Mingsheng Wang
Orcid: 0009-0008-2410-5073
According to our database1,
Mingsheng Wang
authored at least 91 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments.
Wirel. Networks, August, 2024
IEEE Trans. Inf. Theory, May, 2024
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
A dead-time compensation method for motor drive inverters based on nonlinear observer.
Comput. Electr. Eng., 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Cybersecur., December, 2023
On Model-Based Transfer Learning Method for the Detection of Inter-Turn Short Circuit Faults in PMSM.
Sensors, November, 2023
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Multiscale Kernel-Based Residual CNN for Estimation of Inter-Turn Short Circuit Fault in PMSM.
Sensors, 2022
On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
2021
IEEE Trans. Inf. Theory, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
On the Accuracy of Fault Diagnosis for Rolling Element Bearings Using Improved DFA and Multi-Sensor Data Fusion Method.
Sensors, 2020
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Hybrid gradient smoothing technique with discrete shear gap method for shell structures.
Comput. Math. Appl., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Secur. Commun. Networks, 2016
Int. J. Netw. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security - 18th International Conference, 2015
2014
Des. Codes Cryptogr., 2014
Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).
Des. Codes Cryptogr., 2014
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IEEE Trans. Inf. Theory, 2013
Constructing Differentially 4-uniform Permutations over GF(2<sup>2k</sup>) from the Inverse Function Revisited.
IACR Cryptol. ePrint Arch., 2013
Discret. Appl. Math., 2013
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.
Proceedings of the Progress in Cryptology, 2012
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Constructing differentially 4-uniform permutations over 2<sup>2m</sup> from quadratic APN permutations over 2<sup>2m+1</sup>.
IACR Cryptol. ePrint Arch., 2011
Des. Codes Cryptogr., 2011
Circuits Syst. Signal Process., 2011
Permutation polynomials EA-equivalent to the inverse function over GF (2<sup><i>n</i></sup>).
Cryptogr. Commun., 2011
2010
Multidimens. Syst. Signal Process., 2010
IACR Cryptol. ePrint Arch., 2010
On permutation polynomials EA-equivalent to the inverse function over GF(2<sup>n</sup>).
IACR Cryptol. ePrint Arch., 2010
2009
Math. Comput., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009
2008
IEEE Trans. Circuits Syst. II Express Briefs, 2008
IACR Cryptol. ePrint Arch., 2008
ACM Commun. Comput. Algebra, 2008
2007
IEEE Trans. Circuits Syst. I Regul. Pap., 2007
Finite Fields Their Appl., 2007
2005
Proceedings of the Information Security Practice and Experience, 2005
2003
IACR Cryptol. ePrint Arch., 2003
2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000