<?xml version="1.0"?>
<dblpperson name="Mingsheng Wang" pid="65/1908" n="117">
<person key="homepages/65/1908" mdate="2009-06-09">
<author pid="65/1908">Mingsheng Wang</author>
</person>
<r><article key="journals/cybersec/SongW26" mdate="2026-02-17">
<author pid="414/1315">Peizhe Song</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>HET-PIR: practical Keyword PIR via a Novel homomorphic equality test Algorithm.</title>
<year>2026</year>
<month>December</month>
<pages>95</pages>
<volume>9</volume>
<journal>Cybersecur.</journal>
<number>1</number>
<ee>https://doi.org/10.1186/s42400-025-00506-x</ee>
<url>db/journals/cybersec/cybersec9.html#SongW26</url>
<stream>streams/journals/cybersec</stream>
</article>
</r>
<r><article key="journals/tdsc/LiaoXWTLP26" mdate="2026-03-25">
<author orcid="0000-0003-4652-5075" pid="301/9812">Huimei Liao</author>
<author orcid="0000-0002-3833-6701" pid="26/5544-2">Haixia Xu 0002</author>
<author pid="65/1908">Mingsheng Wang</author>
<author orcid="0009-0006-8507-2944" pid="362/3553">Jinling Tang</author>
<author pid="273/9280">Siyuan Leng</author>
<author pid="330/5562">Chunying Peng</author>
<title>NunChuck: A Two-Phase Chained BFT Protocol for Tolerating the Partitioning Attack.</title>
<year>2026</year>
<month>March - April</month>
<pages>3584-3596</pages>
<volume>23</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TDSC.2025.3638240</ee>
<url>db/journals/tdsc/tdsc23.html#LiaoXWTLP26</url>
<stream>streams/journals/tdsc</stream>
</article>
</r>
<r><article key="journals/tit/HuJLTLWF26" mdate="2026-01-10">
<author orcid="0009-0003-1096-3556" pid="275/3635">Xichao Hu</author>
<author orcid="0000-0001-6394-6619" pid="48/8078">Lin Jiao</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author orcid="0009-0002-8994-0455" pid="165/6175">Shizhu Tian</author>
<author pid="175/8593">Zhengbin Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="79/2089">Dengguo Feng</author>
<title>Revisit the Propagation of States: New Construction Theory and Search Method for Impossible Differentials and Impossible Polytopic Transitions.</title>
<pages>742-764</pages>
<year>2026</year>
<month>January</month>
<volume>72</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TIT.2025.3627983</ee>
<url>db/journals/tit/tit72.html#HuJLTLWF26</url>
<stream>streams/journals/tit</stream>
</article>
</r>
<r><article key="journals/cj/ChenPLW25" mdate="2025-12-26">
<author orcid="0009-0007-8183-7281" pid="181/2839">Kai Chen</author>
<author orcid="0000-0002-8519-7214" pid="16/6344">Bo Pang</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author orcid="0009-0005-0379-2343" pid="65/1908">Mingsheng Wang</author>
<title>Secure multi-party shuffling with optimal communication.</title>
<pages>1364-1376</pages>
<year>2025</year>
<volume>68</volume>
<journal>Comput. J.</journal>
<number>10</number>
<ee>https://doi.org/10.1093/comjnl/bxaf043</ee>
<url>db/journals/cj/cj68.html#ChenPLW25</url>
<stream>streams/journals/cj</stream>
</article>
</r>
<r><article key="journals/cryptography/LuoW25" mdate="2025-05-09">
<author orcid="0009-0003-1098-1519" pid="73/2249">Ming Luo</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Faster Spiral: Low-Communication, High-Rate Private Information Retrieval.</title>
<pages>13</pages>
<year>2025</year>
<volume>9</volume>
<journal>Cryptogr.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.3390/cryptography9010013</ee>
<url>db/journals/cryptography/cryptography9.html#LuoW25</url>
<stream>streams/journals/cryptography</stream>
</article>
</r>
<r><article key="journals/cybersec/YanLW25" mdate="2025-03-03">
<author orcid="0009-0000-8378-9446" pid="398/4118">Lianglin Yan</author>
<author pid="73/2249">Ming Luo</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Speedup signing: pre-rejection sampling towards dilithium.</title>
<pages>10</pages>
<year>2025</year>
<month>December</month>
<volume>8</volume>
<journal>Cybersecur.</journal>
<number>1</number>
<ee>https://doi.org/10.1186/s42400-024-00325-6</ee>
<url>db/journals/cybersec/cybersec8.html#YanLW25</url>
<stream>streams/journals/cybersec</stream>
</article>
</r>
<r><article key="journals/tches/XiaW25" mdate="2025-11-15">
<author orcid="0009-0001-4629-2905" pid="194/1034">Han Xia</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Efficient and Compact Full-Domain Functional Bootstrapping via Subring Folding.</title>
<pages>737-762</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Trans. Cryptogr. Hardw. Embed. Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.46586/tches.v2025.i4.737-762</ee>
<url>db/journals/tches/tches2025.html#XiaW25</url>
<stream>streams/journals/tches</stream>
</article>
</r>
<r><inproceedings key="conf/icics/YanZW25" mdate="2025-11-15">
<author orcid="0009-0000-8378-9446" pid="398/4118">Lianglin Yan</author>
<author orcid="0009-0007-5519-4868" pid="16/3851">Pengfei Zeng</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Turtle Wins Rabbit Again: Faster Modulus Reduction for RNS-CKKS.</title>
