关注
Mingyuan Wang
Mingyuan Wang
在 berkeley.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Non-malleable codes against lookahead tampering
D Gupta, HK Maji, M Wang
International Conference on Cryptology in India, 307-328, 2018
14*2018
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Cryptology Conference, 779-808, 2021
8*2021
Black-box use of one-way functions is useless for optimal fair coin-tossing
HK Maji, M Wang
Annual International Cryptology Conference, 593-617, 2020
82020
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
72021
Coin tossing with lazy defense: Hardness of computation results
HA Khorasgani, HK Maji, M Wang
Cryptology ePrint Archive, 2020
52020
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
42021
Optimally-secure coin-tossing against a byzantine adversary
HA Khorasgani, HK Maji, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2858-2863, 2021
3*2021
Computational hardness of optimal fair computation: Beyond minicrypt
HK Maji, M Wang
Annual International Cryptology Conference, 33-63, 2021
22021
Efficient distributed coin-tossing protocols
HA Khorasgani, HK Maji, H Mehta, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2852-2857, 2021
2*2021
Explicit rate-1 non-malleable codes for local tampering
D Gupta, HK Maji, M Wang
Annual International Cryptology Conference, 435-466, 2019
22019
On the Efficiency of Cryptographic Constructions
M Wang
Purdue University Graduate School, 2021
12021
Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
2022
IBE with Incompressible Master Secret and Small Identity Secrets
N Döttling, S Garg, S Sekar, M Wang
Cryptology ePrint Archive, 2022
2022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–14