Houzhen Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs.
IEEE Trans. Veh. Technol., January, 2024

2023
ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments.
IEEE Internet Things J., October, 2023

Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions.
Proceedings of the Provable and Practical Security, 2023

2022
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022

2020
A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion.
Inf., 2020

2019
Quantum protocols for secure multi-party summation.
Quantum Inf. Process., 2019

Entanglement-based quantum private comparison protocol with bit-flipping.
CoRR, 2019

Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States.
IEEE Access, 2019

2018
Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

2017
Cryptanalysis of a lattice based key exchange protocol.
Sci. China Inf. Sci., 2017

2016
Multi-bit LWE-based encryption scheme without decryption errors.
Int. J. Embed. Syst., 2016

Key recovery on several matrix public-key encryption schemes.
IET Inf. Secur., 2016

Cryptanalysis of an MOR cryptosystem based on a finite associative algebra.
Sci. China Inf. Sci., 2016

Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem.
Sci. China Inf. Sci., 2016

2015
Polynomial-time quantum algorithms for finding the linear structures of Boolean function.
Quantum Inf. Process., 2015

Quantum algorithm to find invariant linear structure of <i>MD</i> hash functions.
Quantum Inf. Process., 2015

A public key cryptosystem based on data complexity under quantum environment.
Sci. China Inf. Sci., 2015

2014
EPPI: An E-cent-based privacy-preserving incentive mechanism for participatory sensing systems.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2011
Extended multivariate public key cryptosystems with secure encryption function.
Sci. China Inf. Sci., 2011

2010
Hash-based Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2010

Design theory and method of multivariate hash function.
Sci. China Inf. Sci., 2010

A new perturbation algorithm and enhancing security of SFLASH signature scheme.
Sci. China Inf. Sci., 2010


  Loading...