Publications

 

Edited Books

1.     Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang and  Chaoping Xing, Coding and Cryptology - Proceedings of the Third International Workshop, IWCC 2011 (Qingdao, China),  Lecture Notes in Computer Science 6639, Springer, 2011, viii + 293 pp

2.     Yeow Meng Chee, Chao Li, Sang Ling, Huaxiong Wang and Chaoping Xin, Coding and Cryptology,  Proceedings of the Second International Workshop, IWCC 2009, (Zhang Jia Jie, China), Lecture Notes in Computer Science 5557, Springer, 2009, viii + 273 pp.

3.     Yongqing Li, San Ling, Harald Niederreiter, Huaxiong Wang, Chaoping Xing and Shengyuan Zhang, Coding and Cryptology,  Proceedings of the First International Workshop (Wuyi Mountain, Fujian, China), Series on Coding Theory and Cryptology - Vol. 4, World Scientific, 2008.

4.     Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang and Chaoping Xing, Cryptology and Network Security,  Proceedings of 6th International Conference, CANS 2007, Lecture Notes in Computer Science, Vol. 4856, Springer 2007

5.     Yvo Desmedt, Huaxiong Wang, Yi Mu and Yongqing Li,  Cryptology and Network Security (edited), Proceedings of  4th International Conference, CANS 2005, Lecture Notes in Computer Science Vol. 3810, Springer 2005

6.     Huaxiong Wang, Josef Pieprzyk and  Vijay Varadharajan,  Information Security and Privacy (edited), Proceedings of 9th Australasian Conference, ACISP'04, Lectture Notes in Computer Science, Vol. 3108, 2004.

7.     Kwok Yan Lam, Igor Shparlinski, Huaxiong Wang and Chaoping Xing,  Cryptography and Computational Number Theory (edited), Proceedings of Workshop of Cryptography and Computational Number Theory, Birkhauser, 2001.

 

Journal Papers (selected)

1.     Jie Chen, Hoon Wei Lim, San Ling and Huaxiong Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography, accepted  (July 2012)

2.     Xun Yi, San Ling and Huaxiong Wang, Efficient Two-Server Password-Only Authenticated Key Exchange, IEEE Transactions on Parallel and Distributed Systems, accepted (Sept 2012).

3.     Yvo Desmedt, Josef Pieprzyk,  Ron Steinfeld, Xiaoming Sun,  Christophe Tartary,  Huaxiong Wang and  Andrew C.-C. Yao, Graph Coloring Applied to Secure Computation in Non-Abelian Groups, Journal of Cryptology, accepted (July 2011).

4.     Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang and Liangfeng Zhang, Query-Efficient Locally Decodable Codes of Subexponential Length, Computational Complexity, accepted (May 2010).

5.     Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang. Workflow Signatures for Business Process Compliance, IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 756-769 (2012).

6.     Amos Biemel, Yeow Meng Chee,  Huaxiong Wang and Liangfeng Zhang,Communication-efficient distributed oblivious transfer, Journal of Computer and System Sciences, vol. 78, no. 4, pp. 1142–1157 (2012).

7.     Zhifang Zhang, Yeow Meng Chee, San Ling, Mulan Liu and Huaxiong Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science, vol. 418, pp. 106–115 (2012).

8.     San Ling, Igor Shparlinski, Ron Steinfeld and Huaxiong Wang,  On the Modular Inversion Hidden Number Problem, Journal of Symbolic Computation, Vol. 47, no. 4, 358 – 367 (2012)

9.     Hassan Jammel Asghar, Josef Pieprzyk and Huaxiong Wang, On the Hardness of the Sum of $k$ Mins Problem, The Computer Journal, vol. 9, no. 5, pp. 756-769 (2011).

10.  Christophe Tartary, Huaxiong Wang and San Ling,  Authentication of Digital Streams, IEEE Trans. on Info. Theory, vol. 57, no. 9 (2011), pp. 6285 – 6303.

11.  A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang and S. Ling,  Side-Channel Resistant Crypto for less than 2,300 GE, Journal of Cryptology, Vol. 24, No. 2 (2011), 322 - 345.

12.  Hung-Min Sun, Huaxiong Wang, Bying-He Ku and Josef Pieprzyk, Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time,  SIAM J. on Discrete Math, Vol. 24, No. 2 (2010), pp. 617 - 638.

13.  Yang G, Wong S D, Wang H and Deng X: Two-factor mutual authentication based on smart cards and passwords, Journal of Computer and System Sciences, Vol. 74, No. 7 (2008), 1160 – 1172.

