Wei, Puwen
49  results:
Search for persons X
?
1

High-Performance Hardware Implementation of MPCitH and Picn..:

Liu, Guoxiao ; Jia, Keting ; Wei, Puwen.
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2024)  2 - p. 190-214 , 2024
 
?
2

CTA: Confidential Transactions Protocol with State Accumula..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Si, Shumin ; Wei, Puwen ; Lin, Xiuhan. - p. 414-439 , 2023
 
?
3

Improving Privacy of Anonymous Proof-of-Stake Protocols:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Wu, Shichen ; Song, Zhiying ; Wei, Puwen.. - p. 368-391 , 2023
 
?
6

Linear Cryptanalysis and Its Variants with Fast Fourier Tra..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Xu, Zeyu ; Chen, Shiyao ; Wang, Meiqin. - p. 25-52 , 2023
 
?
7

Related-Key Differential Cryptanalysis of GMiMC Used in Pos..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Chen, Shiyao ; Guo, Chun ; Guo, Jian... - p. 41-60 , 2023
 
?
8

When MPC in the Head Meets VC:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Liu, Li ; Wei, Puwen - p. 507-526 , 2023
 
?
9

On the Field-Based Division Property: Applications to MiMC,..:

, In: Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science,
Cui, Jiamin ; Hu, Kai ; Wang, Meiqin. - p. 241-270 , 2022
 
?
10

Resumable Zero-Knowledge for Circuits from Symmetric Key Pr..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Zhang, Handong ; Wei, Puwen ; Xue, Haiyang... - p. 375-398 , 2022
 
?
11

Analysis of blockchain protocol against static adversarial ..:

Yuan, Quan ; Wei, Puwen ; Jia, Keting.
Science China Information Sciences.  63 (2020)  3 - p. , 2020
 
?
12

Identity-Based Broadcast Encryption with Efficient Revocati..:

, In: Public-Key Cryptography – PKC 2019; Lecture Notes in Computer Science,
Ge, Aijun ; Wei, Puwen - p. 405-435 , 2019
 
?
13

Tighter Security Proofs for Post-quantum Key Encapsulation ..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Zhang, Zhengyu ; Wei, Puwen ; Xue, Haiyang - p. 141-160 , 2019
 
?
14

Security of the Blockchain Against Long Delay Attack:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018,
Wei, Puwen ; Yuan, Quan ; Zheng, Yuliang - p. 250-275 , 2018
 
?
15

Adaptive Security of Broadcast Encryption, Revisited:

Zhu, Bingxin ; Wei, Puwen ; Wang, Mingqiang
Security and Communication Networks.  2017 (2017)  - p. 1-16 , 2017
 
1-15