Publications

 

 

 

Book

1.    San Ling, Huaxiong Wang & Chaoping Xing, Algebraic Curves in Cryptography, CRC Press, 2013, 320 pp.

Edited Books

1.    Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang & RajanShankaran, Theory and Practice of Cryptography Solutions for Secure Information Systems, IGI, 2013.

2.    Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang & Chaoping Xing, Coding and Cryptology - Proceedings of the Third International Workshop, IWCC 2011 (Qingdao, China), Lecture Notes in Computer Science 6639, Springer, 2011, viii + 293 pp.

3.    Yeow Meng Chee, Chao Li, Sang Ling, Huaxiong Wang & Chaoping Xing, Coding and Cryptology, Proceedings of the Second International Workshop, IWCC 2009, (Zhang Jia Jie, China), Lecture Notes in Computer Science 5557, Springer, 2009, viii + 273 pp.

4.    Yongqing Li, San Ling, Harald Niederreiter, Huaxiong Wang, Chaoping Xing & Shengyuan Zhang, Coding and Cryptology, Proceedings of the First International Workshop (Wuyi Mountain, Fujian, China), Series on Coding Theory and Cryptology - Vol. 4, World Scientific, 2008.

5.    Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang & Chaoping Xing, Cryptology and Net- work Security, Proceedings of 6th International Conference, CANS 2007, Lecture Notes in Computer Science, Vol. 4856, Springer 2007.

6.    Yvo Desmedt, Huaxiong Wang, Yi Mu & Yongqing Li, Cryptology and Network Security (edited), Proceedings of 4th International Conference, CANS 2005, Lecture Notes in Computer Science Vol. 3810, Springer 2005.

7.    Huaxiong Wang, Josef Pieprzyk & Vijay Varadharajan, Information Security and Privacy (edited), Proceedings of 9th Australasian Conference, ACISP'04, Lecture Notes in Computer Science, Vol. 3108, 2004.

8.    Kwok Yan Lam, Igor Shparlinski, Huaxiong Wang & Chaoping Xing, Cryptography and Computational Number Theory (edited), Proceedings of Workshop of Cryptography and Computational Number Theory, Birkhauser, 2001.

Book Chapters

1.    San Ling, Huaxiong Wang & Chaoping Xing, Cover-free Families and Their Applications, in Book Security in Distributed and Networking Systems, World Scientific, 2007.

2.    Harald Niederreiter, Huaxiong Wang & Chaoping Xing, Function Fields over Finite Fields and Their Applications to Cryptography, in Book Topics in Geometry, Coding Theory and Cryptography, by Aenaldo Garcia and Henning Stichtenoth (editors), Springer, 59 - 104, 2007.

Journal Papers

1.    Zuling Chang, Martianus Frederic Ezerman, San Ling, & Huaxiong Wang, Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials, Cryptography and Communications, Accepted: 26 February 2017.

2.    Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu & Cheng Huang, PAVS: A New Privacy- Preserving Data Aggregation Scheme for Vehicle Sensing Systems, Sensors, 2017, 17(3), 1- 18 (2017).

3.    Hyung Tae Lee, San Ling, Jae Hong Seo & Huaxiong Wang, Semi-generic construction of public key encryption and identity-based encryption with equality test, Inf. Sci. 373: 419-440 (2016).

4.    Hyung Tae Lee, San Ling, Jae Hong Seo, & Huaxiong Wang, CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test, The Computer Journal, 59(11): 1689-1694 (2016).

5.    Myungsun Kim, Hyung Tae Lee, San Ling, & Huaxiong Wang, On the Efficiency of FHE-based Private Queries, Accepted to IEEE Transactions on Dependable and Secure Computing, May 2016.

6.    Hyung Tae Lee, San Ling, & Huaxiong Wang, Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption, Theoretical Computer Science, 640: 104-114 (2016).

7.    Shantian Cheng, Khoa Nguyen, & Huaxiong Wang, Policy-based signature scheme from lattices, Designs, Codes and Cryptography, 81(1): 43-74 (2016).

8.    Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen, Tsu-Yang Wu, Chia-Hsien Lin & Huaxiong Wang, A Provable Authenticated Group Key Agreement Protocol for Mobile Environment, Information Sciences, Vol. 321: 224-237 (2015).

9.    Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk & Huaxiong Wang, The resistance of PRESENT-80 against related-key differential attacks, Cryptography and Communications 6(3): 171-187 (2014).

10. Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Hoeteck Wee, Shorter identity-based encryption via asymmetric pairings, Designs, Codes and Cryptography, 73(3): 911-947 (2014).

11. Jie Chen, Hoon Wei Lim, San Ling, Le Su & Huaxiong Wang, Spatial encryption supporting non-monotone access structure, Designs, Codes and Cryptography, 73(3): 731-746 (2014).

12. Yeow Meng Chee, San Ling, Huaxiong Wang & Liangfeng Zhang, Upper bounds on matching families in Z_{pq}^n. IEEE Transactions on Information Theory, Vol. 58, No. 8 (2013), 5231 - 5139. - 1782.

13. San Ling, Igor Shparlinski & Huaxiong Wang, On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function, Mathematics of Computation, 83(289) (2014)

14. Xun Yi, San Ling & Huaxiong Wang, Efficient two-server password-only authenticated key exchange, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9 (2013), 1173 - 1782.

15. Jie Chen, Hoon Wei Lim, San Ling & Huaxiong Wang, The relation and transformation between hierarchical inner product encryption and spatial encryption, Designs, Codes and Cryptography 71(2): 347-364 (2014).

