D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 6,216 285 World Ranking 6480 National Ranking 84

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Computer network

His primary scientific interests are in Theoretical computer science, Computer security, Cryptography, Public-key cryptography and Encryption. His studies in Theoretical computer science integrate themes in fields like Signature, Random oracle, Lattice, Intersection and Distributed Computing Environment. In general Computer security study, his work on Block cipher, Key, Cryptanalysis and Proxy signature often relates to the realm of Proxy, thereby connecting several areas of interest.

When carried out as part of a general Cryptography research project, his work on Secret sharing and Secure multi-party computation is frequently linked to work in Power over, therefore connecting diverse disciplines of study. His Public-key cryptography research incorporates themes from Computation, Security parameter, Delegate and Digital signature. His Encryption study incorporates themes from Scheme and Security analysis.

His most cited work include:

  • Pushing the limits: a very compact and a threshold implementation of AES (326 citations)
  • Universal Designated-Verifier Signatures (177 citations)
  • Two-factor mutual authentication based on smart cards and passwords (168 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Theoretical computer science, Computer security, Cryptography, Encryption and Discrete mathematics. His study in Theoretical computer science is interdisciplinary in nature, drawing from both Random oracle, Secret sharing, Group signature and Learning with errors, Lattice. Computer security is closely attributed to Scheme in his study.

His Cryptography research is multidisciplinary, incorporating perspectives in Adversary, Computer network and Digital signature. His Encryption research incorporates elements of Revocation and Database. His research integrates issues of Upper and lower bounds, Combinatorics and Zero-knowledge proof in his study of Discrete mathematics.

He most often published in these fields:

  • Theoretical computer science (30.83%)
  • Computer security (29.44%)
  • Cryptography (26.67%)

What were the highlights of his more recent work (between 2018-2021)?

  • Encryption (21.39%)
  • Computer security (29.44%)
  • Theoretical computer science (30.83%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Encryption, Computer security, Theoretical computer science, Public-key cryptography and Cryptography. His research investigates the connection with Encryption and areas like Database which intersect with concerns in Protocol, Key, Block and Overhead. Huaxiong Wang has researched Computer security in several fields, including Scheme, Signature and Cloud computing.

The concepts of his Theoretical computer science study are interwoven with issues in Multilinear map, Computation, Group signature, Learning with errors and Homomorphic secret sharing. In Public-key cryptography, Huaxiong Wang works on issues like Cryptocurrency, which are connected to Product, Ring signature and Database transaction. His Cryptography research includes elements of Hash function, Set and Code.

Between 2018 and 2021, his most popular works were:

  • Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (32 citations)
  • FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things (26 citations)
  • Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage (19 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Algebra

Computer security, Encryption, Public-key cryptography, Theoretical computer science and Adversary are his primary areas of study. His work on Cloud computing expands to the thematically related Computer security. His research in Encryption intersects with topics in Wildcard, Hash function and Key.

His work in Public-key cryptography addresses issues such as Cryptographic primitive, which are connected to fields such as Anonymity. The study incorporates disciplines such as Cryptography, Pattern matching, Random oracle, Wildcard character and Homomorphic secret sharing in addition to Theoretical computer science. His research investigates the connection between Cryptography and topics such as Revocation that intersect with issues in Lattice.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Pushing the limits: a very compact and a threshold implementation of AES

Amir Moradi;Axel Poschmann;San Ling;Christof Paar.
international cryptology conference (2011)

510 Citations

Universal Designated-Verifier Signatures

Ron Steinfeld;Laurence Bull;Huaxiong Wang;Josef Pieprzyk.
international conference on the theory and application of cryptology and information security (2003)

275 Citations

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)

242 Citations

Side-Channel Resistant Crypto for Less than 2,300 GE

Axel Poschmann;Amir Moradi;Khoongming Khoo;Chu-Wee Lim.
Journal of Cryptology (2011)

208 Citations

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors

Benoît Libert;San Ling;Khoa Nguyen;Huaxiong Wang.
international cryptology conference (2016)

164 Citations

Lattice-Based Group Signature Scheme with Verifier-Local Revocation

Adeline Langlois;San Ling;Khoa Nguyen;Huaxiong Wang.
public key cryptography (2014)

147 Citations

Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications

San Ling;Khoa Nguyen;Damien Stehlé;Huaxiong Wang.
public key cryptography (2013)

141 Citations

Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures

Ron Steinfeld;Huaxiong Wang;Josef Pieprzyk.
public key cryptography (2004)

140 Citations

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

Jian Guo;San Ling;Christian Rechberger;Huaxiong Wang.
international conference on the theory and application of cryptology and information security (2010)

130 Citations

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions

Benoît Libert;San Ling;Fabrice Mouhartem;Khoa Nguyen.
international cryptology conference (2016)

128 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Huaxiong Wang

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 68

Yi Mu

Yi Mu

Fujian Normal University

Publications: 47

Amir Moradi

Amir Moradi

Ruhr University Bochum

Publications: 40

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 22

Yvo Desmedt

Yvo Desmedt

The University of Texas at Dallas

Publications: 21

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 21

Andrey Bogdanov

Andrey Bogdanov

CYBERCRYPT

Publications: 20

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 19

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 18

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 17

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 17

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 17

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 16

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 15

Douglas R. Stinson

Douglas R. Stinson

University of Waterloo

Publications: 15

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 15

Trending Scientists

Arvind Narayanan

Arvind Narayanan

Princeton University

Thomas Neumann

Thomas Neumann

Technical University of Munich

Hongdong Li

Hongdong Li

Australian National University

Enzo Orlandini

Enzo Orlandini

University of Padua

William H. Pearson

William H. Pearson

University of Michigan–Ann Arbor

Xiaobo Liu

Xiaobo Liu

University of Electronic Science and Technology of China

Abdolreza Simchi

Abdolreza Simchi

Sharif University of Technology

Nigel D. F. Grindley

Nigel D. F. Grindley

Yale University

Peter Wutzler

Peter Wutzler

Friedrich Schiller University Jena

James E. Childs

James E. Childs

Yale University

Alan R. Carroll

Alan R. Carroll

University of Wisconsin–Madison

Katrin Meusburger

Katrin Meusburger

Swiss Federal Institute for Forest, Snow and Landscape Research

Marjolein E. de Vugt

Marjolein E. de Vugt

Maastricht University

Chun-Su Yuan

Chun-Su Yuan

University of Chicago

Yasuhiko Sugawara

Yasuhiko Sugawara

Kumamoto University

James G. Anderson

James G. Anderson

Purdue University West Lafayette

Something went wrong. Please try again later.