Huaxiong Wang

According to our database1, Huaxiong Wang authored at least 212 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease.
Theor. Comput. Sci., 2019

Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

Simplified Revocable Hierarchical Identity-Based Encryption from Lattices.
IACR Cryptology ePrint Archive, 2019

Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields.
IACR Cryptology ePrint Archive, 2019

New Code-Based Privacy-Preserving Cryptographic Constructions.
IACR Cryptology ePrint Archive, 2019

Double verification protocol via secret sharing for low-cost RFID tags.
Future Generation Comp. Syst., 2019

On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials.
Des. Codes Cryptogr., 2019

Further improvement of factoring N = pr qs with partial known bits.
Adv. in Math. of Comm., 2019

Forward-Secure Group Signatures from Lattices.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Zero-Knowledge Elementary Databases with More Expressive Queries.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Secret Sharing with Binary Shares.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Accountable Tracing Signatures from Lattices.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
On the Efficiency of FHE-Based Private Queries.
IEEE Trans. Dependable Sec. Comput., 2018

A lattice-based group signature scheme with verifier-local revocation.
Theor. Comput. Sci., 2018

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptology ePrint Archive, 2018

The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields.
Cryptography and Communications, 2018

Construction of de Bruijn sequences from product of two irreducible polynomials.
Cryptography and Communications, 2018

Constant-Size Group Signatures from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

Revocable Predicate Encryption from Lattices.
Proceedings of the Provable Security, 2017

Zero-Knowledge Password Policy Check from Lattices.
Proceedings of the Information Security - 20th International Conference, 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Analysis of Gong et al.'s CCA2-secure homomorphic encryption.
Theor. Comput. Sci., 2016

Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016

Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2016

Public Key Encryption with Equality Test in the Standard Model.
IACR Cryptology ePrint Archive, 2016

Better Security for Queries on Encrypted Databases.
IACR Cryptology ePrint Archive, 2016

Policy-based signature scheme from lattices.
Des. Codes Cryptogr., 2016

CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016

On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Server-Aided Revocable Identity-Based Encryption from Lattices.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

On the Efficiency of FHE-based Private Queries.
IACR Cryptology ePrint Archive, 2015

Special issue on trust and security in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

A Provable Data Possession Scheme with Data Hierarchy in Cloud.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A Provably Secure Group Signature Scheme from Code-Based Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function.
Math. Comput., 2014

Shorter identity-based encryption via asymmetric pairings.
Des. Codes Cryptogr., 2014

The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014

Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptography and Communications, 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Efficient Two-Server Password-Only Authenticated Key Exchange.
IEEE Trans. Parallel Distrib. Syst., 2013

Upper Bounds on Matching Families in BBZpqn.
IEEE Trans. Information Theory, 2013

The Resistance of PRESENT-80 Against Related-Key Differential Attacks.
IACR Cryptology ePrint Archive, 2013

Cheating-immune secret sharing schemes from codes and cumulative arrays.
Cryptography and Communications, 2013

Query-Efficient Locally Decodable Codes of Subexponential Length.
Computational Complexity, 2013

Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Revocable IBE Systems with Almost Constant-Size Key Update.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

On 3-Share Threshold Implementations for 4-Bit S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Workflow Signatures for Business Process Compliance.
IEEE Trans. Dependable Sec. Comput., 2012

Threshold changeable secret sharing schemes revisited.
Theor. Comput. Sci., 2012

On the modular inversion hidden number problem.
J. Symb. Comput., 2012

Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptology, 2012

On the Bringer-Chabanne EPIR protocol for polynomial evaluation.
J. Mathematical Cryptology, 2012

Communication-efficient distributed oblivious transfer.
J. Comput. Syst. Sci., 2012

On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptology ePrint Archive, 2012

Revisiting a Secret Sharing Approach to Network Codes.
Proceedings of the Provable Security - 6th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Shorter IBE and Signatures via Asymmetric Pairings.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

On the (In)Security of IDEA in Various Hashing Modes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Differential Cache Attacks on SMS4.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Differential Attacks against Stream Cipher ZUC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Revocable Identity-Based Encryption from Lattices.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Authentication of Digital Streams.
IEEE Trans. Information Theory, 2011

Side-Channel Resistant Crypto for Less than 2, 300 GE.
J. Cryptology, 2011

An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials.
Int. J. Found. Comput. Sci., 2011

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).
IACR Cryptology ePrint Archive, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptology ePrint Archive, 2011

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptology ePrint Archive, 2011

The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption.
IACR Cryptology ePrint Archive, 2011

On the Hardness of the Sum of k Mins Problem.
Comput. J., 2011

On Related-Key Attacks and KASUMI: The Case of A5/3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Authenticated Key Exchange under Bad Randomness.
Proceedings of the Financial Cryptography and Data Security, 2011

Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Oblivious Transfer and n-Variate Linear Function Evaluation.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discrete Math., 2010

Query-Efficient Locally Decodable Codes.
Electronic Colloquium on Computational Complexity (ECCC), 2010

Cryptanalysis of the Convex Hull Click Human Identification Protocol.
Proceedings of the Information Security - 13th International Conference, 2010

Plaintext-Awareness of Hybrid Encryption.
Proceedings of the Topics in Cryptology, 2010

256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

On Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Unconditionally secure disjointness tests for private datasets.
IJACT, 2009