16. Hoon Wei Lim, Florian Kerschbaum & Huaxiong Wang. Workflow Signatures for Business Process Compliance, IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5 (2012), 756-769.

17. Romar dela Cruz & Huaxiong Wang, Cheating-immune secret sharing schemes from codes and cumulative arrays, Cryptography and Communications, vol. 5, no. 1 (2013), 67-83.

18. Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk & Huaxiong Wang, Cryptanalysis of the Convex Hull Click Human Identification Protocol, International Journal of Information Security, vol. 12, no.2 (2013), 83-96.

19. Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang & Liangfeng Zhang, Query-Efficient Locally Decodable Codes of Subexponential Length, Computational Complexity, Vol. 22, No. 1 (2013), 159 - 189.

20. Amos Biemel, Yeow Meng Chee, Huaxiong Wang & Liangfeng Zhang, Communication-efficient distributed oblivious transfer, Journal of Computer and System Sciences, vol. 78, no. 4 (2012), 1142-1157.

21. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang & Andrew Chi-Chih Yao, Graph Coloring Applied to Secure Computation in Non-Abelian Groups, Journal of Cryptology, vol. 25, no. 4 (2012), 557-600.

22. Yeow Meng Chee, Huaxiong Wang & Liangfeng Zhang, On Bringer-Chabanne EPIR protocol for polynomial evaluation, Journal of Mathematical Cryptology, vol. 5, no. 34 (2012), 277301.

23. Zhifang Zhang, Yeow Meng Chee, San Ling, Mulan Liu & Huaxiong Wang, Threshold changeable secret sharing schemes revisited, Theoretical Computer Science, vol. 418 (2012), 106115.

24. San Ling, Igor Shparlinski, Ron Steinfeld & Huaxiong Wang, On the Modular Inversion Hidden Number Problem, Journal of Symbolic Computation, Vol. 47 (2012), 358-367.

25. Christophe Tartary, Huaxiong Wang & San Ling, Authentication of Digital Streams, IEEE Trans. on Info. Theory, vol. 57, no. 9 (2011), 6285 - 6303.

26. Christophe Tartary, Huaxiong Wang & Yun Zhang, An Efficient and Information Theoretic Secure Rational Secret Sharing Scheme Based on Bivariate Polynomials, International Journal of Foundations of Computer Science (Special Issue on Cryptography), vol. 22, no. 6 (2011), 1395 - 1416.

27. Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk & Huaxiong Wang, On the Hardness of the Sum of k Mins Problem, The Computer Journal, vol. 54, no. 10 (2011), 1652-1660.

28. Josef Pieprzyk, Huaxiong Wang & Xianmo Zhang, Mobius Transforms, Coincident Boolean Functions and Noncoincidence Property of Boolean Functions, International Journal of Computer Mathematics, Vol. 88, No. 7 (2011), 1398 - 1416.

29. A. Poschmann, A. Moradi, K. Khoo, C.-W. Lim, H. Wang & S. Ling, Side-Channel Resistant Crypto for less than 2,300 GE, Journal of Cryptology, Vol. 24, No. 2 (2011), 322 - 345.

30. Hung-Min Sun, Huaxiong Wang, Bying-He Ku & Josef Pieprzyk, Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time, SIAM J. on Discrete Math, Vol. 24, No. 2 (2010), pp. 617 - 638.

31. Yvo Desmedt, Niels Duif, Henk van Tilborg & Huaxiong Wang, Bounds and constructions for key distribution schemes, Advances in Mathematics of Communications, Vol. 3, No. 3(2009), 273 - 293.

32. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk & Xian-Mo Zhang, Unconditionally Secure Disjointness Tests for Private Datasets, Int. J. Applied Cryptography, Vol.1, No.3 (2009), 225 -235.

33. Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang & Josef Pieprzyk, Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing, IET Information Security, vol. 2, no. 4 (2008), 99 - 107.

34. Guomin Yang, Duncan S. Wong, Huaxiong Wang & Xiaotie Deng, Two-factor mutual authentication based on smart cards and passwords, Journal of Computer and System Sciences, Vol. 74, No. 7 (2008), 1160 - 1172.

35. Jin Yuan, Cunsheng Ding, Huaxiong Wang & Josef Pieprzyk, Permutation polynomials of the form (x^p-x +\delta)^s + L(x), Finite Fields and Their Applications, Vol. 14, No. 2 (2008), 482-493.

36. Yan Wang, Duncan S Wong & Huaxiong Wang, Employ A Mobile Agent for Making A Payment, Mobile Information Systems: An International Journal, Vol. 4, No. 1 (2008), 51 - 68.

37. Vijayakrishnan Pasupathinathan, Josef Pieprzyk & Huaxiong Wang, Security Analysis of Australian and E.U. E-passport Implementation, Journal of Research and Practice in Information Technology, Vol. 40, No. 3 (2008), 187 - 205.

38. Huaxiong Wang & Duncan SWong, On Secret Reconstruction in Secret Sharing Schemes, IEEE Trans. on Info. Theory, Vol. 54, No. 1 (2008), 473 - 480.

39. Christophe Tartary, Huaxiong Wang & Josef Pieprzyk, A Coding Approach to the Multicast Stream Authentication Problem, International Journal of Information Security, Vol. 7 (2008), 265-283

40. Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes, IEEE Trans. on Info. Theory, Vol. 53, No. 7 (2007), 2542-2559.