<pages>257-272</pages>
<year>2025</year>
<booktitle>ICICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-981-95-3540-8_14</ee>
<crossref>conf/icics/2025-1</crossref>
<url>db/conf/icics/icics2025-1.html#YanZW25</url>
<stream>streams/conf/icics</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ZengXW25" mdate="2025-10-30">
<author pid="16/3851">Pengfei Zeng</author>
<author pid="194/1034">Han Xia</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>BioVite: Efficient and Compact Privacy-Preserving Biometric Verification via Fully Homomorphic Encryption.</title>
<pages>503-521</pages>
<year>2025</year>
<booktitle>ICICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-981-95-3540-8_27</ee>
<crossref>conf/icics/2025-1</crossref>
<url>db/conf/icics/icics2025-1.html#ZengXW25</url>
<stream>streams/conf/icics</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/XiongCRLW25" mdate="2026-02-22">
<author pid="76/91">Zhenyu Xiong</author>
<author pid="181/2839">Kai Chen</author>
<author pid="179/4495">Xingwei Ren</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Scalable Distance-aware Fuzzy Private Set Intersection.</title>
<booktitle>TrustCom</booktitle>
<year>2025</year>
<pages>389-400</pages>
<crossref>conf/trustcom/2025</crossref>
<ee>https://doi.org/10.1109/Trustcom66490.2025.00050</ee>
<url>db/conf/trustcom/trustcom2025.html#XiongCRLW25</url>
<stream>streams/conf/trustcom</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/XieLWW25" mdate="2026-02-22">
<author pid="194/9729">Yuanyuan Xie</author>
<author pid="73/2249">Ming Luo</author>
<author pid="67/1771">Han Wang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud Environments.</title>
<booktitle>TrustCom</booktitle>
<year>2025</year>
<pages>1742-1751</pages>
<crossref>conf/trustcom/2025</crossref>
<ee>https://doi.org/10.1109/Trustcom66490.2025.00202</ee>
<url>db/conf/trustcom/trustcom2025.html#XieLWW25</url>
<stream>streams/conf/trustcom</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/YanZSW25" mdate="2025-08-28">
<author pid="398/4118">Lianglin Yan</author>
<author pid="16/3851">Pengfei Zeng</author>
<author pid="414/1315">Peizhe Song</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Faster Bootstrapping for CKKS with Less Modulus Consumption.</title>
<pages>1403</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/1403</ee>
<url>db/journals/iacr/iacr2025.html#YanZSW25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WangLXWH25" mdate="2025-09-28">
<author pid="67/1771-30">Han Wang 0030</author>
<author pid="73/2249">Ming Luo</author>
<author pid="194/1034">Han Xia</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="135/4973">Hanxu Hou</author>
<title>Accelerating FHEW-like Bootstrapping via New Configurations of the Underlying Cryptosystems.</title>
<pages>1711</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/1711</ee>
<url>db/journals/iacr/iacr2025.html#WangLXWH25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/cee/ZhangSWZ24" mdate="2024-10-03">
<author orcid="0000-0003-1534-3308" pid="386/5266">Nianzhong Zhang</author>
<author orcid="0000-0002-7733-264X" pid="39/4333">Qiang Song</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="10/4661">Wei Zhang</author>
<title>A dead-time compensation method for motor drive inverters based on nonlinear observer.</title>
<pages>109668</pages>
<year>2024</year>
<volume>120</volume>
<journal>Comput. Electr. Eng.</journal>
<ee>https://doi.org/10.1016/j.compeleceng.2024.109668</ee>
<url>db/journals/cee/cee120.html#ZhangSWZ24</url>
<stream>streams/journals/cee</stream>
</article>
</r>
<r><article key="journals/cybersec/LinCLWW24" mdate="2024-06-08">
<author pid="43/489">Xi Lin</author>
<author orcid="0009-0006-0180-0319" pid="259/3569">Heyang Cao</author>
<author pid="53/608">Feng-Hao Liu</author>
<author pid="217/6920">Zhedong Wang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Shorter ZK-SNARKs from square span programs over ideal lattices.</title>
<pages>33</pages>
<year>2024</year>
<month>December</month>
<volume>7</volume>
<journal>Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1186/s42400-024-00215-x</ee>
<url>db/journals/cybersec/cybersec7.html#LinCLWW24</url>
</article>
</r>
<r><article key="journals/isci/KangJLW24" mdate="2024-07-19">
<author orcid="0000-0001-7728-0424" pid="215/3232">Man Kang</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>An iterative correction method for practically LPN solving.</title>
<pages>121080</pages>
<year>2024</year>
<volume>679</volume>
<journal>Inf. Sci.</journal>
<ee>https://doi.org/10.1016/j.ins.2024.121080</ee>
<url>db/journals/isci/isci679.html#KangJLW24</url>
</article>
</r>
<r><article key="journals/tifs/TangXWTPL24" mdate="2024-05-17">
<author orcid="0009-0006-8507-2944" pid="362/3553">Jinling Tang</author>
<author orcid="0000-0002-3833-6701" pid="26/5544-2">Haixia Xu 0002</author>
<author pid="65/1908">Mingsheng Wang</author>
