Showing 1 - 20 results of 82 for search 'Wang, Huaxiong', query time: 0.04s
Refine Results
-
1
Group signatures from lattices : simpler, tighter, shorter, ring-based by Ling, San, Nguyen, Khoa, Wang, Huaxiong
Published 2015
Get full text
Journal Article -
2
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices by Zhang, Xiaojun, Wang, Huaxiong, Xu, Chunxiang
Published 2021
Journal Article -
3
256 bit standardized crypto for 650 GE – GOST revisited by Poschmann, Axel, Ling, San, Wang, Huaxiong
Published 2012
Get full text
Journal Article -
4
Double verification protocol via secret sharing for low-cost RFID tags by Liu, Yali, Ezerman, Martianus Frederic, Wang, Huaxiong
Published 2019
Get full text
Journal Article -
5
Workflow signatures for business process compliance by Lim, Hoon Wei, Kerschbaum, Florian, Wang, Huaxiong
Published 2013
Get full text
Journal Article -
6
Analysis of Gong et al.'s CCA2-secure homomorphic encryption by Lee, Hyung Tae, Ling, San, Wang, Huaxiong
Published 2017
Get full text
Journal Article -
7
On the Bringer–Chabanne EPIR protocol for polynomial evaluation by Chee, Yeow Meng, Wang, Huaxiong, Zhang, Liang Feng
Published 2013
Get full text
Journal Article -
8
Lattice-based group signatures : achieving full dynamicity (and deniability) with ease by Ling, San, Nguyen, Khoa, Wang, Huaxiong, Xu, Yanhong
Published 2020
Journal Article -
9
Further improvement of factoring N = p r q s with partial known bits by Wang, Shixiong, Qu, Longjiang, Li, Chao, Wang, Huaxiong
Published 2021
Journal Article -
10
Server-aided revocable predicate encryption : formalization and lattice-based instantiation by Ling, San, Nguyen, Khoa, Wang, Huaxiong, Zhang, Juanyang
Published 2021
Journal Article -
11
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction by Ding, Jian, Ke, Pinhui, Lin, Changlu, Wang, Huaxiong
Published 2022
Journal Article -
12
Full threshold change range of threshold changeable secret sharing by Ding, Jian, Lin, Changlu, Lin, Fuchun, Wang, Huaxiong
Published 2023
Journal Article -
13
-
14
-
15
The relation and transformation between hierarchical inner product encryption and spatial encryption by Chen, Jie, Lim, Hoon Wei, Ling, San, Wang, Huaxiong
Published 2014
Get full text
Journal Article -
16
-
17
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials by Chang, Zuling, Ezerman, Martianus Frederic, Ling, San, Wang, Huaxiong
Published 2019
Get full text
Journal Article -
18
On the efficiency of FHE-based private queries by Kim, Myungsun, Lee, Hyung Tae, Ling, San, Wang, Huaxiong
Published 2020
Journal Article -
19
A lattice-based group signature scheme with verifier-local revocation by Ling, San, Nguyen, Khoa, Roux-Langlois, Adeline, Wang, Huaxiong
Published 2020
Journal Article -
20
Traceable policy-based signatures and instantiation from lattices by Xu, Yanhong, Safavi-Naini, Reihaneh, Nguyen, Khoa, Wang, Huaxiong
Published 2022
Journal Article