41. Christophe Tartary & Huaxiong Wang, Efficient Multicast Stream Authentication for Fully Adversarial Network Model, International Journal of Security and Network (Special Issue on Cryptography in Networks), Vol. 2, No.3/4(2007), 175 - 191.

42. Henk van Tilborg, Josef Pieprzyk, Ron Steinfeld & Huaxiong Wang, New constructions of anonymous membership broadcasting schemes, Advances in Mathematics of Communications, 1:1 (2007), 29 - 44.

43. Reihaneh Safavi-Naini, Huaxiong Wang & Duncan S Wong, Resilient LKH: Secure Multicast Key Distribution Schemes, International Journal of Foundations of Computer Science, 17:5 (2006), 1205-1221.

44. Reihaneh Safavi-Naini & Huaxiong Wang, Secret Sharing Schemes with Partial Broadcast Channels, Designs, Codes and Cryptography, 41:1 (2006), 5 - 22.

45. Saolung Long, Josef Pieprzyk, Huaxiong Wang & Duncan S. Wong, Generalised Cumulative Arrays in Secret Sharing, Designs, Codes and Cryptography, 40 (2006), 191 - 209.

46. Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, Lattice-Based Threshold-Changeability for Standard CRT Secret-Sharing Schemes, Finite Fields and Their Applications, 12:4 (2006), 653 - 680.

47. Keith Martin, Reihaneh Safavi-Naini, Huaxiong Wang & Peter Wild, Distributing the encryption and decryption of a block cipher, Designs, Codes and Cryptography, 36 (2005), 263-287.

48. Huaxiong & Josef Pieprzyk, Shared generation of pseudo-random functions, Journal of Complexity, 20 (2004), 458 - 472.

49. Huaxiong Wang, Chaoping Xing & Reihaneh Safavi-Naini, Linear Authentication Codes: Bounds and Constructions, IEEE Trans. on Info. Theory, Vol. 49, No. 4 (2003), 866-872.

50. Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Shared generation of authenticators, International Journal of Computer Mathematics, Vol. 79, No. 12 (2002), 1285-1301.

51. Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, Fail-stop signature for long messages, Journal of Information Science and Engineering, Vol. 17 (2001), 879-898.

52. Reihaneh Safavi-Naini & Huaxiong Wang, Efficient Authentication for Group Communication, Theoretical Computer Science, Vol. 269, No. 1/2 (2001), 1-21.

53. Huaxiong Wang & Chaoping Xing, Explicit Constructions of Perfect Hash Families from Algebraic Curve over Finite Fields, Journal of Combinatorial Theory, Series A, Vol. 93 (2001), 112-124.

54. Yvo Desmedt, Reihaneh Safavi-Naini, Lynn Batten, Chris Charnes & Josef Pieprzyk, Broadcast Antijamming Systems, Computer Networks, Vol. 35, No. 2-3 (2001), 223-236.

55. Chaoping Xing, Huaxiong Wang & Kwok Yan Lam, Constructions of Authentication Codes from Algebraic Curves over Finite Fields, IEEE Trans. on Info. Theory, Vol. 46 (2000), 886-892.

56. Keith M. Martin, Reihaneh Safavi-Naini & Huaxiong Wang Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures, The Computer Journal, Vol. 42, No.8 (1999), 638-649.

57. Keith M. Martin, Joesf Pieprzyk, Reihaneh Safavi-Naini & Huaxiong Wang, Changing thresholds in the absence of secure channels, Australian Computer Journal, Vol. 31, No. 2 (1999), 34-43.

58. Reihaneh Safavi-Naini & Huaxiong Wang, Multireceiver Authentication Codes: Model, Bounds, Constructions and Extensions, Information and Computation, Vol. 151, No. 1/2 (1999), 148-172.

59. Huaxiong Wang, On Syntactic Nuclei of Rational Languages, Information Processing Letters, Vol. 67, No. 5 (1998), 221-226.

60. Huaxiong Wang, On Rational Languages and Rational Series, Theoretical Computer Science, Vol. 205, No. 1-2 (1998), 329-336.

61. Huaxiong Wang On Characters of Semirings, Houston J. Math. Vol. 23, No. 3 (1997), 391-405.

62. Jonathan Golan & Huaxiong Wang On Embedding in Complete Semirings, Communications in Algebra, Vol. 24, No. 9 (1996), 2945-2962.

63. Huaxiong Wang Injective Hulls of Semimodules over Additively-idempotent Semirings, Semigroup Forum, Vol. 48 (1994), 377-379.

64. C. S. Hoo & Huaxiong Wang, Extensions of BCI, BCK and MV-algebras, Southeast Asian Bull. Math., Vol. 18 (1994), 47-53.

65. Michihiro Takahashi, Injective Semimodules over 2-semirings, Kobe J. Math., Vol. 10 (1993), 57-70.

66. Zhaomu Chen & Huaxiong Wang, Closed Ideals and Congruences on BCI algebras, Kobe J. Math., Vol. 8 (1991), 1-9.

67. Zhaomu Chen & Huaxiong Wang, On Simple BCI Algebras, Math. Japon., Vol. 36, No. 4 (1991), 627-633.

68. Zhaomu Chen & Huaxiong Wang, On Ideals in BCI Algebras, Math. Japon., Vol. 36, No. 3 (1991), 497-501.

69. Huaxiong Wang, Injective in BCI Algebras, Math. Japon., Vol. 35, No. 4 (1990), 797-798.

70. Huaxiong Wang & Michihiro Takahashi, On Epimorphisms of Semimodules, Kobe J. Math., Vol. 6 (1989), 287-289.

71. Zhaomu Chen & Huaxiong Wang, Some Universal Properties of BCI-Algebras, Kobe J. Math., Vol. 6, No. 1 (1989), 43-48.

72. Huaxiong Wang, A Note on Endomorphism Semirings of Semimodules, Kobe J. Math., Vol. 5, No. 1 (1988), 155-160.

Conference Papers

1.    Huaxiong Wang, Combinatorics in Information-Theoretic Cryptography (invited talk), Asiacrypt 2017, to appear.

2.    Benoit Libert, San Ling, Khoa Nguyen & Huaxiong Wang, Zero-Knowledge Arguments for Lattice- Based PRFs and Applications to E-Cash, Asiacrypt 2017, to appear.