Bounds and constructions for key distribution schemes.
Adv. in Math. of Comm., 2009

Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009

Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009

Efficient Fuzzy Matching and Intersection on Private Datasets.
Proceedings of the Information, Security and Cryptology, 2009

Privacy Enhancements for Hardware-Based Security Modules.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

On the Security of PAS (Predicate-Based Authentication Service).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
On Secret Reconstruction in Secret Sharing Schemes.
IEEE Trans. Information Theory, 2008

Employ a mobile agent for making a payment.
Mobile Information Systems, 2008

Cryptography in Computer System Security.
J. UCS, 2008

Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci., 2008

A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec., 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Information Security, 2008

Permutation polynomials of the form (xp-x+delta)s+L(x).
Finite Fields and Their Applications, 2008

Security Analysis of Australian and E.U. E-passport Implementation.
Journal of Research and Practice in Information Technology, 2008

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Threshold Privacy Preserving Keyword Searches.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008

Cryptanalysis of Rabbit.
Proceedings of the Information Security, 11th International Conference, 2008

Secure Computation of the Vector Dominance Problem.
Proceedings of the Information Security Practice and Experience, 2008

Distributed Private Matching and Set Operations.
Proceedings of the Information Security Practice and Experience, 2008

An On-Line Secure E-Passport Protocol.
Proceedings of the Information Security Practice and Experience, 2008

Cryptanalysis of LASH.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Formal Security Analysis of Australian E-passport Implementation.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2008

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Efficient Disjointness Tests for Private Datasets.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

Privacy-Preserving Distributed Set Intersection.
Proceedings of the The Third International Conference on Availability, 2008

2007
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Trans. Information Theory, 2007

Cryptanalysis of LASH.
IACR Cryptology ePrint Archive, 2007

New constructions of anonymous membership broadcasting schemes.
Adv. in Math. of Comm., 2007

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007

A New Dynamic Accumulator for Batch Updates.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007

On Secure Multi-party Computation in Black-Box Groups.
Proceedings of the Advances in Cryptology, 2007

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci., 2006

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme.
IACR Cryptology ePrint Archive, 2006

Lattice-based threshold-changeability for standard CRT secret-sharing schemes.
Finite Fields and Their Applications, 2006

Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptogr., 2006

Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptogr., 2006

Anonymous Signature Schemes.
Proceedings of the Public Key Cryptography, 2006

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Proceedings of the Public Key Cryptography, 2006

Rateless Codes for the Multicast Stream Authentication Problem.
Proceedings of the Advances in Information and Computer Security, 2006

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Proceedings of the Information Security, 9th International Conference, 2006

Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

An attack-localizing watermarking scheme for natural language documents.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Achieving Multicast Stream Authentication Using MDS Codes.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Proceedings of the Advances in Cryptology, 2006

Formal analysis of card-based payment systems in mobile devices.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptogr., 2005

Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Secure Construction of Virtual Organizations in Grid Computing Systems.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Privacy Enhanced Electronic Cheque System.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

Radio Networks with Reliable Communication.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
Shared generation of pseudo-random functions.
J. Complexity, 2004

Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Proceedings of the Public Key Cryptography, 2004

Securing Multicast Groups in Ad Hoc Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Proceedings of the Advances in Cryptology, 2004

2003
Linear authentication codes: bounds and constructions.
IEEE Trans. Information Theory, 2003

Distributing the Encryption and Decryption of a Block Cipher.
IACR Cryptology ePrint Archive, 2003

Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Proceedings of the Topics in Cryptology, 2003

Efficient One-Time Proxy Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Universal Designated-Verifier Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math., 2002

A Group Key Distribution Scheme with Decentralised User Join.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

A Dynamic Group Key Distribution Scheme with Flexible User Join.
Proceedings of the Information Security and Cryptology, 2002

Redistribution of Mechanical Secret Shares.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

A Combinatorial Approach to Anonymous Membership Broadcast.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

A Secure Re-keying Scheme with Key Recovery Property.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Broadcast authentication for group communication.
Theor. Comput. Sci., 2001

An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng., 2001

Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields.
J. Comb. Theory, Ser. A, 2001

Broadcast anti-jamming systems.
Computer Networks, 2001

Linear Authentication Codes: Bounds and Constructions.
Proceedings of the Progress in Cryptology, 2001

A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Proceedings of the Information Security and Cryptology, 2001

Efficient Revocation Schemes for Secure Multicast.
Proceedings of the Information Security and Cryptology, 2001

How to Construct Fail-Stop Confirmer Signature Schemes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Trans. Information Theory, 2000

Fail-Stop Signature for Long Messages.
Proceedings of the Progress in Cryptology, 2000

New constructions for multicast re-keying schemes using perfect hash families.
Proceedings of the CCS 2000, 2000

On Multiplicative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Key Management for Secure Multicast with Dynamic Controller.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput., 1999

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999

Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

Broadcast Authentication in Group Communication.
Proceedings of the Advances in Cryptology, 1999

Changing Thresholds in the Absence of Secure Channels.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
On Rational Series and Rational Languages.
Theor. Comput. Sci., 1998

On Syntactic Nuclei of Rational Languages.
Inf. Process. Lett., 1998

New Results on Multi-Receiver Authentication Codes.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Bounds and Constructions for Multireceiver Authentication Codes.
Proceedings of the Advances in Cryptology, 1998

On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...