Mingsheng Wang

Orcid: 0009-0008-2410-5073

According to our database1, Mingsheng Wang authored at least 91 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Shorter ZK-SNARKs from square span programs over ideal lattices.
Cybersecur., December, 2024

A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments.
Wirel. Networks, August, 2024

YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation.
IEEE Trans. Inf. Theory, May, 2024

A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

An iterative correction method for practically LPN solving.
Inf. Sci., 2024

Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.
IACR Cryptol. ePrint Arch., 2024

A dead-time compensation method for motor drive inverters based on nonlinear observer.
Comput. Electr. Eng., 2024

Deep LLL on Module Lattices.
Proceedings of the Information Security - 27th International Conference, 2024

Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

LightPIR: Single-Server PIR via FHE without Gaussian Noise.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Full-round impossible differential attack on shadow block cipher.
Cybersecur., December, 2023

On Model-Based Transfer Learning Method for the Detection of Inter-Turn Short Circuit Faults in PMSM.
Sensors, November, 2023

Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Hydra: An Efficient Asynchronous DAG-Based BFT Protocol.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Multiscale Kernel-Based Residual CNN for Estimation of Inter-Turn Short Circuit Fault in PMSM.
Sensors, 2022

On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022

Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022

Observations on the Security of COMET.
Comput. J., 2022

Blockchain-based Fair and Decentralized Data Trading Model.
Comput. J., 2022

New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022

New Genetic Operators for Developing S-Boxes With Low Boomerang Uniformity.
IEEE Access, 2022

A Faster Blockchain Sharding Protocol for Decentralized Ledger.
Proceedings of the IEEE International Conference on Trust, 2022

2021
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers.
IEEE Trans. Inf. Theory, 2021

An Efficient Post-Quantum PKE from RLWR with Simple Security Proof.
Proceedings of the Security and Privacy in Communication Networks, 2021

Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

SEPoW: Secure and Efficient Proof of Work Sidechains.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
On the Accuracy of Fault Diagnosis for Rolling Element Bearings Using Improved DFA and Multi-Sensor Data Fusion Method.
Sensors, 2020

Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020

Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
On the Generalization of Butterfly Structure.
IACR Trans. Symmetric Cryptol., 2018

Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Optimal Differential Trails in SIMON-like Ciphers.
IACR Trans. Symmetric Cryptol., 2017

The Security of SIMON-like Ciphers Against Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2017

Designing Proof of Transaction Puzzles for Cryptocurrency.
IACR Cryptol. ePrint Arch., 2017

Hybrid gradient smoothing technique with discrete shear gap method for shell structures.
Comput. Math. Appl., 2017

CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Compact Inner Product Encryption from LWE.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing.
Secur. Commun. Networks, 2016

A new framework for computing Gröbner bases.
Math. Comput., 2016

On the CLD Attack to a Statistical Model of a Key Stream Generator.
Int. J. Netw. Secur., 2016

Faster Algorithms for Solving LPN.
IACR Cryptol. ePrint Arch., 2016

On the Construction of Lightweight Circulant Involutory MDS Matrices.
IACR Cryptol. ePrint Arch., 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015

Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE.
IACR Cryptol. ePrint Arch., 2015

Two Generic Methods of Analyzing Stream Ciphers.
Proceedings of the Information Security - 18th International Conference, 2015

2014
A matrix approach for constructing quadratic APN functions.
Des. Codes Cryptogr., 2014

Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).
Des. Codes Cryptogr., 2014

Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security - 17th International Conference, 2014

A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Constructing S-boxes for Lightweight Cryptography with Feistel Structure.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
The Nonexistence of Permutations EA-Equivalent to Certain AB Functions.
IEEE Trans. Inf. Theory, 2013

Constructing Differentially 4-uniform Permutations over GF(2<sup>2k</sup>) from the Inverse Function Revisited.
IACR Cryptol. ePrint Arch., 2013

Permutation polynomials and their differential properties over residue class rings.
Discret. Appl. Math., 2013

Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Proceedings of the Information Security, 16th International Conference, 2013

Integral Attacks on Reduced-Round PRESENT.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions.
IACR Cryptol. ePrint Arch., 2012

Automatic Search of Truncated Impossible Differentials and Applications.
IACR Cryptol. ePrint Arch., 2012

Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.
Proceedings of the Progress in Cryptology, 2012

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Constructing differential 4-uniform permutations from know ones.
IACR Cryptol. ePrint Arch., 2011

Security Evaluation against Differential Cryptanalysis for Block Cipher Structures.
IACR Cryptol. ePrint Arch., 2011

Constructing differentially 4-uniform permutations over 2<sup>2m</sup> from quadratic APN permutations over 2<sup>2m+1</sup>.
IACR Cryptol. ePrint Arch., 2011

On EA-equivalence of certain permutations to power mappings.
Des. Codes Cryptogr., 2011

On General Factorizations for <i>n</i>-D Polynomial Matrices.
Circuits Syst. Signal Process., 2011

Permutation polynomials EA-equivalent to the inverse function over GF (2<sup><i>n</i></sup>).
Cryptogr. Commun., 2011

2010
Notes on factor prime factorizations for <i>n</i>-D polynomial matrices.
Multidimens. Syst. Signal Process., 2010

A Flaw in The Internal State Recovery Attack on ALPHA-MAC.
IACR Cryptol. ePrint Arch., 2010

On permutation polynomials EA-equivalent to the inverse function over GF(2<sup>n</sup>).
IACR Cryptol. ePrint Arch., 2010

A new algorithm for computing Groebner bases.
IACR Cryptol. ePrint Arch., 2010

2009
Primary decomposition of zero-dimensional ideals over finite fields.
Math. Comput., 2009

A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure.
IACR Cryptol. ePrint Arch., 2009

A Forecast Model of Agricultural and Livestock Products Price.
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009

2008
Remarks on n -D Polynomial Matrix Factorization Problems.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation.
IACR Cryptol. ePrint Arch., 2008

Factorization problems on n-D polynomial matrices (abstract only).
ACM Commun. Comput. Algebra, 2008

2007
On Factor Prime Factorizations for n-D Polynomial Matrices.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

Parameter choices on Guruswami-Sudan algorithm for polynomial reconstruction.
Finite Fields Their Appl., 2007

2005
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2005

2003
The term orderings which are compatible with composition II.
J. Symb. Comput., 2003

A Verifiable Secret Sharing Scheme with Statistical zero-knowledge.
IACR Cryptol. ePrint Arch., 2003

2001
Remarks on Gröbner basis for ideals under composition.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

The membership problem for ideals of binomial skew polynomial rings.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001

Threshold Undeniable RSA Signature Scheme.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...