3.    Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, & Huaxiong Wang, Adaptive Oblivious Transfer with Access Control from Lattice Assumptions, Asiacrypt, 2017, to appear

4.    Khoa Nguyen, Benjamin Hong Meng Tan & Huaxiong Wang, Zero-Knowledge Password Policy Check from Lattices, ISC 2017, to appear.

5.    San Ling, Khoa Nguyen, Huaxiong Wang & Juanyang Zhang, Revocable Predicate Encryption from Lattices , ProvSec 2017, to appear.

6.    San Ling, Khoa Nguyen, Huaxiong Wang & Yanhong Xu, Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease, ACNS 2017, Lecture Notes in Computer Science (10355), 293-312.

7.    Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, & Huaxiong Wang, Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions, Asiacrypt 2016, Lecture Notes in Computer Science (10032) 373-403.

8.    Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, &Huaxiong Wang, Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption, Asiacrypt 2016, Lecture Notes in Computer Science (10032) 101-131.

9.    Khoa Nguyen, Huaxiong Wang & Juanyang Zhang Server-Aided Revocable Identity-Based Encryption from Lattices, CANS 2016, Lecture Notes in Computer Science (10052), 107-123.

10. Yi Deng, Juan A. Garay, San Ling, Huaxiong Wang, & Moti Yung, On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs, SCN 2016, Lecture Notes in Computer Science (9841)237-253.

11. Zuling Chang, Martianus Frederic Ezerman, San Ling, & Huaxiong Wang. The Cyclic Structure of LFSR with Arbitrary Characteristic Polynomial, Accepted Sequences and Their Applications (SETA), 2016.

12. Changlu Lin, Fucai Luo, Huaxiong Wang & Yan Zhu, A Provable Data Possession Scheme with Data Hierarchy in Cloud, Inscrypt 2015, Lecture Notes in Computer Science, 9589(2015), 301 - 321.

13. Benoit Libert, San Ling, Khoa Nguyen & Huaxiong Wang, Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors, Eurocrypt 2016, Lecture Notes in Computer Science 9666 (2016), 1- 31.

14. Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen & Huaxiong Wang, A Provably Secure Group Signature Scheme from Code-Based Assumptions, ASIACRYPT 2015 Lecture Notes in Computer Science, 9425(2015), 260-285.

15. San Ling, Khoa Nguyen & Huaxiong Wang, Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based, Public Key Cryptography 2015, Lecture Notes in Computer Science 9020(2015), 427-449.

16. Christoph Bsch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel & Willem Jonker, Distributed Searchable Symmetric Encryption, in Proceedings of the 12th IEEE International Conference on Privacy, Security and Trust (PST), pages 330-337. IEEE Computer Society, Jul 2014.

17. Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk & Huaxiong Wang, Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, ASIACRYPT 2014, Lecture Notes in Computer Science, 8873 (2014), 141-157

18. Adeline Langlois, San Ling, Khoa Nguyen & Huaxiong Wang: Lattice-Based Group Signature Scheme with Verifier-Local Revocation. Public Key Cryptography 2014, Lecture Notes in Computer Science, 8383 (2014), 345-361

19. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling & Huaxiong Wang, Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures, CT-RSA 2013, Lecture Notes in Computer Science, 7779 (2013), 50-67.

20. San Ling, Khoa Nguyen, Damien Stehle & Huaxiong Wang, Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications, Public Key Cryptography 2013, Lecture Notes in Computer Science, (2013), 107-124, Springer.

21. Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang & San Ling, Differential Attacks against Stream Cipher ZUC, ASIACRYPT 2012, Lecture Notes in Computer Science, 7658(2012), 262-277, Springer.

22. Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Khoa Nguyen, Revocable identity-based encryption from lattices, In Proceedings of the 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in Computer Science, 7372(2012), 390-403, Springer.

23. Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang & Hoeteck Wee, Compact IBE and signatures via asymmetric pairings, In: Pairings 2012, Lecture Notes in Computer Science, 7708(2012), 122-140,Springer.

24. Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary & Huaxiong Wang, NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model, PKC 2012, Lecture Notes in Computer Science, 7293(2012), 353-371, Springer.

25. Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk & Huaxiong Wang, On the (In)Security of IDEA in Various Hashing Modes, FSE 2012, Lecture Notes in Computer Science, 7549 (2012), 163-179, Springer.

26. Zhao Hui Tang, Hoon Wei Lim & Huaxiong Wang, Revisiting a Secret Sharing Approach to Network Codes, ProvSec 2012, Lecture Notes in Computer Science, 7496(2012), 300-317, Springer.

27. Phuong Ha Nguyen, Matthew J. B. Robshaw & Huaxiong Wang, On Related-Key Attacks and KASUMI: The Case of A5/3, INDOCRYPT 2011, Lecture Notes in Computer Science, 7107(2011), 146-159, Springer.