14.  Wand H and Wong D S: On Secret Reconstruction in Secret Sharing Schemes, IEEE Trans. on Info. Theory, Vol. 54, No. 1 (2008), 473 - 480.

15.  Steinfeld R, Pieprzyk J and Wang H: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes, IEEE Trans. on Info. Theory, Vol. 53, No. 7 (2007), 2542-2559.

16.  Safavi-Naini R and Wang H: Secret Sharing Schemes with Partial Broadcast Channels, Designs, Codes and Cryptography, 41:1(2006), 5 - 22.

17.  Long S, Pieprzyk J, Wang H and Wong D S: Generalised Cumulative Arrays in Secret Sharing, Designs, Codes and Cryptography, 40(2006), 191 - 209.

18.  Martin K, Safavi-Naini R, Wang H and Wild P: Distributing the encryption and decryption of a block cipher. Designs, Codes and Cryptography, 36(2005), 263-287.

19.  Wang H and Pieprzyk J: Shared generation of pseudo-random functions. Journal of Complexity, 20(2004), 458 - 472.

20.  Wang H, Xing C and Safavi-Naini R: Linear Authentication Codes: Bounds and Constructions. IEEE Trans. on Info. Theory, Vol. 49, No. 4, 2003, 866-872.

21.  Safavi-Naini R and Wang H: Efficient Authentication for Group Communication. Theoretical Computer Science, Vol. 269, 1–2, 2001, 1–21.

22.  Wang H and Xing C: Explicit Constructions of Perfect Hash Families from Algebraic Curve over Finite Fields. Journal of Combinatorial Theory, Series A, Vol.93, 2001, 112-124.

23.  Desmedt Y, Safavi-Naini R, Wang H, Batten L M, Charnes C and Pieprzyk J: Broadcast Anti-jamming Systems. Computer Networks, Vol. 35, No. 2-3, 2001, 223-236.

24.  Xing C, Wang H and Lam K Y: Constructions of Authentication Codes from Algebraic Curves over Finite Fields. IEEE Trans. on Info. Theory, Vol.46, 2000, 886-892.

25.  Martin K, Safavi-Naini R and Wang H: Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures, The Computer Journal, Vol.42, No.8, 1999, 638-649.

26.  Safavi-Naini R and Wang H: Multireceiver Authentication Codes: Model, Bounds, Constructions and Extensions, Information and Computation, Vol. 151, No. 1/2, 1999, 148-172.

27.  Wang H: On rational Languages and Rational Series, Theoretical Computer Science. Vol. 205, No. 1-2, 1998, 329-336.

 

Conference Papers (selected)

1.     Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang and San Ling. Differential Attacks Against Stream Cipher ZUC, Asiacrypt 2012, Lecture Notes in Computer Science, (accepted August 2012).

2.     Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang,  NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model, PKC 2012, Lecture Notes in Computer Science, (accepted Feb. 2012).

3.     Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk and Huaxiong Wang, On the (In)Security of IDEA in Various Hashing Modes,  FSE 2012,  Lecture Notes in Computer Science,  (accepted January 2012)

4.     Yeow Meng Chee, Huaxiong Wang and Liangfeng Zhang,  Oblivious Transfer and n-Variate Linear Function Evaluation, Cocoon'2011, 17th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, 6842 (2011), 627 - 637, Springer.

5.     Amir Moradi, Axel Poschmann, San Ling, Christof Paar and Huaxiong Wang, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Eurocrypt 2011, Lecture Notes in Computer Science,  Vol. 6632 (2011), 69 - 88, Springer.

6.     Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang, Authenticated Key Exchange under Bad Randomness, Financial Cryptography and Data Security, 2011, Lecture Notes in Computer Science, Springer.

7.     Jian Guo, San Ling, Christian Rechberger and Huaxiong Wang,  Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2, Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science, vol. 6477 (2010), 56 - 75, Springer.

8.     Axel Poschmann, Huaxiong Wang and San Ling, 256 bit Standardized Crypto for 650 GE - GOST Revisite, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010),  Lecture Notes in Computer Science Vol. 6225 (2010), 219 - 233, Springer.

9.     Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang, Cryptanalysis of the LAKE Hash Family, In proceedings of FSE2009, Lecture Notes in Computer Science, 5665 (2009), 156-179, Springer.