<author orcid="0009-0007-7853-8766" pid="35/1524">Tao Tang</author>
<author pid="330/5562">Chunying Peng</author>
<author pid="301/9812">Huimei Liao</author>
<title>A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning.</title>
<pages>4174-4187</pages>
<year>2024</year>
<volume>19</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2024.3375527</ee>
<url>db/journals/tifs/tifs19.html#TangXWTPL24</url>
</article>
</r>
<r><article key="journals/tit/LiuLCJLW24" mdate="2024-12-24">
<author orcid="0009-0006-8251-9667" pid="88/193">Fen Liu</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="01/10070">Huiqin Chen</author>
<author orcid="0000-0001-6394-6619" pid="48/8078">Lin Jiao</author>
<author orcid="0009-0003-1098-1519" pid="73/2249">Ming Luo</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation.</title>
<pages>3729-3749</pages>
<year>2024</year>
<month>May</month>
<volume>70</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TIT.2024.3349414</ee>
<url>db/journals/tit/tit70.html#LiuLCJLW24</url>
</article>
</r>
<r><article key="journals/winet/YaoXLZW24" mdate="2024-08-22">
<author orcid="0000-0001-7387-8779" pid="62/5358">Qing Yao</author>
<author pid="273/8517">Kaiwen Xu</author>
<author pid="126/7974">Taotao Li</author>
<author pid="146/9862">Yichao Zhou</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments.</title>
<pages>5157-5169</pages>
<year>2024</year>
<month>August</month>
<volume>30</volume>
<journal>Wirel. Networks</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s11276-023-03229-4</ee>
<url>db/journals/winet/winet30.html#YaoXLZW24</url>
<stream>streams/journals/winet</stream>
</article>
</r>
<r><inproceedings key="conf/asiaccs/XiaW24" mdate="2025-01-19">
<author orcid="0009-0001-4629-2905" pid="194/1034">Han Xia</author>
<author orcid="0009-0008-2410-5073" pid="65/1908">Mingsheng Wang</author>
<title>LightPIR: Single-Server PIR via FHE without Gaussian Noise.</title>
<year>2024</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3634737.3661140</ee>
<ee>https://www.wikidata.org/entity/Q130869067</ee>
<crossref>conf/asiaccs/2024</crossref>
<url>db/conf/asiaccs/asiaccs2024.html#XiaW24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosp/XiaW24" mdate="2024-09-05">
<author pid="194/1034">Han Xia</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster.</title>
<pages>293-310</pages>
<year>2024</year>
<booktitle>EuroS&#38;P</booktitle>
<ee>https://doi.org/10.1109/EuroSP60621.2024.00023</ee>
<crossref>conf/eurosp/2024</crossref>
<url>db/conf/eurosp/eurosp2024.html#XiaW24</url>
<stream>streams/conf/eurosp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/ChenLHW24" mdate="2025-07-06">
<author orcid="0009-0007-8183-7281" pid="181/2839">Kai Chen</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author orcid="0000-0002-7921-0937" pid="182/0736">Ya Han</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Fast Private Set Intersection from Polynomial Multiplication Triples.</title>
<pages>155-180</pages>
<year>2024</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-981-96-5566-3_9</ee>
<crossref>conf/icisc/2024</crossref>
<url>db/conf/icisc/icisc2024.html#ChenLHW24</url>
<stream>streams/conf/icisc</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/ChenLW24" mdate="2025-03-03">
<author orcid="0009-0007-8183-7281" pid="181/2839">Kai Chen</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>An Efficient Toolkit for Computing Third-Party Private Set Intersection.</title>
<pages>258-281</pages>
<year>2024</year>
<booktitle>INDOCRYPT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-80308-6_12</ee>
<crossref>conf/indocrypt/2024-1</crossref>
<url>db/conf/indocrypt/indocrypt2024-1.html#ChenLW24</url>
<stream>streams/conf/indocrypt</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/ZhouCW24" mdate="2024-10-31">
<author pid="07/4580">Yang Zhou</author>
<author pid="259/3569">Heyang Cao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Deep LLL on Module Lattices.</title>
<pages>24-40</pages>
<year>2024</year>
<booktitle>ISC (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-75764-8_2</ee>
<crossref>conf/isw/2024-2</crossref>
<url>db/conf/isw/isc2024-2.html#ZhouCW24</url>
<stream>streams/conf/isw</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/RenLW24" mdate="2025-05-01">
<author orcid="0009-0002-4040-2461" pid="179/4495">Xingwei Ren</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.</title>
<pages>183-204</pages>
<year>2024</year>
<booktitle>SAC (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-82841-6_8</ee>
<crossref>conf/sacrypt/2024-2</crossref>
<url>db/conf/sacrypt/sacrypt2024-2.html#RenLW24</url>
<stream>streams/conf/sacrypt</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RenLW24" mdate="2024-09-01">
<author pid="179/4495">Xingwei Ren</author>
<author pid="76/6452">Yongqiang Li</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity.</title>
<pages>1304</pages>
<year>2024</year>
<volume>2024</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2024/1304</ee>
<url>db/journals/iacr/iacr2024.html#RenLW24</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><article key="journals/cybersec/LiuLCW23" mdate="2024-06-08">
<author pid="20/7910">Yuting Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="01/10070">Huiqin Chen</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Full-round impossible differential attack on shadow block cipher.</title>
<pages>52</pages>
<year>2023</year>
<month>December</month>
<volume>6</volume>
<journal>Cybersecur.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1186/s42400-023-00184-7</ee>
<url>db/journals/cybersec/cybersec6.html#LiuLCW23</url>
</article>
</r>
<r><article key="journals/sensors/WangSL23" mdate="2024-02-29">
<author pid="65/1908">Mingsheng Wang</author>
<author orcid="0000-0002-7733-264X" pid="39/4333">Qiang Song</author>
<author pid="242/0077">Wuxuan Lai</author>
<title>On Model-Based Transfer Learning Method for the Detection of Inter-Turn Short Circuit Faults in PMSM.</title>
<pages>9145</pages>
<year>2023</year>
<month>November</month>
<volume>23</volume>
<journal>Sensors</journal>
<number>22</number>
<ee type="oa">https://doi.org/10.3390/s23229145</ee>
<url>db/journals/sensors/sensors23.html#WangSL23</url>
</article>
</r>
<r><inproceedings key="conf/acisp/Chen0ALJW23" mdate="2023-07-07">
<author orcid="0000-0001-6965-1985" pid="01/10070">Huiqin Chen</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="216/6090">Parhat Abla</author>
<author pid="287/7649">Zhiran Li</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.</title>
<pages>431-451</pages>
<year>2023</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-031-35486-1_19</ee>
<crossref>conf/acisp/2023</crossref>
<url>db/conf/acisp/acisp2023.html#Chen0ALJW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/ChenLHLJW23" mdate="2023-10-27">
<author orcid="0000-0001-6965-1985" pid="01/10070">Huiqin Chen</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="275/3635">Xichao Hu</author>
<author pid="175/8593">Zhengbin Liu</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.</title>
<pages>3-22</pages>
<year>2023</year>
<booktitle>ACNS Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-031-41181-6_1</ee>
<crossref>conf/acns/2023w</crossref>
<url>db/conf/acns/acns2023w.html#ChenLHLJW23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scisec/AnWLLL23" mdate="2023-12-10">
<author orcid="0000-0002-8795-2471" pid="304/9479">Zhuo An</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="45/8193">Dongdong Liu</author>
<author pid="126/7974">Taotao Li</author>
<author pid="00/7515">Qiang Lai</author>
<title>Hydra: An Efficient Asynchronous DAG-Based BFT Protocol.</title>
<pages>439-459</pages>
<year>2023</year>
<booktitle>SciSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-45933-7_26</ee>
<crossref>conf/scisec/2023</crossref>
<url>db/conf/scisec/scisec2023.html#AnWLLL23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/LinXLW23" mdate="2025-04-08">
<author pid="43/489">Xi Lin</author>
<author pid="194/1034">Han Xia</author>
<author pid="76/6452">Yongqiang Li</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS.</title>
<pages>329-349</pages>
<year>2023</year>
<booktitle>SecureComm (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-64948-6_17</ee>
<crossref>conf/securecomm/2023-1</crossref>
<url>db/conf/securecomm/securecomm2023-1.html#LinXLW23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/HuLJLW23" mdate="2023-10-06">
<author pid="275/3635">Xichao Hu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="175/8593">Zhengbin Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.</title>
<pages>496</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/496</ee>
<url>db/journals/iacr/iacr2023.html#HuLJLW23</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ChenLHLJW23" mdate="2023-10-07">
<author pid="01/10070">Huiqin Chen</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="275/3635">Xichao Hu</author>
<author pid="175/8593">Zhengbin Liu</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.</title>
<pages>1353</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/1353</ee>
<url>db/journals/iacr/iacr2023.html#ChenLHLJW23</url>
</article>
</r>
<r><article key="journals/access/KangW22" mdate="2022-02-08">
<author orcid="0000-0001-7728-0424" pid="215/3232">Man Kang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>New Genetic Operators for Developing S-Boxes With Low Boomerang Uniformity.</title>
<pages>10898-10906</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3144458</ee>
<url>db/journals/access/access10.html#KangW22</url>
</article>
</r>
<r><article key="journals/cj/HuLJW22" mdate="2025-01-19">
<author pid="275/3635">Xichao Hu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.</title>
<pages>1560-1573</pages>
<year>2022</year>
<volume>65</volume>
<journal>Comput. J.</journal>
<number>6</number>
<ee>https://doi.org/10.1093/comjnl/bxaa203</ee>
<ee>https://www.wikidata.org/entity/Q123116863</ee>
<url>db/journals/cj/cj65.html#HuLJW22</url>
</article>
</r>
<r><article key="journals/cj/LiLW22" mdate="2022-09-14">
<author pid="126/7974">Taotao Li</author>
<author pid="41/972">Dequan Li</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Blockchain-based Fair and Decentralized Data Trading Model.</title>
<pages>2133-2145</pages>
<year>2022</year>
<volume>65</volume>
<journal>Comput. J.</journal>
<number>8</number>
<ee>https://doi.org/10.1093/comjnl/bxab050</ee>
<url>db/journals/cj/cj65.html#LiLW22</url>
</article>
</r>
<r><article key="journals/cj/XuLW22" mdate="2023-08-28">
<author pid="83/2535">Zheng Xu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Observations on the Security of COMET.</title>
<pages>2247-2261</pages>
<year>2022</year>
<volume>65</volume>
<journal>Comput. J.</journal>
<number>9</number>
<ee>https://doi.org/10.1093/comjnl/bxab061</ee>
<ee>https://www.wikidata.org/entity/Q115000204</ee>
<url>db/journals/cj/cj65.html#XuLW22</url>
</article>
</r>
<r><article key="journals/iet-ifs/LiuLJW22" mdate="2022-05-18">
<author pid="175/8593">Zhengbin Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author orcid="0000-0001-6394-6619" pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the upper bound of squared correlation of SIMON-like functions and its applications.</title>
<pages>220-234</pages>
<year>2022</year>
<volume>16</volume>
<journal>IET Inf. Secur.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1049/ise2.12057</ee>
<url>db/journals/iet-ifs/iet-ifs16.html#LiuLJW22</url>
</article>
</r>
<r><article key="journals/sensors/SongWLZ22" mdate="2024-08-22">
<author orcid="0000-0002-7733-264X" pid="39/4333">Qiang Song</author>
<author orcid="0000-0002-6343-1516" pid="65/1908">Mingsheng Wang</author>
<author pid="242/0077">Wuxuan Lai</author>
<author pid="248/2954">Sifang Zhao</author>
<title>Multiscale Kernel-Based Residual CNN for Estimation of Inter-Turn Short Circuit Fault in PMSM.</title>
<pages>6870</pages>
<year>2022</year>
<volume>22</volume>
<journal>Sensors</journal>
<number>18</number>
<ee type="oa">https://doi.org/10.3390/s22186870</ee>
<url>db/journals/sensors/sensors22.html#SongWLZ22</url>
</article>
</r>
<r><inproceedings key="conf/trustcom/LiuWLH22" mdate="2023-03-27">
<author pid="45/8193">Dongdong Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="126/7974">Taotao Li</author>
<author pid="182/0736">Ya Han</author>
<title>A Faster Blockchain Sharding Protocol for Decentralized Ledger.</title>
<pages>864-873</pages>
<year>2022</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom56396.2022.00120</ee>
<crossref>conf/trustcom/2022</crossref>
<url>db/conf/trustcom/trustcom2022.html#LiuWLH22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/XuLJWM22" mdate="2022-02-18">
<author pid="83/2535">Zheng Xu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="47/6600">Willi Meier</author>
<title>Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.</title>
<pages>135</pages>
<year>2022</year>
<volume>2022</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2022/135</ee>
<url>db/journals/iacr/iacr2022.html#XuLJWM22</url>
</article>
</r>
<r><article key="journals/tit/LiuLJW21" mdate="2023-08-28">
<author pid="175/8593">Zhengbin Liu</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author orcid="0000-0001-6394-6619" pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers.</title>
<pages>1054-1068</pages>
<year>2021</year>
<volume>67</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TIT.2020.3040543</ee>
<ee>https://www.wikidata.org/entity/Q121338990</ee>
<url>db/journals/tit/tit67.html#LiuLJW21</url>
</article>
</r>
<r><inproceedings key="conf/ica3pp/LiWDL21" mdate="2022-03-02">
<author pid="126/7974">Taotao Li</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="161/4814">Zhihong Deng</author>
<author pid="45/8193">Dongdong Liu</author>
<title>SEPoW: Secure and Efficient Proof of Work Sidechains.</title>
<pages>376-396</pages>
<year>2021</year>
<booktitle>ICA3PP (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-95391-1_24</ee>
<crossref>conf/ica3pp/2021-3</crossref>
<url>db/conf/ica3pp/ica3pp2021-3.html#LiWDL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/AblaW21" mdate="2022-04-01">
<author pid="216/6090">Parhat Abla</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size.</title>
<pages>398-418</pages>
<year>2021</year>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1007/978-3-030-99277-4_19</ee>
<crossref>conf/sacrypt/2021</crossref>
<url>db/conf/sacrypt/sacrypt2021.html#AblaW21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/AblaW21" mdate="2021-11-23">
<author pid="216/6090">Parhat Abla</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>An Efficient Post-Quantum PKE from RLWR with Simple Security Proof.</title>
<pages>407-423</pages>
<year>2021</year>