28. Yeow Meng Chee, Huaxiong Wang & Liangfeng Zhang, Oblivious Transfer and n-Variate Linear Function Evaluation, Cocoon'2011, 17th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, 6842 (2011), 627 - 637, Springer.

29. Lei Wei, Christian Rechberger, Jian Guo, Honjun Wu, Huaxiong Wang & San Ling, Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) , 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), 433 - 438, Springer.

30. Yun Zhang, Christophe Tartary & Huaxiong Wang, Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem, 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), 259 - 275, Springer.

31. Phuong Ha Nguyen, Hongjun Wu & Huaxiong Wang, Improving the Time Complexity of the Algorithm 2 of the Multidimensional Linear Cryptanalysis, 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Vo. 6812 (2011), 61 - 74, Springer.

32. Amir Moradi, Axel Poschmann, San Ling, Christof Paar & Huaxiong Wang, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Eurocrypt 2011, Lecture Notes in Computer Science, Vol. 6632 (2011), 69 - 88, Springer.

33. Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan & Huaxiong Wang, Authenticated Key Exchange under Bad Randomness, Financial Cryptography and Data Security 2011, Lecture Notes in Computer Science, Springer.

34. Jian Guo, San Ling, Christian Rechberger & Huaxiong Wang, Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2, Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science, vol. 6477 (2010), 56 - 75, Springer.

35. Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk & Huaxiong Wang, Cryptanalysis of the Convex Hull Click Human Identification Protocol, 13th Information Security Conference (ISC 2010), Lecture Notes in Computer Science, vol. 6531 (2011), 24 - 30, Springer.

36. Axel Poschmann, Huaxiong Wang & San Ling, 256 bit Standardized Crypto for 650 GE GOST Revisite, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), Lecture Notes in Computer Science Vol. 6225 (2010), 219 - 233, Springer.

37. Hassan Jameel Asghar, Josef Pieprzyk and Huaxiong Wang, A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm, 8th International Conference on Applied Cryptography and Network Security (ACNS '10), Lecture Notes in Computer Science, 6123 (2010), 349 - 366, Springer.

38. Phuong Ha Nguyen, Lei Wei, Huaxiong Wang and San Ling, On Multidimensional Linear Cryptanalysis, 15th Australasian Conference on Information Security and Privacy (ACISP 2010), Lecture Notes in Computer Science, 6168(2010), 37 - 52, Springer.

39. Shaoquan Jiang & Huaxiong Wang, Plaintext-Awareness of Hybrid Encryption, CT-RSA 2010, Lecture Notes in Computer Science, 5985 (2010), 57-72, Springer.

40. Qingsong Ye, Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, Efficient Fuzzy Matching and Intersection on Private Datasets, International Conference on Information Security and Cryptology (ICISC '09), Lecture Notes in Computer Science, vol. 5984 (2010), 211 - 228, Springer.

41. Hao Chen, San Ling, Carles Padro, Huaxiong Wang & Chaoping Xing, Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes, Cryptography and Coding, Twelfth IMA International Conference on Cryptography and Coding (IMACC '09), Lecture Notes in Computer Science, 5921(2009), 263-277, Springer.

42. Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling and Huaxiong Wang, Practical Pseudo- Collisions for Hash Functions ARIRANG-224/384, Proc SAC 2009, Lecture Notes in Computer Science, Vol.5867, pp. 141-156, Springer.

43. Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, & Huaxiong Wang, Cryptanalysis of the LAKE Hash Family, In proceedings of FSE 2009, Lecture Notes in Computer Science, 5665 (2009), 156-179, Springer.

44. Vijayakrishnan Pasupathinathan, Josef Pieprzyk & Huaxiong Wang, Certified pseudonyms colligated with master secret key, In proceedings of International Conference on Security and Cryptography (SECRYPT 2009),pp. 190 - 197, Milan, Italy, July 2009. (Best Student Paper Award)

45. Shujun Li, Hassan Jameel, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz & Huaxiong Wang, On the Security of PAS (Predicate-based Authentication Service), 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, December 7-11, 2009, Honolulu, Hawaii, USA.

46. Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling & Huaxiong Wang, Strongly multiplicative and 3-multiplicative linear secret sharing schemes, Advances in Cryptology - Asiacrypt 2008, Lecture Notes in Computer Science, 5350 (2008), 19- 36, Springer.

47. Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups, CANS2008, Lecture Notes in Computer Science, 5339 (2008), 178-195, Springer-Verlag.

48. Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo & Huaxiong Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, In proceedings of CANS2008, Lecture Notes in Computer Science, 5339 (2008), 49-63, Springer-Verlag.

49. Yi Lu, HuaxiongWang & San Ling, Cryptanalysis of Rabbit, 11th International Conference on Information Security, ISC 2008, Lecture Notes in Computer Science, 5222 (2008), 204 - 214, Springer-Verlag.

50. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk & Xian-mo Zhang, Efficient Disjointness Tests for Private Database, 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Lecture Notes in Computer Science, 5107(2008), 155 - 169, Springer-Verlag.

51. Hung-Min Sun, Mu-En Wu, Huaxiong Wang & Jian Guo, On the Improvement of the BDF Attack on LSBS-RSA, 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Lecture Notes in Computer Science, 5107(2008), 84 - 97, Springer-Verlag.