10.  Shujun Li, Hassan Jameel, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, On the Security of PAS (Predicate-based Authentication Service), 25th Annual Computer Security Applications Conference (ACSAC'2009), pp. 209-218, December 7-11, 2009, Honolulu, Hawaii, USA.

11.  Zhang Z, Liu M, Chee Y M, Ling S and Wang H: Strongly multiplicative and 3-multiplicative linear secret sharing schemes, ASIACRYPT’08, 14th Annual International Conference on the Theory and Application of Cryptology & Information Security, Lecture Notes in Computer Science, Lecture Notes in Computer Science,  5350 (2008), 19- 36, Springer.

12.  Contini S, Matusiewicz K, Pieprzyk J, Steinfeld R, Guo J, Ling S and Wang H: Cryptanalysis of LASH, FSE’08, Fast Software Encryption,  Lecture Notes in Computer Science, 5086(2008), 207 - 223.

13.  Desmedt Y, Pieprzyk J, Steinfeld R and Wang H: On Secure Multi-Party Computation in Black Box Groups, Crypto’07, Lecture Notes in Computer Science, Vol. 4622, pp. 591-612, Springer-Verlag, 2007.

14.  Steinfeld R, Pieprzyk J and Wang H: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator, Advances in Cryptology ASIACRYPT 2006, Lecture Notes in Computer Science, 4284(2006), 194 - 209.

15.  Yang G, Wong D, Deng X and Wang H: Anonymous Signature Schemes. International Workshop on Practice and Theory in Public Key Cryptography (PKC’06). Lecture Notes in Computer Science, Vol. 3958, 2006, 347 - 343.

16.  Steinfeld R, Pieprzyk J and Wang H: Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. International Workshop on Practice and Theory in Public Key Cryptography (PKC’06). Lecture Notes in Computer Science, Vol. 3958, 2006, 157 - 173.

17.  Desmedt Y, Wang Y, Safavi-Naini R and Wang H: Radio Networks with Reliable Communication. Cocoon 2005, 11th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, Vol. 3595, 2005, 156 - 166.

18.  Steinfeld R, Contini S, Wang H and Pieprzyk J: Converse Results to the Wiener Attack on RSA. International Workshop on Practice and Theory in Public Key Cryptography (PKC’05). Lecture Notes in Computer Science, Vol. 3386, 2005, 184 - 198.

19.  Steinfeld R, Pieprzyk J and Wang H: Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. 10th International Conference on the Theory and Application of Cryptology and Information Security,  Asiacrypt’04. Lecture Notes in Computer Science, Vol. 3329, 2004, 170 - 186.

20.  Steinfeld R, Pieprzyk J and Wang H: Efficient extension of standard Schnorr/RSA signature into universal designated-verifier. International Workshop on Practice and Theory in Public Key Cryptography (PKC’04). Lecture Notes in Computer Science, Vol. 2942, 2004, 86 - 100.

21.  Wang H and Pieprzyk J: Efficient one-time proxy signatures, 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt’03. Lecture Notes in Computer Science, Vol. 2894, 2003, 507 - 522.

22.  Steinfeld R, Bull L, Wang H and Pieprzyk J: Universal designated-verifier signatures, 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt’03. Lecture Notes in Computer Science, Vol. 2894, 2003, 523 - 542.

23.  Wang H and Pieprzyk J: A Combinatorial Approach to Anonymous Membership Broadcast, Cocoon’2002, 8th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, Vol. 2387, 2002, 162 – 170.

24.  Desmedt Y, Safavi-Naini R and Wang H: Redistribution of a mechanical secret’s shares, Financial Cryptography’02, Lecture Notes in Computer Science, Vol. 2357, 2002, 238–252.

25.  Safavi-Naini R and Wang H: New Constructions of secure multicast re-keying schemes using perfect hash families, 7th ACM Conference on Computer and Communication Security, ACM Press, 2000, 228-234.

26.  Safavi-Naini R and Wang H: Broadcast authentication in group communication, ASIACRYPT’99, Lecture Notes in Computer Science, Vol. 1716, 1999, 399-41.

27.  Safavi-Naini R and Wang H: New Results on Multireceiver Authentication Codes. In Advances in Cryptology - EUROCRYPT ’98, Lecture Notes in Computer Science,  1403, 527-541, 1998.

  1. Safavi-Naini R and Wang H: Bounds and Constructions for Multireceiver Authentication Codes.  In ‘Advances in Cryptology - ASIACRYPT ’98’, Lecture Notes in Comp. Sci. 1514(1998), 242-256.