Mingsheng Wang

According to our database1, Mingsheng Wang authored at least 62 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
On the Generalization of Butterfly Structure.
IACR Trans. Symmetric Cryptol., 2018

2017
Optimal Differential Trails in SIMON-like Ciphers.
IACR Trans. Symmetric Cryptol., 2017

The Security of SIMON-like Ciphers Against Linear Cryptanalysis.
IACR Cryptology ePrint Archive, 2017

Optimal Differential Trails in SIMON-like Ciphers.
IACR Cryptology ePrint Archive, 2017

Designing Proof of Transaction Puzzles for Cryptocurrency.
IACR Cryptology ePrint Archive, 2017

CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Compact Inner Product Encryption from LWE.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing.
Security and Communication Networks, 2016

A new framework for computing Gröbner bases.
Math. Comput., 2016

On the CLD Attack to a Statistical Model of a Key Stream Generator.
I. J. Network Security, 2016

Faster Algorithms for Solving LPN.
IACR Cryptology ePrint Archive, 2016

On the Construction of Lightweight Circulant Involutory MDS Matrices.
IACR Cryptology ePrint Archive, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

On the Construction of Lightweight Circulant Involutory MDS Matrices.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Faster Algorithms for Solving LPN.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding and Multimedia Security, 2015

Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE.
IACR Cryptology ePrint Archive, 2015

Two Generic Methods of Analyzing Stream Ciphers.
Proceedings of the Information Security - 18th International Conference, 2015

2014
A matrix approach for constructing quadratic APN functions.
Des. Codes Cryptography, 2014

Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).
Des. Codes Cryptography, 2014

Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security - 17th International Conference, 2014

A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Constructing S-boxes for Lightweight Cryptography with Feistel Structure.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
The Nonexistence of Permutations EA-Equivalent to Certain AB Functions.
IEEE Trans. Information Theory, 2013

A Matrix Approach for Constructing Quadratic APN Functions.
IACR Cryptology ePrint Archive, 2013

Permutation Polynomials and Their Differential Properties over Residue Class Rings.
IACR Cryptology ePrint Archive, 2013

Constructing Differentially 4-uniform Permutations over GF(22k) from the Inverse Function Revisited.
IACR Cryptology ePrint Archive, 2013

Permutation polynomials and their differential properties over residue class rings.
Discrete Applied Mathematics, 2013

Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Proceedings of the Information Security, 16th International Conference, 2013

Integral Attacks on Reduced-Round PRESENT.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions.
IACR Cryptology ePrint Archive, 2012

Automatic Search of Truncated Impossible Differentials and Applications.
IACR Cryptology ePrint Archive, 2012

Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.
Proceedings of the Progress in Cryptology, 2012

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Constructing differential 4-uniform permutations from know ones.
IACR Cryptology ePrint Archive, 2011

Security Evaluation against Differential Cryptanalysis for Block Cipher Structures.
IACR Cryptology ePrint Archive, 2011

Constructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1.
IACR Cryptology ePrint Archive, 2011

On EA-equivalence of certain permutations to power mappings.
Des. Codes Cryptography, 2011

On General Factorizations for n-D Polynomial Matrices.
CSSP, 2011

Permutation polynomials EA-equivalent to the inverse function over GF (2n).
Cryptography and Communications, 2011

A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
A Flaw in The Internal State Recovery Attack on ALPHA-MAC.
IACR Cryptology ePrint Archive, 2010

On permutation polynomials EA-equivalent to the inverse function over GF(2n).
IACR Cryptology ePrint Archive, 2010

A new algorithm for computing Groebner bases.
IACR Cryptology ePrint Archive, 2010

2009
Primary decomposition of zero-dimensional ideals over finite fields.
Math. Comput., 2009

A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure.
IACR Cryptology ePrint Archive, 2009

A Forecast Model of Agricultural and Livestock Products Price.
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009

2008
Remarks on n -D Polynomial Matrix Factorization Problems.
IEEE Trans. on Circuits and Systems, 2008

Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation.
IACR Cryptology ePrint Archive, 2008

Factorization problems on n-D polynomial matrices (abstract only).
ACM Comm. Computer Algebra, 2008

2007
On Factor Prime Factorizations for n-D Polynomial Matrices.
IEEE Trans. on Circuits and Systems, 2007

Parameter choices on Guruswami-Sudan algorithm for polynomial reconstruction.
Finite Fields and Their Applications, 2007

2005
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2005

2003
The term orderings which are compatible with composition II.
J. Symb. Comput., 2003

A Verifiable Secret Sharing Scheme with Statistical zero-knowledge.
IACR Cryptology ePrint Archive, 2003

2001
Remarks on Gröbner basis for ideals under composition.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

The membership problem for ideals of binomial skew polynomial rings.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

Threshold Undeniable RSA Signature Scheme.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...