Yi Wang

Orcid: 0009-0009-1878-3625

Affiliations:
  • National University of Defence Technology, School of Computer, Changsha, China


According to our database1, Yi Wang authored at least 26 papers between 2017 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
STIP: Efficient and Secure Non-Interactive Transformer Inference via Compact Packing.
IACR Cryptol. ePrint Arch., 2026

Tighter Proofs for PKE-to-KEM Transformations under Average-Case Decryption Error and without γ-Spread.
IACR Cryptol. ePrint Arch., 2026

2025
srTLS: Secure TLS Handshake on Corrupted Machines.
IEEE Trans. Dependable Secur. Comput., 2025

Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions.
IACR Cryptol. ePrint Arch., 2025

On the Security and Efficiency of TLS 1.3 Handshake with Hybrid Key Exchange from CPA-Secure KEMs.
Entropy, 2025

Universally Composable Subversion-Resilient Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2025, 2025

2024
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT.
IEEE Trans. Dependable Secur. Comput., 2024

Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.
Proceedings of the Provable and Practical Security, 2024

Parameter-Hiding Order-Revealing Encryption Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Secure Key Exchange via Transparent Reverse Firewalls.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

srCPace: Universally Composable PAKE with Subversion-Resilience.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

An Efficient Hardware Implementation of Crystal-Dilithium on FPGA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing.
Proceedings of the Computer Security - ESORICS 2023, 2023

Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls.
IEEE Trans. Dependable Secur. Comput., 2022

Asymmetric subversion attacks on signature and identification schemes.
Pers. Ubiquitous Comput., 2022

Algorithm Substitution Attacks on Identity-Based Encryption.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Substitution Attacks Against Sigma Protocols.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Security of Auditing Protocols Against Subversion Attacks.
Int. J. Found. Comput. Sci., 2020

Editorial of special issue on time-sensitive networking.
CCF Trans. Netw., 2020

2019
A Practical Authentication Framework for VANETs.
Secur. Commun. Networks, 2019

2018
Asymmetric Subversion Attacks on Signature Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017


  Loading...