His primary scientific interests are in Theoretical computer science, Computer security, Cryptography, Public-key cryptography and Encryption. His studies in Theoretical computer science integrate themes in fields like Signature, Random oracle, Lattice, Intersection and Distributed Computing Environment. In general Computer security study, his work on Block cipher, Key, Cryptanalysis and Proxy signature often relates to the realm of Proxy, thereby connecting several areas of interest.
When carried out as part of a general Cryptography research project, his work on Secret sharing and Secure multi-party computation is frequently linked to work in Power over, therefore connecting diverse disciplines of study. His Public-key cryptography research incorporates themes from Computation, Security parameter, Delegate and Digital signature. His Encryption study incorporates themes from Scheme and Security analysis.
His main research concerns Theoretical computer science, Computer security, Cryptography, Encryption and Discrete mathematics. His study in Theoretical computer science is interdisciplinary in nature, drawing from both Random oracle, Secret sharing, Group signature and Learning with errors, Lattice. Computer security is closely attributed to Scheme in his study.
His Cryptography research is multidisciplinary, incorporating perspectives in Adversary, Computer network and Digital signature. His Encryption research incorporates elements of Revocation and Database. His research integrates issues of Upper and lower bounds, Combinatorics and Zero-knowledge proof in his study of Discrete mathematics.
His primary areas of study are Encryption, Computer security, Theoretical computer science, Public-key cryptography and Cryptography. His research investigates the connection with Encryption and areas like Database which intersect with concerns in Protocol, Key, Block and Overhead. Huaxiong Wang has researched Computer security in several fields, including Scheme, Signature and Cloud computing.
The concepts of his Theoretical computer science study are interwoven with issues in Multilinear map, Computation, Group signature, Learning with errors and Homomorphic secret sharing. In Public-key cryptography, Huaxiong Wang works on issues like Cryptocurrency, which are connected to Product, Ring signature and Database transaction. His Cryptography research includes elements of Hash function, Set and Code.
Computer security, Encryption, Public-key cryptography, Theoretical computer science and Adversary are his primary areas of study. His work on Cloud computing expands to the thematically related Computer security. His research in Encryption intersects with topics in Wildcard, Hash function and Key.
His work in Public-key cryptography addresses issues such as Cryptographic primitive, which are connected to fields such as Anonymity. The study incorporates disciplines such as Cryptography, Pattern matching, Random oracle, Wildcard character and Homomorphic secret sharing in addition to Theoretical computer science. His research investigates the connection between Cryptography and topics such as Revocation that intersect with issues in Lattice.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Pushing the limits: a very compact and a threshold implementation of AES
Amir Moradi;Axel Poschmann;San Ling;Christof Paar.
international cryptology conference (2011)
Universal Designated-Verifier Signatures
Ron Steinfeld;Laurence Bull;Huaxiong Wang;Josef Pieprzyk.
international conference on the theory and application of cryptology and information security (2003)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)
Side-Channel Resistant Crypto for Less than 2,300 GE
Axel Poschmann;Amir Moradi;Khoongming Khoo;Chu-Wee Lim.
Journal of Cryptology (2011)
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
Benoît Libert;San Ling;Khoa Nguyen;Huaxiong Wang.
international cryptology conference (2016)
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures
Ron Steinfeld;Huaxiong Wang;Josef Pieprzyk.
public key cryptography (2004)
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling;Khoa Nguyen;Damien Stehlé;Huaxiong Wang.
public key cryptography (2013)
Lattice-Based Group Signature Scheme with Verifier-Local Revocation
Adeline Langlois;San Ling;Khoa Nguyen;Huaxiong Wang.
public key cryptography (2014)
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo;San Ling;Christian Rechberger;Huaxiong Wang.
international conference on the theory and application of cryptology and information security (2010)
Linear authentication codes: bounds and constructions
Huaxiong Wang;Chaoping Xing;R. Safavi-Naini.
IEEE Transactions on Information Theory (2003)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: