default search action
Guangwu Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Dong Chen, Hongyuan Qu, Guangwu Xu:
AegisFL: Efficient and Flexible Privacy-Preserving Byzantine-Robust Cross-silo Federated Learning. ICML 2024 - [i31]Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. CoRR abs/2402.00675 (2024) - [i30]Yanze Yang, Yiran Jia, Guangwu Xu:
On Modular Algorithms and Butterfly Operations in Number Theoretic Transform. IACR Cryptol. ePrint Arch. 2024: 79 (2024) - [i29]Hongyuan Qu, Guangwu Xu:
An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic. IACR Cryptol. ePrint Arch. 2024: 417 (2024) - 2023
- [j23]Lidong Han, Guangwu Xu, Qi Xie:
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". IEEE Trans. Inf. Forensics Secur. 18: 3934-3935 (2023) - [c17]Dong Chen, Zhiyuan Qiu, Guangwu Xu:
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations. Inscrypt (2) 2023: 53-72 - [c16]Hongyuan Qu, Guangwu Xu:
Improvements of Homomorphic Secure Evaluation of Inverse Square Root. ICICS 2023: 110-127 - 2022
- [j22]Jun Che, Chengliang Tian, Yupeng Jiang, Guangwu Xu:
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited. IEEE Trans. Inf. Theory 68(2): 1316-1328 (2022) - [c15]Zishen Zhao, Guangwu Xu:
On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices. Inscrypt 2022: 463-482 - [c14]Han Wu, Guangwu Xu:
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. CT-RSA 2022: 196-222 - [i28]Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. IACR Cryptol. ePrint Arch. 2022: 581 (2022) - [i27]Han Wu, Xiaoyun Wang, Guangwu Xu:
On the Dual Attack of LWE Schemes in the Presence of Hints. IACR Cryptol. ePrint Arch. 2022: 1403 (2022) - [i26]Han Wu, Xiaoyun Wang, Guangwu Xu:
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack. IACR Cryptol. ePrint Arch. 2022: 1404 (2022) - [i25]Han Wu, Guangwu Xu:
Enhancing the Dual Attack against MLWE: Constructing More Short Vectors Using Its Algebraic Structure. IACR Cryptol. ePrint Arch. 2022: 1661 (2022) - 2021
- [j21]Zhongxiang Zheng, Chunhuan Zhao, Guangwu Xu:
Discrete Gaussian measures and new bounds of the smoothing parameter for lattices. Appl. Algebra Eng. Commun. Comput. 32(5): 637-650 (2021) - [j20]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao:
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling. Sci. China Inf. Sci. 64(3) (2021) - [c13]Wei Yu, Guangwu Xu:
Pre-computation Scheme of Window τNAF for Koblitz Curves Revisited. EUROCRYPT (2) 2021: 187-218 - [i24]Wei Yu, Guangwu Xu:
Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited. IACR Cryptol. ePrint Arch. 2021: 171 (2021) - 2020
- [i23]Han Wu, Guangwu Xu:
On the Family of Elliptic Curves y2 x3+b/픽p. IACR Cryptol. ePrint Arch. 2020: 1136 (2020)
2010 – 2019
- 2019
- [j19]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
New Distinguisher on Reduced-Round Keccak Sponge Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 242-250 (2019) - [i22]Chunhuan Zhao, Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu:
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications. IACR Cryptol. ePrint Arch. 2019: 1231 (2019) - 2018
- [j18]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu:
Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018) - [i21]Zhongxiang Zheng, Guangwu Xu, Chunhuan Zhao:
Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices. IACR Cryptol. ePrint Arch. 2018: 786 (2018) - [i20]Saud Al Musa, Guangwu Xu:
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas. IACR Cryptol. ePrint Arch. 2018: 964 (2018) - 2017
- [c12]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288 - [c11]Saud Al Musa, Guangwu Xu:
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas. INDOCRYPT 2017: 206-226 - [c10]Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434 - [c9]Guangwu Xu, Yankun Tang, Zheng Yan, Peng Zhang:
TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing. SpaCCS 2017: 139-152 - [i19]Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. IACR Cryptol. ePrint Arch. 2017: 304 (2017) - [i18]Saud Al Musa, Guangwu Xu:
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas. IACR Cryptol. ePrint Arch. 2017: 840 (2017) - [i17]Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li:
A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves. IACR Cryptol. ePrint Arch. 2017: 1020 (2017) - 2016
- [j17]Yangjiang Wei, Guangwu Xu, Yi Ming Zou:
Dynamics of linear systems over finite commutative rings. Appl. Algebra Eng. Commun. Comput. 27(6): 469-479 (2016) - [j16]William R. Trost, Guangwu Xu:
On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves. IEEE Trans. Computers 65(9): 2918-2924 (2016) - [c8]Guangwu Xu, Zheng Yan:
A Survey on Trust Evaluation in Mobile Ad Hoc Networks. MobiMedia 2016: 140-148 - [i16]Guangwu Xu, Bao Li:
On the Algorithmic Significance and Analysis of the Method of DaYan Deriving One. CoRR abs/1610.01175 (2016) - [i15]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2016: 790 (2016) - 2015