<booktitle>SecureComm (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-90022-9_22</ee>
<crossref>conf/securecomm/2021-2</crossref>
<url>db/conf/securecomm/securecomm2021-2.html#AblaW21</url>
</inproceedings>
</r>
<r><article key="journals/sensors/SongZW20" mdate="2024-07-19">
<author orcid="0000-0002-7733-264X" pid="39/4333">Qiang Song</author>
<author orcid="0000-0003-4476-9631" pid="248/2954">Sifang Zhao</author>
<author orcid="0000-0002-6343-1516" pid="65/1908">Mingsheng Wang</author>
<title>On the Accuracy of Fault Diagnosis for Rolling Element Bearings Using Improved DFA and Multi-Sensor Data Fusion Method.</title>
<pages>6465</pages>
<year>2020</year>
<volume>20</volume>
<journal>Sensors</journal>
<number>22</number>
<ee type="oa">https://doi.org/10.3390/s20226465</ee>
<ee>https://www.wikidata.org/entity/Q102072992</ee>
<url>db/journals/sensors/sensors20.html#SongZW20</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/Hu0JTW20" mdate="2025-03-03">
<author pid="275/3635">Xichao Hu</author>
<author orcid="0000-0002-2551-2737" pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="165/6175">Shizhu Tian</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.</title>
<pages>415-445</pages>
<year>2020</year>
<booktitle>ASIACRYPT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-64837-4_14</ee>
<crossref>conf/asiacrypt/2020-1</crossref>
<url>db/conf/asiacrypt/asiacrypt2020-1.html#Hu0JTW20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/HuLJTW20" mdate="2020-09-30">
<author pid="275/3635">Xichao Hu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="165/6175">Shizhu Tian</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).</title>
<pages>1093</pages>
<year>2020</year>
<volume>2020</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2020/1093</ee>
<url>db/journals/iacr/iacr2020.html#HuLJTW20</url>
</article>
</r>
<r><inproceedings key="conf/globecom/LiCW19" mdate="2020-03-04">
<author pid="76/8613">Peiyao Li</author>
<author pid="259/3569">Heyang Cao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>BSA: Enhancing Attribute-Based Encryption in Cloud Computing with Decentralized Specification.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOBECOM38437.2019.9013832</ee>
<crossref>conf/globecom/2019</crossref>
<url>db/conf/globecom/globecom2019.html#LiCW19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wasa/WeiLLLW19" mdate="2021-03-17">
<author pid="216/6250">Qianwen Wei</author>
<author pid="09/6954">Shujun Li</author>
<author pid="64/6025-59">Wei Li 0059</author>
<author pid="93/6234-4">Hong Li 0004</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.</title>
<pages>358-369</pages>
<year>2019</year>
<booktitle>WASA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-23597-0_29</ee>
<crossref>conf/wasa/2019</crossref>
<url>db/conf/wasa/wasa2019.html#WeiLLLW19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/LiuLJW19" mdate="2020-08-31">
<author pid="175/8593">Zhengbin Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers.</title>
<pages>1438</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/1438</ee>
<url>db/journals/iacr/iacr2019.html#LiuLJW19</url>
</article>
</r>
<r><article key="journals/tosc/LiTYW18" mdate="2022-10-02">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="165/6175">Shizhu Tian</author>
<author orcid="0000-0002-7902-603X" pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the Generalization of Butterfly Structure.</title>
<pages>160-179</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Trans. Symmetric Cryptol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.13154/tosc.v2018.i1.160-179</ee>
<url>db/journals/tosc/tosc2018.html#LiTYW18</url>
</article>
</r>
<r><inproceedings key="conf/icics/HanLW18" mdate="2020-08-31">
<author pid="182/0736">Ya Han</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets.</title>
<pages>647-663</pages>
<year>2018</year>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01950-1_38</ee>
<crossref>conf/icics/2018</crossref>
<url>db/conf/icics/icics2018.html#HanLW18</url>
</inproceedings>
</r>
<r><article key="journals/cma/LiGCCLZW17" mdate="2021-10-14">
<author orcid="0000-0002-2360-0426" pid="64/6025-103">Wei Li 0103</author>
<author orcid="0000-0001-9587-1324" pid="292/8521">Zhixiong Gong</author>
<author pid="250/4593">Yingbin Chai</author>
<author pid="176/3012">Cong Cheng</author>
<author pid="02/7633">Tianyun Li</author>
<author pid="44/8211">Qifan Zhang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Hybrid gradient smoothing technique with discrete shear gap method for shell structures.</title>
<pages>1826-1855</pages>
<year>2017</year>
<volume>74</volume>
<journal>Comput. Math. Appl.</journal>
<number>8</number>
<ee>https://doi.org/10.1016/j.camwa.2017.06.047</ee>
<ee>https://www.wikidata.org/entity/Q57701793</ee>
<url>db/journals/cma/cma74.html#LiGCCLZW17</url>
</article>
</r>
<r><article key="journals/tosc/LiuLW17" mdate="2020-08-31">
