- Shparlinski; Wang; Xing (2001). Lam, Kwok-Yan; Shparlinski, Igor; Wang,
Huaxiong; Xing,
Chaoping (eds.).
Cryptography and Com****tional
Number Theory. Progress...
-
requires |journal= (help) Guo, Jian; Ling, San; Rechberger, Christian; Wang,
Huaxiong (2010). "Advanced Meet-in-the-Middle
Preimage Attacks:
First Results on...
- Krystian; Pieprzyk, Josef; Steinfeld, Ron; Guo, Jian; Ling, San; Wang,
Huaxiong (2008). "Cryptanalysis of LASH" (PDF). Fast
Software Encryption. Lecture...
-
Standardized Hash Function. SAC 2014. Jian Guo; San Ling;
Christian Rechberger;
Huaxiong Wang (2010-12-06).
Advanced Meet-in-the-Middle
Preimage Attacks: First...
- ISBN 978-3-642-10366-7. ISSN 0302-9743. Jian Guo; San Ling;
Christian Rechberger &
Huaxiong Wang (2010). "Advanced Meet-in-the-Middle
Preimage Attacks:
First Results...
- Specifically, four
elements had
order 2. A 2011
attack by
Hongjun Wu,
Huaxiong Wang and
Phuong Ha Nguyen, also
using linear cryptanalysis,
breaks 11 rounds...
-
Signatures from
Quaternions and Isogenies" (PDF). In Moriai, Shiho; Wang,
Huaxiong (eds.).
Advances in
Cryptology –
ASIACRYPT 2020.
Lecture Notes in Computer...
-
different names,
including mò (貘,
ancient Chinese name for
giant panda),
huāxióng (花熊; "spotted bear") and zhúxióng (竹熊; "bamboo bear"). The most po****r...
-
classical and
Quantum Algorithms for Subset-Sum". In Moriai, Shiho; Wang,
Huaxiong (eds.).
Advances in
Cryptology -
ASIACRYPT 2020.
Lecture Notes in Computer...
- Jinhua; Lin, Shih-Ya; Chen, Xin; Sun, Hung-Min; Chen, Yeh-Cheng; Wang,
Huaxiong (2020). "A Blockchain-Based
Application System for
Product Anti-Counterfeiting"...