &
Huaxiong Wang, On Construction of Cumulative Secret Sharing Schemes, In
Proceedings of ACISP 1998
(Australian Conference on Information Security and Privacy), Lecture Notes in
Computer Science, 1438, 378-390, 1998, Springer-Verlag. |
||
|