Follow
Mingyuan Wang
Mingyuan Wang
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Non-malleable codes against lookahead tampering
D Gupta, HK Maji, M Wang
International Conference on Cryptology in India, 307-328, 2018
15*2018
Black-box use of one-way functions is useless for optimal fair coin-tossing
HK Maji, M Wang
Annual International Cryptology Conference, 593-617, 2020
92020
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Cryptology Conference, 779-808, 2021
8*2021
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
72021
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
52021
Coin tossing with lazy defense: Hardness of computation results
HA Khorasgani, HK Maji, M Wang
Cryptology ePrint Archive, 2020
52020
Optimally-secure coin-tossing against a byzantine adversary
HA Khorasgani, HK Maji, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2858-2863, 2021
3*2021
Explicit rate-1 non-malleable codes for local tampering
D Gupta, HK Maji, M Wang
Annual International Cryptology Conference, 435-466, 2019
32019
Computational hardness of optimal fair computation: Beyond minicrypt
HK Maji, M Wang
Annual International Cryptology Conference, 33-63, 2021
22021
Efficient distributed coin-tossing protocols
HA Khorasgani, HK Maji, H Mehta, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2852-2857, 2021
2*2021
On the Efficiency of Cryptographic Constructions
M Wang
Purdue University Graduate School, 2021
12021
Overparameterized (robust) models from computational constraints
S Garg, S Jha, S Mahloujifar, M Mahmoody, M Wang
arXiv preprint arXiv:2208.12926, 2022
2022
Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
2022
Cryptography with Weights: MPC, Encryption and Signatures
S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
Cryptology ePrint Archive, 2022
2022
IBE with Incompressible Master Secret and Small Identity Secrets
N Döttling, S Garg, S Sekar, M Wang
Cryptology ePrint Archive, 2022
2022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022
2022
Overparameterization from Computational Constraints
S Garg, S Jha, S Mahloujifar, M Mahmoody, M Wang
Advances in Neural Information Processing Systems, 0
Leakage-resilient Linear Secret-sharing against arbitrary Bounded-size Leakage Family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
The system can't perform the operation now. Try again later.
Articles 1–18