<author pid="175/8593">Zhengbin Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Optimal Differential Trails in SIMON-like Ciphers.</title>
<pages>358-379</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Trans. Symmetric Cryptol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.13154/tosc.v2017.i1.358-379</ee>
<url>db/journals/tosc/tosc2017.html#LiuLW17</url>
</article>
</r>
<r><inproceedings key="conf/icics/WangFW17" mdate="2018-04-18">
<author pid="217/6920">Zhedong Wang</author>
<author pid="143/4451">Xiong Fan</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Compact Inner Product Encryption from LWE.</title>
<pages>141-153</pages>
<year>2017</year>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-89500-0_12</ee>
<crossref>conf/icics/2017</crossref>
<url>db/conf/icics/icics2017.html#WangFW17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wasa/ZhangJTW17" mdate="2017-06-09">
<author pid="07/8436">Weijuan Zhang</author>
<author pid="41/761">Xiaoqi Jia</author>
<author pid="201/1260">Jianwei Tai</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds.</title>
<pages>665-677</pages>
<year>2017</year>
<booktitle>WASA</booktitle>
<ee>https://doi.org/10.1007/978-3-319-60033-8_57</ee>
<crossref>conf/wasa/2017</crossref>
<url>db/conf/wasa/wasa2017.html#ZhangJTW17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/LiuLW17" mdate="2020-08-31">
<author pid="175/8593">Zhengbin Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Optimal Differential Trails in SIMON-like Ciphers.</title>
<pages>178</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/178</ee>
<url>db/journals/iacr/iacr2017.html#LiuLW17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiuLW17a" mdate="2020-08-31">
<author pid="175/8593">Zhengbin Liu</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>The Security of SIMON-like Ciphers Against Linear Cryptanalysis.</title>
<pages>576</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/576</ee>
<url>db/journals/iacr/iacr2017.html#LiuLW17a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiAWW17" mdate="2020-05-11">
<author pid="126/7974">Taotao Li</author>
<author pid="216/6090">Parhat Abla</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="216/6250">Qianwen Wei</author>
<title>Designing Proof of Transaction Puzzles for Cryptocurrency.</title>
<pages>1242</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/1242</ee>
<url>db/journals/iacr/iacr2017.html#LiAWW17</url>
</article>
</r>
<r><article key="journals/ijnsec/JiangTW16" mdate="2021-01-04">
<author pid="30/6713">Shaoquan Jiang</author>
<author pid="152/1683">Zailiang Tang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the CLD Attack to a Statistical Model of a Key Stream Generator.</title>
<pages>987-992</pages>
<year>2016</year>
<volume>18</volume>
<journal>Int. J. Netw. Secur.</journal>
<number>5</number>
<ee type="oa">http://ijns.jalaxy.com.tw/contents/ijns-v18-n5/ijns-2016-v18-n5-p987-992.pdf</ee>
<url>db/journals/ijnsec/ijnsec18.html#JiangTW16</url>
</article>
</r>
<r><article key="journals/moc/GaoVW16" mdate="2017-05-28">
<author pid="97/1429">Shuhong Gao</author>
<author pid="86/9379">Frank Volny IV</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A new framework for computing Gr&#246;bner bases.</title>
<year>2016</year>
<volume>85</volume>
<journal>Math. Comput.</journal>
<number>297</number>
<ee>https://doi.org/10.1090/mcom/2969</ee>
<url>db/journals/moc/moc85.html#GaoVW16</url>
<pages>449-465</pages>
</article>
</r>
<r><article key="journals/scn/LinZW16" mdate="2023-08-28">
<author pid="175/4135">Suqing Lin</author>
<author pid="z/RuiZhang2">Rui Zhang 0002</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Verifiable attribute-based proxy re-encryption for secure public cloud data sharing.</title>
<pages>1748-1758</pages>
<year>2016</year>
<volume>9</volume>
<journal>Secur. Commun. Networks</journal>
<number>12</number>
<ee>https://doi.org/10.1002/sec.1446</ee>
<ee>https://www.wikidata.org/entity/Q115150238</ee>
<url>db/journals/scn/scn9.html#LinZW16</url>
</article>
</r>
<r><inproceedings key="conf/eurocrypt/ZhangJW16" mdate="2017-05-24">
<author pid="13/5236">Bin Zhang</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Faster Algorithms for Solving LPN.</title>
<pages>168-195</pages>
<year>2016</year>
<booktitle>EUROCRYPT (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-662-49890-3_7</ee>
<crossref>conf/eurocrypt/2016-1</crossref>
<url>db/conf/eurocrypt/eurocrypt2016-1.html#ZhangJW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fse/LiW16" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the Construction of Lightweight Circulant Involutory MDS Matrices.</title>
<pages>121-139</pages>
<year>2016</year>
<booktitle>FSE</booktitle>
<ee>https://doi.org/10.1007/978-3-662-52993-5_7</ee>
<crossref>conf/fse/2016</crossref>
<url>db/conf/fse/fse2016.html#LiW16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ZhangJWZHWL16" mdate="2025-10-14">