52. Jin Yuan, Qingsong Ye, Huaxiong Wang & Josef Pieprzyk, Secure Computation of the Vector Dominance Problem, Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, 4991(2008), 319 - 333, Springer-Verlag.

53. Qingsong Ye, Huaxiong Wang & Pieprzyk J, Distributed Private Matching and Set Operations, Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, 4991(2008), 347 - 360, Springer-Verlag.

54. Vijayakrishnan Pasupathinathan, Josef Pieprzyk & Huaxiong Wang, An On-Line Secure E-passport Protocol, Information Security Practice and Experience (ISPEC 2008), Lecture Notes in Computer Science, 4991(2008),14 - 28, Springer-Verlag.

55. Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling & Huaxiong Wang, Cryptanalysis of LASH, Fast Software Encryption Lecture Notes in Computer Science, 5086( FSE 2008), 207 - 223, Springer-Verlag.

56. Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Threshold Privacy Preserving Keyword Searches, Theory and Practice of Computer Science (SOFSEM 2008), Lecture Notes in Computer Science, 4910(2008), 646 - 658, Springer-Verlag.

57. Peishun Wang, Josef Pieprzyk & Huaxiong Wang, A New Dynamic Accumulator for Batch Updates, Ninth International Conference on Information and Communications Security (ICICS 2007), Lecture Notes in Computer Science, 4861(2008), 98 - 112, Springer-Verlag.

58. Josef Pieprzyk, Huaxiong Wang & Xianmo Zhang, Mobius commutative functions and partially coincident functions, Fourth International Workshop on Boolean Functions: Cryptography, Applications and Boolean aspects of Automata Theory, BFCA 2008. Proceedings (online http://www.liafa.jussieu.fr/bfca/bfca08), pp. 135 - 150.

59. Vijayakrishnan Pasupathinathan, Josef Pieprzyk & Huaxiong Wang, A Fair E-Tendering Protocol, In proceedings of International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 2008, INSTICC Press, ISBN: 978-989-8111-59-3.

60. Qingsong Ye, Huaxiong. Wang & Christophe Tartary, Privacy-Preserving Distributed Set Intersection, Proceedings of the 2nd International Workshop on Advances in Information Security (WAIS 2008), the Proceedings of the 3rd International Conference on Availability, Security and Reliability (ARES 2008), 1332 - 1339. IEEE Computer Society.

61. Vijayakrishnan Pasupathinathan, Josef Pieprzyk & Huaxiong Wang, Formal Security Analysis of Australian E-passport Implementation, Proceedings of Australasian Information Security Conference (AISC2008), Wollongong, Australia, Jan 2008, Conferences in Research and Practice in Information Technology (CRIPT), Vol 81.

62. Christophe Tartary, Huaxiong Wang & Josef Pieprzyk, Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures, Inscrypt 2007. Lecture Notes in Computer Science, Springer-Verlag.

63. Peishun Wang, Huaxiong Wang & Josef Pieprzyk, Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data, Lecture Notes in Computer Science, 4721, Secure Data Management 2007, 108-123, Springer-Verlag.

64. Christophe Tartary, Huaxiong Wang & Josef Pieprzyk, An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels, International Conference on Provable Security ProvSec 2007, Lecture Notes in Computer Science, 4784(2007), 17 - 34, Springer-Verlag.

65. Yvo Desmedt, Jose Pieprzyk, Ron Steinfeld & Huaxiong Wang, On Secure Multi-Party Computation in Black Box Groups, Crypto 2007, Lecture Notes in Computer Science, Vol. 4622 (2007), 591- 612, Springer-Verlag.

66. Christophe Tartary & Huaxiong Wang, Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication, 12th Australasian Conference on Information Security and Privacy, ACISP 2007, Lecture Notes in Computer Science, 4586(2007), 293 - 307, Springer-Verlag.

67. Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, How to Strengthen any Weakly Unforgeable Signature into a Strongly Unforgeable Signature, CT-RSA 2007, Lecture Notes in Computer Science, 4377(2007), 357 - 371, Springer-Verlag.

68. Guomin Yang, Duncan S. Wong, Huaxiong Wang & Xiaotie Deng, Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme, 8th International Conference on Information and Communications Security (ICICS 2006), Lecture Notes in Computer Science, 4307(2006), 82 - 91, Springer-Verlag.

69. Christophe Tartary & Huaxiong Wang, Achieving Multicast Stream Authentication using MDS Codes, 5th International Conference on Cryptology and Network Security (CANS 2006), Lecture Notes in Computer Science, 4301(2006), 108 - 125, Springer-Verlag.

70. Christophe Tartary & Huaxiong Wang, Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme, 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006), Lecture Notes in Computer Science, 4318(2006), 103 - 117, Springer-Verlag.

71. Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, On the Provable Security of an Efficient RSA-Based Pseudorandom Generator, Advances in Cryptology - ASIACRYPT 2006, Lecture Notes in Computer Science, 4284(2006), 194 - 209, Springer-Verlag.

72. Christophe Tartary & Huaxiong Wang, Rateless Codes for the Multicast Stream Authentication Problem, The 1st International Workshop on Security (IWSEC 2006), Lecture Notes in Computer Science, 3786(2006), 108 - 125, Springer-Verlag.

73. Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld & Huaxiong Wang, A Non-Malleable Group Key Exchange Protocol Robust Against Active Insiders, ISC 2006, Lecture Notes in Computer Science, 4176(2006), 459-475, Springer-Verlag.

74. Guomin Yang, Duncan S. Wong, Huaxiong Wang & Xiaotie Deng, Anonymous Signature Schemes. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006). Lecture Notes in Computer Science, Vol. 3958, 2006, 347 - 343, Springer-Verlag.

75. Ron Steinfeld, Josef Pieprzyk & Huaxiong Wang, Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2006). Lecture Notes in Computer Science, Vol. 3958, 2006, 157 - 173, Springer-Verlag.

76. Gaurav Gupta, Josef Pieprzyk & Huaxiong Wang, An attack-localizing watermarking scheme for natural language documents. Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006) ACM Press, 2006, 157 - 165.

77. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang & Joo Yeon Cho, Formal Analysis of Card-based Payment Systems in Mobile devices. The Australasian Information Security Workshop - Network Security, Hobart, Tasmania, January 16-19, 2006, Conferences in Research and Practice in Information Technology (CRIPT 2006), Australian Computers Society Inc., Vol 54, pp. 213-220.

78. Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung & Huaxiong Wang, Secure Construction of Virtual Organizations in Grid Computing Systems, Proceedings of Internet and Network Economics, First International Workshop, WINE 2005, Lecture Notes in Computer Science 3828, 2005, 959-968, Springer-Verlag.

79. Christophe Tartary & Huaxiong Wang, Efficient Multicast Stream Authentication for the Fully Adversarial Network Model, The 6th International Workshop on Information Security Applications (WISA 2005), Lecture Notes in Computer Science, Vol. 3786, 2005, 108 - 125, Springer-Verlag.

80. Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini & Huaxiong Wang, Radio Networks with Reliable Communication. Cocoon 2005, 11th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, Vol. 3595, 2005, 156 - 166, Springer-Verlag.

81. Ron Steinfeld, Scott Contini, HuaxiongWang & Josef Pieprzyk, Converse Results to the Wiener Attack on RSA, International Workshop on Practice and Theory in Public Key Cryptography (PKC 2005). Lecture Notes in Computer Science, Vol. 3386, 2005, 184 - 198, Springer-Verlag.

82. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, HuaxiongWang, Privacy Enhanced Electronic Cheque System. 7th IEEE International Conference on E-Commerce Technology, IEEE Computer Science, 2005, 431-434.

83. Hartono Kurnio, Huaxiong Wang, Josef Pieprzyk & Kris Gaj, Securing Multicast Groups in Ad Hoc Networks, Advanced Workshop on Content Computing (AWCC 2004), Zhenjiang, China, 2004. Lecture Notes in Computer Science, Vol. 3309, 2004, 194 - 207, Springer-Verlag.

84. Ron Steinfeld, Huaxiong Wang & Josef Pieprzyk, Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. 10th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2004. Lecture Notes in Computer Science, Vol. 3329, 2004, 170 - 186, Springer-Verlag.

85. Ron Steinfeld, HuaxiongWang, Josef Pieprzyk, Efficient extension of standard Schnorr/RSA signature into universal designated-verifier. International Workshop on Practice and Theory in Public Key Cryptography (PKC 2004). Lecture Notes in Computer Science, Vol. 2942, 2004, 86 - 100, Springer-Verlag.

86. Josef Pieprzyk & Huaxiong Wang, Malleability Attacks on Multi-party Key Agreement Protocols, Coding, Cryptography and Combinatorics (CCC 2003), Birkhauser, Basel, 2004, 277 - 288.

87. Josef Pieprzyk, Huaxiong Wang & Chaoping Xing, Multiple-Time Signature Schemes Secure against Adaptive Chosen Message Attacks, 10th Workshop on Selected Areas in Cryptography (SAC 2003). Lecture Notes in Computer Science, Vol. 3006, 2004, 88 - 100, Springer-Verlag.

88. Huaxiong Wang & Josef Pieprzyk, Efficient one-time proxy signatures, 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2003. Lecture Notes in Computer Science, Vol 2894, 2003, 507 - 522, Springer-Verlag.

89. Ron Steinfeld, Laurence Bull, Huaxiong Wang & Josef Pieprzyk, Universal designated-verifier signatures, 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2003. Lecture Notes in Computer Science, Vol 2894, 2003, 523 - 542, Springer-Verlag.

90. Huaxiong Wang & Josef Pieprzyk, Shared generation of pseudo-random function with cumulative maps, CT-RSA 2003. Lecture Notes in Computer Science Vol. 2612, 2003, 281-294, Springer-Verlag.

91. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang & Peter R. Wild, Threshold MACs, The 5th international conference on information security and cryptology, ICISC 2002. Lecture Notes in Computer Science, Vol. 2587, 2003, 237-252, Springer-Verlag.

92. Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini & Huaxiong Wang, A Dynamic Group Key Distribution Scheme with Flexible User Join. The 5th international conference on information security and cryptology, ICISC 2002. Lecture Notes in Computer Science, Vol. 2587, 2003, 478-496, 2003, Springer-Verlag.

93. Reihaneh Safavi-Naini & Huaxiong Wang, Resilient LKH: secure multicast key distribution schemes (invited), Proceedings in 2003 International Workshop of Advanced Developments in Software and Systems Security (WADIS 2003), 2003, 44-50.

94. Hartono Kurnio, Reihaneh Safavi-Naini & Huaxiong Wang, A group key distribution scheme with decentralised user join. Third Conference on Security in Communication Networks, SCN 2002, September 12-13, 2002 Amalfi Italy. Lecture Notes in Computer Science, Vol. 2576, 2003, 146-163, Springer-Verlag.

