Follow
Mingyuan Wang
Title
Cited by
Cited by
Year
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
212021
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Cryptology Conference, 779-808, 2021
19*2021
Non-malleable codes against lookahead tampering
D Gupta, HK Maji, M Wang
International Conference on Cryptology in India, 307-328, 2018
18*2018
Experimenting with zero-knowledge proofs of training
S Garg, A Goel, S Jha, S Mahloujifar, M Mahmoody, GV Policharla, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
152023
Publicly detectable watermarking for language models
J Fairoze, S Garg, S Jha, S Mahloujifar, M Mahmoody, M Wang
arXiv preprint arXiv:2310.18491, 2023
142023
Black-box use of one-way functions is useless for optimal fair coin-tossing
HK Maji, M Wang
Annual International Cryptology Conference, 593-617, 2020
122020
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
112021
Cryptography with weights: Mpc, encryption and signatures
S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
Annual International Cryptology Conference, 295-327, 2023
102023
Threshold signatures in the multiverse
L Baird, S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
2023 IEEE Symposium on Security and Privacy (SP), 1454-1470, 2023
102023
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
102022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
82022
hints: Threshold signatures with silent setup
S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
Cryptology ePrint Archive, 2023
72023
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
62022
Coin tossing with lazy defense: Hardness of computation results
HA Khorasgani, HK Maji, M Wang
Cryptology ePrint Archive, 2020
52020
Explicit rate-1 non-malleable codes for local tampering
D Gupta, HK Maji, M Wang
Annual International Cryptology Conference, 435-466, 2019
52019
How to Prove Statements Obliviously?
S Garg, A Goel, M Wang
Cryptology ePrint Archive, 2023
42023
Optimally-secure Coin-tossing against a Byzantine Adversary
HA Khorasgani, HK Maji, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2858-2863, 2021
4*2021
Computational hardness of optimal fair computation: Beyond minicrypt
HK Maji, M Wang
Annual International Cryptology Conference, 33-63, 2021
22021
Efficient distributed coin-tossing protocols
HA Khorasgani, HK Maji, H Mehta, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2852-2857, 2021
2*2021
On the efficiency of cryptographic constructions
M Wang
Purdue University, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20