- [j15]Guangwu Xu, Zhiqiang Xu:
Compressed Sensing Matrices From Fourier Matrices. IEEE Trans. Inf. Theory 61(1): 469-478 (2015) - 2014
- [j14]Chengliang Tian, Lidong Han, Guangwu Xu:
A polynomial time algorithm for GapCVPP in l 1 norm. Sci. China Inf. Sci. 57(3): 1-7 (2014) - [j13]Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
A note on BDD problems with λ2-gap. Inf. Process. Lett. 114(1-2): 9-12 (2014) - [i14]Guangwu Xu:
On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors. CoRR abs/1409.0121 (2014) - [i13]William R. Trost, Guangwu Xu:
On the Optimal Pre-Computation of Window τNAF for Koblitz Curves. IACR Cryptol. ePrint Arch. 2014: 664 (2014) - 2013
- [i12]Guangwu Xu, Zhiqiang Xu:
Compressed Sensing Matrices from Fourier Matrices. CoRR abs/1301.0373 (2013) - [i11]Guangwu Xu, Zhiqiang Xu:
On the ℓ1-Norm Invariant Convex k-Sparse Decomposition of Signals. CoRR abs/1305.6021 (2013) - 2012
- [c7]Jun Zhang, Jun Wang, Guangwu Xu, Jean-Baptiste Thibault:
Multi-slice and multi-frame image reconstruction by predictive compressed sensing. Medical Imaging: Image Processing 2012: 83144M - 2011
- [i10]Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
Shortest Lattice Vectors in the Presence of Gaps. IACR Cryptol. ePrint Arch. 2011: 139 (2011) - 2010
- [j12]Lidong Han, Xiaoyun Wang, Guangwu Xu:
On an attack on RSA with small CRT-exponents. Sci. China Inf. Sci. 53(8): 1511-1518 (2010) - [j11]T. Tony Cai, Lie Wang, Guangwu Xu:
Stable recovery of sparse signals and an oracle inequality. IEEE Trans. Inf. Theory 56(7): 3516-3522 (2010) - [j10]T. Tony Cai, Lie Wang, Guangwu Xu:
New bounds for restricted isometry constants. IEEE Trans. Inf. Theory 56(9): 4388-4394 (2010) - [j9]T. Tony Cai, Lie Wang, Guangwu Xu:
Shifting inequality and recovery of sparse signals. IEEE Trans. Signal Process. 58(3): 1300-1308 (2010) - [i9]Jun Zhang, Jun Wang, Guangwu Xu:
Relations between $\beta$ and $\delta$ for QP and LP in Compressed Sensing Computations. CoRR abs/1012.5340 (2010)
2000 – 2009
- 2009
- [j8]Adrian Dumitrescu, Csaba D. Tóth, Guangwu Xu:
On stars and Steiner stars. Discret. Optim. 6(3): 324-332 (2009) - [j7]George I. Davida, Bruce E. Litow, Guangwu Xu:
Fast arithmetics using Chinese remaindering. Inf. Process. Lett. 109(13): 660-662 (2009) - [j6]T. Tony Cai, Guangwu Xu, Jun Zhang:
On recovery of sparse signals via l1 minimization. IEEE Trans. Inf. Theory 55(7): 3388-3397 (2009) - [c6]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009: 349-361 - [c5]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang:
New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009: 209-230 - [c4]Dong Liang, Guangwu Xu, Haifeng Wang, Kevin F. King, Dan Xu, Leslie Ying:
Toeplitz Random Encoding MR Imaging Using Compressed Sensing. ISBI 2009: 270-273 - [c3]Adrian Dumitrescu, Csaba D. Tóth, Guangwu Xu:
On stars and Steiner stars: II. SODA 2009: 311-317 - [i8]T. Tony Cai, Lie Wang, Guangwu Xu:
New Bounds for Restricted Isometry Constants. CoRR abs/0911.1564 (2009) - [i7]Wei Wang, Xiaoyun Wang, Guangwu Xu:
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. IACR Cryptol. ePrint Arch. 2009: 5 (2009) - 2008
- [c2]V. Kumar Murty, Guangwu Xu:
Security and Authentication for Networked Storage. SECRYPT 2008: 477-480 - [i6]T. Tony Cai, Guangwu Xu, Jun Zhang:
On Recovery of Sparse Signals via ℓ1 Minimization. CoRR abs/0805.0149 (2008) - [i5]George I. Davida, Bruce E. Litow, Guangwu Xu:
Fast Arithmetics Using Chinese Remaindering. CoRR abs/0806.1722 (2008) - [i4]Adrian Dumitrescu, Csaba D. Tóth, Guangwu Xu:
On stars and Steiner stars. II. CoRR abs/0806.4858 (2008) - [i3]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. IACR Cryptol. ePrint Arch. 2008: 542 (2008) - 2007
- [j5]Adrian Dumitrescu, Guangwu Xu:
On a query algorithm for a divisibility problem. ACM Commun. Comput. Algebra 41(4): 122-124 (2007) - 2006
- [j4]Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's algorithm for computing the Weil/Tate pairing. J. Algorithms 58(2): 134-149 (2006) - 2005
- [j3]Ian F. Blake, V. Kumar Murty, Guangwu Xu:
A note on window tau-NAF algorithm. Inf. Process. Lett. 95(5): 496-502 (2005) - [j2]Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Efficient algorithms for Koblitz curves over fields of characteristic three. J. Discrete Algorithms 3(1): 113-124 (2005) - [i2]Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptol. ePrint Arch. 2005: 279 (2005) - 2004
- [i1]Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing. IACR Cryptol. ePrint Arch. 2004: 65 (2004) - 2001
- [j1]Gladimir V. G. Baranoski, Jon G. Rokne, Guangwu Xu:
Virtual spectrophotometric measurements for biologically and physically based rendering. Vis. Comput. 17(8): 506-518 (2001) - 2000
- [c1]Gladimir V. G. Baranoski, Jon G. Rokne, Guangwu Xu:
Virtual Spectrophotometric Measurements for Biologically and Physically-based Rendering. PG 2000: 398-399
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint