Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in ACISP, 2021
Keywords - Fully homomorphic encryption; GSW-FHE; LWE-based; Large FHE gates
Recommended citation: C. Liu, A. Wang, Z. Zheng (2021). Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. In: Baek, J., Ruj, S. (eds) Information Security and Privacy. ACISP 2021. Lecture Notes in Computer Science(), vol 13083. Springer, Cham. https://doi.org/10.1007/978-3-030-90567-5_30
Download Paper
Published in The Computer Journal, 2022
Keywords - cryptanalysis; ring-LWE; NewHope; key mismatch attack
Recommended citation: X. Zhang , Z. Zheng, and A. Wang. (2022). A Refinement of Key Mismatch Attack on NewHope. The Computer Journal, Volume 65, Issue 8, August 2022, Pages 2209–2220, https://doi.org/10.1093/comjnl/bxab058
Download Paper
Published in ASIACRYPT, 2022
Keywords - SKINNY; TWEAKEY; Rectangle; Meet-in-the-middle; Impossible differential
Recommended citation: L. Qin, X. Dong, A. Wang, J. Hua, X. Wang. (2022). Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. In: Agrawal, S., Lin, D. (eds) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in Computer Science, vol 13791. Springer, Cham. https://doi.org/10.1007/978-3-031-22963-3_10
Download Paper
Published in ASIACRYPT (**Best Paper Award**), 2023
Keywords - Lattice automorphism; Randomized reduction; LIP; Gradient descent; Characteristic vectors of the unimodular lattice
Recommended citation: K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2023). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. In: Guo, J., Steinfeld, R. (eds) Advances in Cryptology – ASIACRYPT 2023. ASIACRYPT 2023. Lecture Notes in Computer Science, vol 14441. Springer, Singapore. https://doi.org/10.1007/978-981-99-8730-6_6
Download Paper
Published in CHES, 2024
Keywords - Homomorphic Encryption; TFHE; FHEW; Functional Bootstrap; FDFB; Homomorphic Decomposition
Recommended citation: S. Ma, T. Huang, A. Wang, Q. Zhou, and X. Wang (2023). Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), 592-616. https://doi.org/10.46586/tches.v2024.i1.592-616
Download Paper
Published in EUROCRYPT, 2024
Keywords - BGV; Bootstrapping; FHE; Homomorphic Digit Removal; Null Polynomial
Recommended citation: S. Ma, T. Huang, A. Wang, X. Wang (2024). Accelerating BGV Bootstrapping for Large p Using Null Polynomials over . In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14652. Springer, Cham. https://doi.org/10.1007/978-3-031-58723-8_14
Download Paper
Published in ACISP, 2024
Keywords - Step function; Homomorphic encryption; CKKS; Polynomial approximation; Round function; Encrypted data bucketing
Recommended citation: T. Huang, S. Ma, A. Wang, and X. Wang (2024). Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. In: Zhu, T., Li, Y. (eds) Information Security and Privacy. ACISP 2024. Lecture Notes in Computer Science, vol 14895. Springer, Singapore. https://doi.org/10.1007/978-981-97-5025-2_12
Download Paper
Published in CCS-LAMPS (**Best Paper Award**), 2024
Keywords - Large Language Models; Intellectual Property; Model Merging
Recommended citation: T. Cong, D. Ran, Z. Liu, X. He, J. Liu, Y. Gong, Q. Li, A. Wang, and X. Wang. 2024. Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. In Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis (LAMPS ’24), October 14–18, 2024, Salt Lake City, UT, USA. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3689217.3690614
Download Paper
Published in CCS, 2024
Keywords - Secure Multi-party Computation; Private Set Union; Unbalanced Setting; BatchPIR
Recommended citation: C. Zhang, Y. Chen, W. Liu, L. Peng, M. Hao, A. Wang, and X. Wang, (2024). Unbalanced private set union with reduced computation and communication. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 1434-1447). https://doi.org/10.1145/3658644.369030
Download Paper
Published in ASIACRYPT, 2024
Keywords - Lattice automorphism; module-LIP; Symplectic matrix
Recommended citation: H. Luo, K. Jiang, Y. Pan, A. Wang (2025). Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15487. Springer, Singapore. https://doi.org/10.1007/978-981-96-0894-2_12
Download Paper
Published in ASIACRYPT, 2024
Keywords - Fully Homomorphic Encryption; BGV; Bootstrapping, NTT
Recommended citation: S. Ma, T. Huang, A. Wang, X. Wang (2025). Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15484. Springer, Singapore. https://doi.org/10.1007/978-981-96-0875-1_5
Download Paper
Published in ASIACRYPT, 2024
Keywords - Cryptanalysis; ReLu Neural Networks; Functionally Equivalent Extraction; Hard-Label
Recommended citation: Y. Chen, X. Dong, J. Guo, Y. Shen, A. Wang, X. Wang, (2025). Hard-Label Cryptanalytic Extraction of Neural Network Models. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_7
Download Paper
Published in Security Standardisation Research, 2024
Keywords - post-quantum cryptography; key encapsulation mechanism; learning with errors; lattice code; Barnes-Wall lattice
Recommended citation: A. Wang, Z. Zheng, C. Zhao, Z. Qiu, G. Zeng, Y. Yuan, C. Mu, and X. Wang (2025). Scloud+: An Efficient LWE-Based KEM Without Ring/Module Structure. In: Lu, X., Mitchell, C.J. (eds) Security Standardisation Research. SSR 2024. Lecture Notes in Computer Science, vol 15559. Springer, Cham. https://doi.org/10.1007/978-3-031-87541-0_7
Download Paper
Published in NDSS, 2025
Artifact - https://zenodo.org/records/14249424
Recommended citation: Y. Gong, D. Ran, X. He, T. Cong, A. Wang, S. Duan and X. Wang (2025). Safety Misalignment Against Large Language Models. In Proceedings of the 2025 Annual Network and Distributed System Security Symposium (NDSS).
Download Paper
Published in AAAI, 2025
Extended version - https://arxiv.org/abs/2311.05608
Recommended citation: Y. Gong, D. Ran, J. Liu, C. Wang, T. Cong, A. Wang, S. Duan and X. Wang (2025). FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts. Proceedings of the AAAI Conference on Artificial Intelligence, 39(22), 23951-23959. https://doi.org/10.1609/aaai.v39i22.34568
Download Paper
Published in CRYPTO, 2025
Keywords - Post-quantum cryptography; Code-based cryptography; Decryption failure; BIKE; QC-MDPC; Information set decoding
Recommended citation: T. Wang, A. Wang, X. Wang (2023). Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. In: Handschuh, H., Lysyanskaya, A. (eds) Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer Science, vol 14083. Springer, Cham. https://doi.org/10.1007/978-3-031-38548-3_3
Download Paper
Published in EUROCRYPT, 2025
Keywords - Cryptographic group action; Dual-mode commitment; Homomorphic commitment; Lattice isomorphism problem
Recommended citation: K. Jiang, A. Wang, H. Luo, G. Liu, G. Tang, Y. Pan and X. Wang. Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. In: Fehr, S., Fouque, PA. (eds) Advances in Cryptology – EUROCRYPT 2025. EUROCRYPT 2025. Lecture Notes in Computer Science, vol 15602. Springer, Cham. https://doi.org/10.1007/978-3-031-91124-8_5
Download Paper
Published in Journal of Cryptology, 2025
The extended and revised journal version of our ASIACRYPT 2023 conference paper, incorporating new content.
Recommended citation: K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2025). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. Journal of Cryptology 38(3).
Download Paper
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.