Posts by Collection

portfolio

publications

Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE

Published in ACISP, 2021

Keywords - Fully homomorphic encryption; GSW-FHE; LWE-based; Large FHE gates

Recommended citation: C. Liu, A. Wang, Z. Zheng (2021). Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. In: Baek, J., Ruj, S. (eds) Information Security and Privacy. ACISP 2021. Lecture Notes in Computer Science(), vol 13083. Springer, Cham. https://doi.org/10.1007/978-3-030-90567-5_30
Download Paper

A Refinement of Key Mismatch Attack on NewHope

Published in The Computer Journal, 2022

Keywords - cryptanalysis; ring-LWE; NewHope; key mismatch attack

Recommended citation: X. Zhang , Z. Zheng, and A. Wang. (2022). A Refinement of Key Mismatch Attack on NewHope. The Computer Journal, Volume 65, Issue 8, August 2022, Pages 2209–2220, https://doi.org/10.1093/comjnl/bxab058
Download Paper

Mind the tweakey schedule: cryptanalysis on skinnye-64-256

Published in ASIACRYPT, 2022

Keywords - SKINNY; TWEAKEY; Rectangle; Meet-in-the-middle; Impossible differential

Recommended citation: L. Qin, X. Dong, A. Wang, J. Hua, X. Wang. (2022). Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. In: Agrawal, S., Lin, D. (eds) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in Computer Science, vol 13791. Springer, Cham. https://doi.org/10.1007/978-3-031-22963-3_10
Download Paper

Exploiting the Symmetry of $Z^n$: Randomization and the Automorphism Problem

Published in ASIACRYPT (**Best Paper Award**), 2023

Keywords - Lattice automorphism; Randomized reduction; LIP; Gradient descent; Characteristic vectors of the unimodular lattice

Recommended citation: K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2023). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. In: Guo, J., Steinfeld, R. (eds) Advances in Cryptology – ASIACRYPT 2023. ASIACRYPT 2023. Lecture Notes in Computer Science, vol 14441. Springer, Singapore. https://doi.org/10.1007/978-981-99-8730-6_6
Download Paper

Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation

Published in CHES, 2024

Keywords - Homomorphic Encryption; TFHE; FHEW; Functional Bootstrap; FDFB; Homomorphic Decomposition

Recommended citation: S. Ma, T. Huang, A. Wang, Q. Zhou, and X. Wang (2023). Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), 592-616. https://doi.org/10.46586/tches.v2024.i1.592-616
Download Paper

BGV Bootstrapping for Large p Using Null Polynomials Over $Z_{p^e}$

Published in EUROCRYPT, 2024

Keywords - BGV; Bootstrapping; FHE; Homomorphic Digit Removal; Null Polynomial

Recommended citation: S. Ma, T. Huang, A. Wang, X. Wang (2024). Accelerating BGV Bootstrapping for Large p Using Null Polynomials over . In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14652. Springer, Cham. https://doi.org/10.1007/978-3-031-58723-8_14
Download Paper

Approximate Methods for the Computation of Step Functions in Homomorphic Encryption

Published in ACISP, 2024

Keywords - Step function; Homomorphic encryption; CKKS; Polynomial approximation; Round function; Encrypted data bucketing

Recommended citation: T. Huang, S. Ma, A. Wang, and X. Wang (2024). Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. In: Zhu, T., Li, Y. (eds) Information Security and Privacy. ACISP 2024. Lecture Notes in Computer Science, vol 14895. Springer, Singapore. https://doi.org/10.1007/978-981-97-5025-2_12
Download Paper

Have you merged my model? on the robustness of large language model ip protection methods against model merging

Published in CCS-LAMPS (**Best Paper Award**), 2024

Keywords - Large Language Models; Intellectual Property; Model Merging

Recommended citation: T. Cong, D. Ran, Z. Liu, X. He, J. Liu, Y. Gong, Q. Li, A. Wang, and X. Wang. 2024. Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. In Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis (LAMPS ’24), October 14–18, 2024, Salt Lake City, UT, USA. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3689217.3690614
Download Paper

Unbalanced private set union with reduced computation and communication

Published in CCS, 2024

Keywords - Secure Multi-party Computation; Private Set Union; Unbalanced Setting; BatchPIR

