Ruida Wang

Orcid: 0009-0002-1276-1299

According to our database1, Ruida Wang authored at least 34 papers between 2023 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Lean4Physics: Comprehensive Reasoning Framework for College-level Physics in Lean4.
CoRR, October, 2025

GAR: Generative Adversarial Reinforcement Learning for Formal Theorem Proving.
CoRR, October, 2025

Generalizable Geometric Image Caption Synthesis.
CoRR, September, 2025

Let's Reason Formally: Natural-Formal Hybrid Reasoning Enhances LLM's Math Capability.
CoRR, May, 2025

FANS - Formal Answer Selection for Natural Language Math Reasoning Using Lean4.
CoRR, March, 2025

MA-LoT: Multi-Agent Lean-based Long Chain-of-Thought Reasoning enhances Formal Theorem Proving.
CoRR, March, 2025

Full domain functional bootstrapping using the prime cyclotomic ring.
Theor. Comput. Sci., 2025

FHE-SNARK vs. SNARK-FHE: From Analysis to Practical Verifiable Computation.
IACR Cryptol. ePrint Arch., 2025

PIRCOR: Communication-Optimal Hintless Single-Server PIR via Homomorphic Rotation.
IACR Cryptol. ePrint Arch., 2025

Tetris: Versatile TFHE LUT and Its Application to FHE Instruction Set Architecture.
IACR Cryptol. ePrint Arch., 2025

Bootstrapping over Free ℛ-Module.
IACR Cryptol. ePrint Arch., 2025

Leveled Functional Bootstrapping via External Product Tree.
IACR Cryptol. ePrint Arch., 2025

A High-Speed 8-bit Single-Channel SAR ADC with Tailored Bit Intervals.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2025

MA-LoT: Model-Collaboration Lean-based Long Chain-of-Thought Reasoning enhances Formal Theorem Proving.
Proceedings of the Forty-second International Conference on Machine Learning, 2025

Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Refined TFHE Leveled Homomorphic Evaluation and Its Application.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Compact Lifting for NTT-Unfriendly Modulus.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

Refined Error Management for Gate Bootstrapping.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Key derivable signature and its application in blockchain stealth address.
Cybersecur., December, 2024

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Faster NTRU-based Bootstrapping in less than 4 ms.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Faster Bootstrapping via Modulus Raising and Composite NTT.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Free-XOR Gate Bootstrapping.
IACR Cryptol. ePrint Arch., 2024

Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT.
Proceedings of the Information Security - 27th International Conference, 2024

SR-PredictAO: Session-Based Recommendation with High-Capability Predictor Add-On.
Proceedings of the IEEE International Conference on Data Mining, 2024

Circuit Bootstrapping: Faster and Smaller.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

TheoremLlama: Transforming General-Purpose LLMs into Lean4 Experts.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

DragVideo: Interactive Drag-Style Video Editing.
Proceedings of the Computer Vision - ECCV 2024, 2024

From Signature with Re-randomizable Keys: Generic Construction of PDPKS.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Fregata: Faster Homomorphic Evaluation of AES via TFHE.
Proceedings of the Information Security - 26th International Conference, 2023

Revisiting Key Switching Techniques with Applications to Light-Key FHE.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Let's Synthesize Step by Step: Iterative Dataset Synthesis with Large Language Models by Extrapolating Errors from Small Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Full Domain Functional Bootstrapping with Least Significant Bit Encoding.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023


  Loading...