Li-Ping Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Short Code-based One-out-of-Many Proofs and Applications.
IACR Cryptol. ePrint Arch., 2024

2023
Security analysis of the Classic McEliece, HQC and BIKE schemes in low memory.
J. Inf. Secur. Appl., December, 2023

Threshold Homomorphic Encryption From Provably Secure NTRU.
Comput. J., December, 2023

Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption.
J. Inf. Secur. Appl., September, 2023

Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping.
Theor. Comput. Sci., August, 2023

Improved Information Set Decoding Algorithms over Galois Ring in the Lee Metric.
J. Syst. Sci. Complex., June, 2023

PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks.
CoRR, 2023

Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

HERMS: A Hierarchical Electronic Records Management System Based on Blockchain with Distributed Key Generation.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
A New Code-based Blind Signature in Rank Metric.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2019
Numerical algorithm to solve generalized fractional pantograph equations with variable coefficients based on shifted Chebyshev polynomials.
Int. J. Comput. Math., 2019

Certifying multi-power RSA.
IET Inf. Secur., 2019

Loong: a new IND-CCA-secure code-based KEM.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Two New Module-Code-Based KEMs with Rank Metric.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
On lattice-based algebraic feedback shift registers synthesis for multisequences.
Cryptogr. Commun., 2018

Linearized Goppa Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Subset sums of quadratic residues over finite fields.
Finite Fields Their Appl., 2017

2016
Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Improved Differential Fault Attack on the Block Cipher SPECK.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
A generalized Weber problem with different gauges for different regions.
Appl. Math. Comput., 2014

2012
Lagrange interpolation polynomials and generalized Reed-Solomon codes over rings of matrices.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2009
Study on Dynamic Game Models in a Two-Echelon Supply Chain.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
A lattice-based linear shift register synthesis for multisequences of varying length.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2005
Comparative analysis for the <i>N</i> policy M/G/1 queueing system with a removable and unreliable server.
Math. Methods Oper. Res., 2005


  Loading...