Recommended citation: C. Zhang, Y. Chen, W. Liu, L. Peng, M. Hao, A. Wang, and X. Wang, (2024). Unbalanced private set union with reduced computation and communication. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 1434-1447). https://doi.org/10.1145/3658644.369030
Download Paper

Cryptanalysis of rank-2 module-LIP with symplectic automorphisms

Published in ASIACRYPT, 2024

Keywords - Lattice automorphism; module-LIP; Symplectic matrix

Recommended citation: H. Luo, K. Jiang, Y. Pan, A. Wang (2025). Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15487. Springer, Singapore. https://doi.org/10.1007/978-981-96-0894-2_12
Download Paper

Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT

Published in ASIACRYPT, 2024

Keywords - Fully Homomorphic Encryption; BGV; Bootstrapping, NTT

Recommended citation: S. Ma, T. Huang, A. Wang, X. Wang (2025). Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15484. Springer, Singapore. https://doi.org/10.1007/978-981-96-0875-1_5
Download Paper

Hard-label cryptanalytic extraction of neural network models

Published in ASIACRYPT, 2024

Keywords - Cryptanalysis; ReLu Neural Networks; Functionally Equivalent Extraction; Hard-Label

Recommended citation: Y. Chen, X. Dong, J. Guo, Y. Shen, A. Wang, X. Wang, (2025). Hard-Label Cryptanalytic Extraction of Neural Network Models. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_7
Download Paper

Scloud+: An Efficient LWE-Based KEM Without Ring/Module Structure

Published in Security Standardisation Research, 2024

Keywords - post-quantum cryptography; key encapsulation mechanism; learning with errors; lattice code; Barnes-Wall lattice

Recommended citation: A. Wang, Z. Zheng, C. Zhao, Z. Qiu, G. Zeng, Y. Yuan, C. Mu, and X. Wang (2025). Scloud+: An Efficient LWE-Based KEM Without Ring/Module Structure. In: Lu, X., Mitchell, C.J. (eds) Security Standardisation Research. SSR 2024. Lecture Notes in Computer Science, vol 15559. Springer, Cham. https://doi.org/10.1007/978-3-031-87541-0_7
Download Paper

Safety misalignment against large language models

Published in NDSS, 2025

Artifact - https://zenodo.org/records/14249424

Recommended citation: Y. Gong, D. Ran, X. He, T. Cong, A. Wang, S. Duan and X. Wang (2025). Safety Misalignment Against Large Language Models. In Proceedings of the 2025 Annual Network and Distributed System Security Symposium (NDSS).
Download Paper

Figstep: Jailbreaking large vision-language models via typographic visual prompts

Published in AAAI, 2025

Extended version - https://arxiv.org/abs/2311.05608

Recommended citation: Y. Gong, D. Ran, J. Liu, C. Wang, T. Cong, A. Wang, S. Duan and X. Wang (2025). FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts. Proceedings of the AAAI Conference on Artificial Intelligence, 39(22), 23951-23959. https://doi.org/10.1609/aaai.v39i22.34568
Download Paper

Exploring decryption failures of bike: New class of weak keys and key recovery attacks

Published in CRYPTO, 2025

Keywords - Post-quantum cryptography; Code-based cryptography; Decryption failure; BIKE; QC-MDPC; Information set decoding

Recommended citation: T. Wang, A. Wang, X. Wang (2023). Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. In: Handschuh, H., Lysyanskaya, A. (eds) Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer Science, vol 14083. Springer, Cham. https://doi.org/10.1007/978-3-031-38548-3_3
Download Paper

Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions

Published in EUROCRYPT, 2025

Keywords - Cryptographic group action; Dual-mode commitment; Homomorphic commitment; Lattice isomorphism problem

Recommended citation: K. Jiang, A. Wang, H. Luo, G. Liu, G. Tang, Y. Pan and X. Wang. Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. In: Fehr, S., Fouque, PA. (eds) Advances in Cryptology – EUROCRYPT 2025. EUROCRYPT 2025. Lecture Notes in Computer Science, vol 15602. Springer, Cham. https://doi.org/10.1007/978-3-031-91124-8_5
Download Paper

talks

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.