H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 35 Citations 5,359 216 World Ranking 6097 National Ranking 85

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Computer network

His primary scientific interests are in Theoretical computer science, Computer security, Cryptography, Public-key cryptography and Encryption. His studies in Theoretical computer science integrate themes in fields like Signature, Random oracle, Lattice, Intersection and Distributed Computing Environment. In general Computer security study, his work on Block cipher, Key, Cryptanalysis and Proxy signature often relates to the realm of Proxy, thereby connecting several areas of interest.

When carried out as part of a general Cryptography research project, his work on Secret sharing and Secure multi-party computation is frequently linked to work in Power over, therefore connecting diverse disciplines of study. His Public-key cryptography research incorporates themes from Computation, Security parameter, Delegate and Digital signature. His Encryption study incorporates themes from Scheme and Security analysis.

His most cited work include:

  • Pushing the limits: a very compact and a threshold implementation of AES (326 citations)
  • Universal Designated-Verifier Signatures (177 citations)
  • Two-factor mutual authentication based on smart cards and passwords (168 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Theoretical computer science, Computer security, Cryptography, Encryption and Discrete mathematics. His study in Theoretical computer science is interdisciplinary in nature, drawing from both Random oracle, Secret sharing, Group signature and Learning with errors, Lattice. Computer security is closely attributed to Scheme in his study.

His Cryptography research is multidisciplinary, incorporating perspectives in Adversary, Computer network and Digital signature. His Encryption research incorporates elements of Revocation and Database. His research integrates issues of Upper and lower bounds, Combinatorics and Zero-knowledge proof in his study of Discrete mathematics.

He most often published in these fields:

  • Theoretical computer science (30.83%)
  • Computer security (29.44%)
  • Cryptography (26.67%)

What were the highlights of his more recent work (between 2018-2021)?

  • Encryption (21.39%)
  • Computer security (29.44%)
  • Theoretical computer science (30.83%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Encryption, Computer security, Theoretical computer science, Public-key cryptography and Cryptography. His research investigates the connection with Encryption and areas like Database which intersect with concerns in Protocol, Key, Block and Overhead. Huaxiong Wang has researched Computer security in several fields, including Scheme, Signature and Cloud computing.

The concepts of his Theoretical computer science study are interwoven with issues in Multilinear map, Computation, Group signature, Learning with errors and Homomorphic secret sharing. In Public-key cryptography, Huaxiong Wang works on issues like Cryptocurrency, which are connected to Product, Ring signature and Database transaction. His Cryptography research includes elements of Hash function, Set and Code.

Between 2018 and 2021, his most popular works were:

  • Identity-based key-exposure resilient cloud storage public auditing scheme from lattices (32 citations)
  • FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things (26 citations)
  • Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage (19 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Algebra

Computer security, Encryption, Public-key cryptography, Theoretical computer science and Adversary are his primary areas of study. His work on Cloud computing expands to the thematically related Computer security. His research in Encryption intersects with topics in Wildcard, Hash function and Key.

His work in Public-key cryptography addresses issues such as Cryptographic primitive, which are connected to fields such as Anonymity. The study incorporates disciplines such as Cryptography, Pattern matching, Random oracle, Wildcard character and Homomorphic secret sharing in addition to Theoretical computer science. His research investigates the connection between Cryptography and topics such as Revocation that intersect with issues in Lattice.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Pushing the limits: a very compact and a threshold implementation of AES

Amir Moradi;Axel Poschmann;San Ling;Christof Paar.
international cryptology conference (2011)

478 Citations

Universal Designated-Verifier Signatures

Ron Steinfeld;Laurence Bull;Huaxiong Wang;Josef Pieprzyk.
international conference on the theory and application of cryptology and information security (2003)

270 Citations

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)

236 Citations

Side-Channel Resistant Crypto for Less than 2,300 GE

Axel Poschmann;Amir Moradi;Khoongming Khoo;Chu-Wee Lim.
Journal of Cryptology (2011)

184 Citations

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors

Benoît Libert;San Ling;Khoa Nguyen;Huaxiong Wang.
international cryptology conference (2016)

134 Citations

Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures

Ron Steinfeld;Huaxiong Wang;Josef Pieprzyk.
public key cryptography (2004)

133 Citations

Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications

San Ling;Khoa Nguyen;Damien Stehlé;Huaxiong Wang.
public key cryptography (2013)

127 Citations

Lattice-Based Group Signature Scheme with Verifier-Local Revocation

Adeline Langlois;San Ling;Khoa Nguyen;Huaxiong Wang.
public key cryptography (2014)

127 Citations

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

Jian Guo;San Ling;Christian Rechberger;Huaxiong Wang.
international conference on the theory and application of cryptology and information security (2010)

122 Citations

Linear authentication codes: bounds and constructions

Huaxiong Wang;Chaoping Xing;R. Safavi-Naini.
IEEE Transactions on Information Theory (2003)

116 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Huaxiong Wang

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 68

Yi Mu

Yi Mu

Fujian Normal University

Publications: 47

Guomin Yang

Guomin Yang

University of Wollongong

Publications: 22

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 21

Yvo Desmedt

Yvo Desmedt

The University of Texas at Dallas

Publications: 21

Andrey Bogdanov

Andrey Bogdanov

CYBERCRYPT

Publications: 20

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 19

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 18

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 17

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 17

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 17

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 16

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 15

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 15

Douglas R. Stinson

Douglas R. Stinson

University of Waterloo

Publications: 15

Something went wrong. Please try again later.