Exploiting the Symmetry of $Z^n$: Randomization and the Automorphism Problem
K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2025). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. Journal of Cryptology 38(3).
K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2025). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. Journal of Cryptology 38(3).
K. Jiang, A. Wang, H. Luo, G. Liu, G. Tang, Y. Pan and X. Wang. Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. In: Fehr, S., Fouque, PA. (eds) Advances in Cryptology – EUROCRYPT 2025. EUROCRYPT 2025. Lecture Notes in Computer Science, vol 15602. Springer, Cham. https://doi.org/10.1007/978-3-031-91124-8_5
T. Wang, A. Wang, X. Wang (2023). Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. In: Handschuh, H., Lysyanskaya, A. (eds) Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer Science, vol 14083. Springer, Cham. https://doi.org/10.1007/978-3-031-38548-3_3
Y. Gong, D. Ran, J. Liu, C. Wang, T. Cong, A. Wang, S. Duan and X. Wang (2025). FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts. Proceedings of the AAAI Conference on Artificial Intelligence, 39(22), 23951-23959. https://doi.org/10.1609/aaai.v39i22.34568
Y. Gong, D. Ran, X. He, T. Cong, A. Wang, S. Duan and X. Wang (2025). Safety Misalignment Against Large Language Models. In Proceedings of the 2025 Annual Network and Distributed System Security Symposium (NDSS).
A. Wang, Z. Zheng, C. Zhao, Z. Qiu, G. Zeng, Y. Yuan, C. Mu, and X. Wang (2025). Scloud+: An Efficient LWE-Based KEM Without Ring/Module Structure. In: Lu, X., Mitchell, C.J. (eds) Security Standardisation Research. SSR 2024. Lecture Notes in Computer Science, vol 15559. Springer, Cham. https://doi.org/10.1007/978-3-031-87541-0_7
Y. Chen, X. Dong, J. Guo, Y. Shen, A. Wang, X. Wang, (2025). Hard-Label Cryptanalytic Extraction of Neural Network Models. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_7
S. Ma, T. Huang, A. Wang, X. Wang (2025). Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15484. Springer, Singapore. https://doi.org/10.1007/978-981-96-0875-1_5
H. Luo, K. Jiang, Y. Pan, A. Wang (2025). Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15487. Springer, Singapore. https://doi.org/10.1007/978-981-96-0894-2_12
C. Zhang, Y. Chen, W. Liu, L. Peng, M. Hao, A. Wang, and X. Wang, (2024). Unbalanced private set union with reduced computation and communication. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 1434-1447). https://doi.org/10.1145/3658644.369030
T. Cong, D. Ran, Z. Liu, X. He, J. Liu, Y. Gong, Q. Li, A. Wang, and X. Wang. 2024. Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. In Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis (LAMPS ’24), October 14–18, 2024, Salt Lake City, UT, USA. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3689217.3690614
T. Huang, S. Ma, A. Wang, and X. Wang (2024). Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. In: Zhu, T., Li, Y. (eds) Information Security and Privacy. ACISP 2024. Lecture Notes in Computer Science, vol 14895. Springer, Singapore. https://doi.org/10.1007/978-981-97-5025-2_12
S. Ma, T. Huang, A. Wang, X. Wang (2024). Accelerating BGV Bootstrapping for Large p Using Null Polynomials over . In: Joye, M., Leander, G. (eds) Advances in Cryptology – EUROCRYPT 2024. EUROCRYPT 2024. Lecture Notes in Computer Science, vol 14652. Springer, Cham. https://doi.org/10.1007/978-3-031-58723-8_14
S. Ma, T. Huang, A. Wang, Q. Zhou, and X. Wang (2023). Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(1), 592-616. https://doi.org/10.46586/tches.v2024.i1.592-616
K. Jiang, A. Wang, H. Luo, G. Liu, Y. Yu, and X. Wang. (2023). Exploiting the Symmetry of Z^n: Randomization and the Automorphism Problem. In: Guo, J., Steinfeld, R. (eds) Advances in Cryptology – ASIACRYPT 2023. ASIACRYPT 2023. Lecture Notes in Computer Science, vol 14441. Springer, Singapore. https://doi.org/10.1007/978-981-99-8730-6_6
L. Qin, X. Dong, A. Wang, J. Hua, X. Wang. (2022). Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. In: Agrawal, S., Lin, D. (eds) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. Lecture Notes in Computer Science, vol 13791. Springer, Cham. https://doi.org/10.1007/978-3-031-22963-3_10
X. Zhang , Z. Zheng, and A. Wang. (2022). A Refinement of Key Mismatch Attack on NewHope. The Computer Journal, Volume 65, Issue 8, August 2022, Pages 2209–2220, https://doi.org/10.1093/comjnl/bxab058
C. Liu, A. Wang, Z. Zheng (2021). Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. In: Baek, J., Ruj, S. (eds) Information Security and Privacy. ACISP 2021. Lecture Notes in Computer Science(), vol 13083. Springer, Cham. https://doi.org/10.1007/978-3-030-90567-5_30
Conference proceedings talk at Testing Institute of America 2014 Annual Conference, Los Angeles, CA, USA
Talk at London School of Testing, London, UK
Tutorial at UC-Berkeley Institute for Testing Science, Berkeley, CA, USA
Talk at UC San Francisco, Department of Testing, San Francisco, CA, USA