95. Huaxiong Wang & Josef Pieprzyk, A Combinatorial Approach to Anonymous Membership Broadcast, Cocoon 2002, 8th Annual International Computing and Combinatorics Conference, Lecture Notes in Computer Science, Vol. 2387, 2002, 162 - 170, Springer-Verlag.

96. Hartono Kurnio, Reihaneh Safavi-Naini & Huaxiong Wang, A Secure Re-keying Scheme with Key Recovery Property, 7th Australasian Conference on Information Security and Privacy, ACISP 2002, Lecture Notes in Computer Science, Vol. 2384, 2002, 40 - 55, Springer-Verlag.

97. Yvo Desmedt, Reihaneh Safavi-Naini & Huaxiong Wang, Redistribution of a mechanical secret's shares, Financial Cryptography 2002, Lecture Notes in Computer Science, Vol. 2357, 2002, 238-252, Springer-Verlag.

98. Hartono Kurnio, Reihaneh Safavi-Naini & Huaxiong Wang, Efficient Revocation Schemes for Secure Multicast, International Conference on Information Security and Cryptology ICISC 2001, Lecture Notes in Computer Science, Vol. 2288, 2002, 160-177, Springer-Verlag.

99. Beomsik Song, Huaxiong Wang & Jennifer Seberry, A new cryptanalysis method using the distribution characteristics of substitution distance, International Conference on Information Security and Cryptology, ICISC 2001, Lecture Notes in Computer Science, Vol. 2288, 2002, 18-31, Springer-Verlag.

100.             Reihaneh Safavi-Naini, Huaxiong Wang & Chaoping Xing, Linear Authentication Codes: Bounds and Constructions, Indocrypt 2001, Lecture Notes in Computer Science, Vol. 2247, 2001, 127-35.

101.             Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, How to construct fail-stop confirmer signature schemes, 6th Australasian Conference on Information Security and Privacy, ACISP 2001, Lecture Notes in Computer Science, 2119(2001), 435-444, Springer-Verlag.

102.             Reihaneh Safavi-Naini & Huaxiong Wang, Robust Secret Sharing Schemes over Abelian Group Z_m, Cryptography and Combinatorial Number Theory (CCNT 1999), Progress in Computer Science and Applied Logic, Vol. 20, Bikhauser, 2001, 244-257.

103.             Yvo Desmedt, Mike Burmester, Reihaneh Safavi-Naini & Huaxiong Wang, Threshold Things That Thinks (T4): security requirements to cope with theft of handheld/handless internet devices, The Symposium on Requirements Engineering for Information Security, West Lafayette, Indiana, USA, 2001.

104.             Reihaneh Safavi-Naini, Willy Susilo & Huaxiong Wang, Fail-Stop Signature for long messages, Indocrypt 2000, Lecture Notes in Computer Science, 1977(2000), 165-177, Springer-Verlag.

105.             Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Key Management for Secure Multicast with Dynamic Controllers, Fifth Australasian Conference on Information Security and Privacy, ACISP 2000, Lecture Notes in Computer Science 1841 (2000) 178{190, Springer-Verlag.

106.             Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao & Huanhui Zhao, On Multiplicative Secret Sharing Schemes, Fifth Australasian Conference on Information Security and Privacy, ACISP 2000, Lecture Notes in Computer Science 1841 (2000) 241- 251, Springer-Verlag.

107.             Reihaneh Safavi-Naini & Huaxiong Wang, New Constructions of secure multicast re-keying schemes using perfect hash families, 7th ACM Conference on Computer and Communication Security, ACM CCS 2000, ACM Press, 2000, 228-234.

108.             Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Shared generation of authenticators, Proceedings of the Eleventh Australasian Workshop on Combinatorial Algorithms, AWOCA 2000, 93 - 110.

109.             Reihaneh Safavi-Naini & Huaxiong Wang, Broadcast authentication in group communication, ASIACRYPT 1999, Lecture Notes in Computer Science, Vol. 1716, 1999, 399-41, Springer-Verlag.

110.             Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini & Huaxiong Wang, Changing thresholds in the absence of secure channels, Proceedings of Information Security and Privacy Conference, ACISP 1999 Lecture Notes in Computer Science, Vol. 1578, Spring-Verlag, 177-191, 1999, Springer-Verlag.

111.             Reihaneh Safavi-Naini, Huaxiong Wang & Kwok-Yan Lam, A new approach to robust threshold RSA signature Proceedings of Information Security and Cryptology- ICISC 1999, Lecture Notes in Computer Science, 1787(2000), 184-196, Springer-Verlag.

112.             Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Chris Charnes & Josef Pieprzyk: Broadcast Anti-jamming Systems, ICON 1999, IEEE International Conference on Networks, IEEE Computer Society, 1999, 349-355.

113.             Reihaneh Safavi-Naini & Huaxiong Wang, New Results on Multireceiver Authentication Codes, In Advances in Cryptology - EUROCRYPT 1998, Lecture Notes in Computer Science 1403, 527-541, 1998, Springer-Verlag.

114.             Reihaneh Safavi-Naini & Huaxiong Wang, Bounds and Constructions for Multireceiver Authentication Codes, In Advances in Cryptology - ASIACRYPT 1998, Lecture Notes in Comp. Sci. 1514(1998), 242-256, Springer-Verlag.

115.             Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini & Huaxiong Wang, On Construction of Cumulative Secret Sharing Schemes, In Proceedings of ACISP 1998 (Australian Conference on Information Security and Privacy), Lecture Notes in Computer Science, 1438, 378-390, 1998, Springer-Verlag.