Guangwu Xu

Orcid: 0000-0001-6200-3264

According to our database1, Guangwu Xu authored at least 61 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform.
IACR Cryptol. ePrint Arch., 2024

An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic.
IACR Cryptol. ePrint Arch., 2024

AegisFL: Efficient and Flexible Privacy-Preserving Byzantine-Robust Cross-silo Federated Learning.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2023

Improvements of Homomorphic Secure Evaluation of Inverse Square Root.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited.
IEEE Trans. Inf. Theory, 2022

Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure.
IACR Cryptol. ePrint Arch., 2022

Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack.
IACR Cryptol. ePrint Arch., 2022

On the Dual Attack of LWE Schemes in the Presence of Hints.
IACR Cryptol. ePrint Arch., 2022

Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022

More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited.
IACR Cryptol. ePrint Arch., 2021

Error estimation of practical convolution discrete Gaussian sampling with rejection sampling.
Sci. China Inf. Sci., 2021

Discrete Gaussian measures and new bounds of the smoothing parameter for lattices.
Appl. Algebra Eng. Commun. Comput., 2021

2020
On the Family of Elliptic Curves y<sup>2</sup> x<sup>3</sup>+b/픽<sub>p</sub>.
IACR Cryptol. ePrint Arch., 2020

2019
New Distinguisher on Reduced-Round Keccak Sponge Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.
IACR Cryptol. ePrint Arch., 2019

2018
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas.
IACR Cryptol. ePrint Arch., 2018

Orthogonalized lattice enumeration for solving SVP.
Sci. China Inf. Sci., 2018

2017
Provably Secure NTRUEncrypt over More General Cyclotomic Rings.
IACR Cryptol. ePrint Arch., 2017

Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas.
IACR Cryptol. ePrint Arch., 2017

A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves.
IACR Cryptol. ePrint Arch., 2017

TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Provably Secure NTRU Instances over Prime Cyclotomic Rings.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves.
IEEE Trans. Computers, 2016

Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2016

On the Algorithmic Significance and Analysis of the Method of DaYan Deriving One.
CoRR, 2016

Dynamics of linear systems over finite commutative rings.
Appl. Algebra Eng. Commun. Comput., 2016

A Survey on Trust Evaluation in Mobile Ad Hoc Networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
Compressed Sensing Matrices From Fourier Matrices.
IEEE Trans. Inf. Theory, 2015

2014
A note on BDD problems with λ<sub>2</sub>-gap.
Inf. Process. Lett., 2014

On the Optimal Pre-Computation of Window τNAF for Koblitz Curves.
IACR Cryptol. ePrint Arch., 2014

On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors.
CoRR, 2014

A polynomial time algorithm for GapCVPP in l 1 norm.
Sci. China Inf. Sci., 2014

2013
On the ℓ<sub>1</sub>-Norm Invariant Convex k-Sparse Decomposition of Signals
CoRR, 2013

2012
Multi-slice and multi-frame image reconstruction by predictive compressed sensing.
Proceedings of the Medical Imaging 2012: Image Processing, 2012

2011
Shortest Lattice Vectors in the Presence of Gaps.
IACR Cryptol. ePrint Arch., 2011

2010
Shifting inequality and recovery of sparse signals.
IEEE Trans. Signal Process., 2010

New bounds for restricted isometry constants.
IEEE Trans. Inf. Theory, 2010

Stable recovery of sparse signals and an oracle inequality.
IEEE Trans. Inf. Theory, 2010

Relations between $\beta$ and $\delta$ for QP and LP in Compressed Sensing Computations
CoRR, 2010

On an attack on RSA with small CRT-exponents.
Sci. China Inf. Sci., 2010

2009
On recovery of sparse signals via l1 minimization.
IEEE Trans. Inf. Theory, 2009

Fast arithmetics using Chinese remaindering.
Inf. Process. Lett., 2009

Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES.
IACR Cryptol. ePrint Arch., 2009

On stars and Steiner stars.
Discret. Optim., 2009

On stars and Steiner stars: II.
Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2009

Toeplitz Random Encoding MR Imaging Using Compressed Sensing.
Proceedings of the 2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, Boston, MA, USA, June 28, 2009

New Birthday Attacks on Some MACs Based on Block Ciphers.
Proceedings of the Advances in Cryptology, 2009

Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs.
IACR Cryptol. ePrint Arch., 2008

On Recovery of Sparse Signals via ℓ<sub>1</sub> Minimization
CoRR, 2008

Security and Authentication for Networked Storage.
Proceedings of the SECRYPT 2008, 2008

2007
On a query algorithm for a divisibility problem.
ACM Commun. Comput. Algebra, 2007

2006
Refinements of Miller's algorithm for computing the Weil/Tate pairing.
J. Algorithms, 2006

2005
Efficient algorithms for Koblitz curves over fields of characteristic three.
J. Discrete Algorithms, 2005

A note on window <i>tau</i>-NAF algorithm.
Inf. Process. Lett., 2005

Efficient reduction of 1 out of n oblivious transfers in random oracle model.
IACR Cryptol. ePrint Arch., 2005

2001
Virtual spectrophotometric measurements for biologically and physically based rendering.
Vis. Comput., 2001


  Loading...