Cryptographers' World
 

Huaxiong Wang


Author's Web Page Link

24 papers in database with 461 citations Star

H-number: 12

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Reihaneh Safavi-Naini,  Huaxiong Wang,  Secret sharing schemes with partial broadcast channels, Designs, Codes and Cryptography, Volume 41(1), pp. 5 - 22, Springer, 2006.

[Electronic Edition][No citation]

2. Shoulun Long,  Josef Pieprzyk,  Huaxiong Wang,  Duncan S. Wong,  Generalised Cumulative Arrays in Secret Sharing, Designs, Codes and Cryptography, Volume 40(2), pp. 191 - 209, Springer, 2006.

[Electronic Edition][Cited 2 times ]

3. Keith M. Martin,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Peter R. Wild,  Distributing the Encryption and Decryption of a Block Cipher, Designs, Codes and Cryptography, Volume 36(3), pp. 263 - 287, Springer, 2005.

[Electronic Edition][Cited 12 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Alex Biryukov,  Praveen Gauravaram,  Jian Guo,  Dmitry Khovratovich,  San Ling,  Krystian Matusiewicz,  Ivica Nikolic,  Josef Pieprzyk,  Huaxiong Wang,  Cryptanalysis of the LAKE Hash Family, pp. 156 - 179, FSE 2009.

[Electronic Edition][Cited 1 times ]

2. Zhifang Zhang,  Mulan Liu,  Yeow Meng Chee,  San Ling,  Huaxiong Wang,  Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes, pp. 19 - 36, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

3. Ron Steinfeld,  Scott Contini,  Krystian Matusiewicz,  Josef Pieprzyk,  Jian Guo,  San Ling,  Huaxiong Wang,  Cryptanalysis of LASH, pp. 207 - 223, FSE 2008.

[Electronic Edition][Cited 5 times ]

4. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature, pp. 357 - 371, CT-RSA 2007.

[Electronic Edition][Cited 18 times ]

5. Yvo Desmedt,  Josef Pieprzyk,  Ron Steinfeld,  Huaxiong Wang,  On Secure Multi-party Computation in Black-Box Groups, pp. 591 - 612, CRYPTO 2007.

[Electronic Edition][Cited 4 times ]

6. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption, pp. 157 - 173, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

7. Guomin Yang,  Duncan S. Wong,  Xiaotie Deng,  Huaxiong Wang,  Anonymous Signature Schemes, pp. 347 - 363, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

8. Ron Steinfeld,  Josef Pieprzyk,  Huaxiong Wang,  On the Provable Security of an Efficient RSA-Based Pseudorandom Generator, pp. 194 - 209, ASIACRYPT 2006.

[Electronic Edition][Cited 16 times ]

9. Ron Steinfeld,  Scott Contini,  Huaxiong Wang,  Josef Pieprzyk,  Converse Results to the Wiener Attack on RSA, pp. 184 - 198, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

10. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes, pp. 170 - 186, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

11. Ron Steinfeld,  Huaxiong Wang,  Josef Pieprzyk,  Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures, pp. 86 - 100, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 70 times Red Star]

12. Huaxiong Wang,  Josef Pieprzyk,  Efficient One-Time Proxy Signatures, pp. 507 - 522, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

13. Ron Steinfeld,  Laurence Bull,  Huaxiong Wang,  Josef Pieprzyk,  Universal Designated-Verifier Signatures, pp. 523 - 542, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 140 times Red StarRed Star]

14. Josef Pieprzyk,  Huaxiong Wang,  Chaoping Xing,  Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks, pp. 88 - 100, SAC 2003.

[Electronic Edition][Cited 17 times ]

15. Huaxiong Wang,  Josef Pieprzyk,  Shared Generation of Pseudo-Random Functions with Cumulative Maps, pp. 281 - 294, CT-RSA 2003.

[Electronic Edition][Cited 2 times ]

16. Yvo Desmedt,  Reihaneh Safavi-Naini,  Huaxiong Wang,  Redistribution of Mechanical Secret Shares, pp. 238 - 252, FC 2002.

[Electronic Edition][Cited 2 times ]

17. Reihaneh Safavi-Naini,  Huaxiong Wang,  Chaoping Xing,  Linear Authentication Codes: Bounds and Constructions, pp. 127 - 135, INDOCRYPT 2001.

[Electronic Edition][Cited 18 times ]

18. Reihaneh Safavi-Naini,  Willy Susilo,  Huaxiong Wang,  Fail-Stop Signature for Long Messages, pp. 165 - 177, INDOCRYPT 2000.

[Electronic Edition][Cited 4 times ]

19. Reihaneh Safavi-Naini,  Huaxiong Wang,  Broadcast Authentication in Group Communication, pp. 399 - 411, ASIACRYPT 1999.

[Electronic Edition][Cited 18 times ]

20. Reihaneh Safavi-Naini,  Huaxiong Wang,  Bounds and Constructions for Multireceiver Authentication Codes, pp. 242 - 256, ASIACRYPT 1998.

[Electronic Edition][Cited 4 times ]

21. Reihaneh Safavi-Naini,  Huaxiong Wang,  New Results on Multi-Receiver Authentication Codes, pp. 527 - 541, EUROCRYPT 1998.

[Electronic Edition][Cited 46 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...