<author pid="07/8436">Weijuan Zhang</author>
<author pid="41/761">Xiaoqi Jia</author>
<author pid="93/96">Chang Wang</author>
<author orcid="0000-0001-9432-9779" pid="65/3618">Shengzhi Zhang</author>
<author pid="36/10372">Qingjia Huang</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="21/6121-5">Peng Liu 0005</author>
<title>A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.</title>
<pages>361-375</pages>
<year>2016</year>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-50011-9_28</ee>
<crossref>conf/icics/2016</crossref>
<url>db/conf/icics/icics2016.html#ZhangJWZHWL16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ZhangJW16" mdate="2020-05-11">
<author pid="13/5236">Bin Zhang</author>
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Faster Algorithms for Solving LPN.</title>
<pages>275</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/275</ee>
<url>db/journals/iacr/iacr2016.html#ZhangJW16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiW16" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the Construction of Lightweight Circulant Involutory MDS Matrices.</title>
<pages>406</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/406</ee>
<url>db/journals/iacr/iacr2016.html#LiW16</url>
</article>
</r>
<r><article key="journals/tdhms/XiaZFW15" mdate="2021-04-09">
<author pid="18/3941">Bingbing Xia</author>
<author orcid="0000-0002-5617-8399" pid="76/7010">Xianfeng Zhao</author>
<author pid="79/2089">Dengguo Feng</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.</title>
<pages>1-20</pages>
<year>2015</year>
<volume>10</volume>
<journal>Trans. Data Hiding Multim. Secur.</journal>
<ee>https://doi.org/10.1007/978-3-662-46739-8_1</ee>
<crossref>journals/tdhms/2015-10</crossref>
<url>db/journals/tdhms/tdhms10.html#XiaZFW15</url>
</article>
</r>
<r><inproceedings key="conf/isw/JiaoZW15" mdate="2017-05-21">
<author pid="48/8078">Lin Jiao</author>
<author pid="13/5236">Bin Zhang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Two Generic Methods of Analyzing Stream Ciphers.</title>
<pages>379-396</pages>
<year>2015</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23318-5_21</ee>
<crossref>conf/isw/2015</crossref>
<url>db/conf/isw/isc2015.html#JiaoZW15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/WuWHWW15" mdate="2023-11-28">
<author pid="30/10309">Shengbao Wu</author>
<author pid="91/5936-1">Hongjun Wu 0001</author>
<author pid="34/808-15">Tao Huang 0015</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="74/2464">Wenling Wu</author>
<title>Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE.</title>
<pages>159</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/159</ee>
<url>db/journals/iacr/iacr2015.html#WuWHWW15</url>
</article>
</r>
<r><article key="journals/dcc/LiW14" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1).</title>
<pages>249-264</pages>
<year>2014</year>
<volume>72</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10623-012-9760-9</ee>
<url>db/journals/dcc/dcc72.html#LiW14</url>
</article>
</r>
<r><article key="journals/dcc/YuWL14" mdate="2022-10-02">
<author orcid="0000-0002-7902-603X" pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<title>A matrix approach for constructing quadratic APN functions.</title>
<pages>587-600</pages>
<year>2014</year>
<volume>73</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10623-014-9955-3</ee>
<url>db/journals/dcc/dcc73.html#YuWL14</url>
</article>
</r>
<r><inproceedings key="conf/acisp/ZhongWZW14" mdate="2017-05-25">
<author pid="15/7449">Xiao Zhong</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="13/5236">Bin Zhang</author>
<author pid="30/10309">Shengbao Wu</author>
<title>Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.</title>
<pages>131-147</pages>
<year>2014</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-319-08344-5_9</ee>
<crossref>conf/acisp/2014</crossref>
<url>db/conf/acisp/acisp2014.html#ZhongWZW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ches/LiW14" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Constructing S-boxes for Lightweight Cryptography with Feistel Structure.</title>
<pages>127-146</pages>
<year>2014</year>
<booktitle>CHES</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-44709-3_8</ee>
<crossref>conf/ches/2014</crossref>
<url>db/conf/ches/ches2014.html#LiW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ZhongWZW14" mdate="2021-12-06">
<author pid="15/7449">Xiao Zhong</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="13/5236-3">Bin Zhang 0003</author>
<author pid="30/10309">Shengbao Wu</author>
<title>A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter.</title>
<pages>132-142</pages>
<year>2014</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-21966-0_10</ee>
<crossref>conf/icics/2014</crossref>
<url>db/conf/icics/icics2014.html#ZhongWZW14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/JiaoZW14" mdate="2017-05-21">
<author pid="48/8078">Lin Jiao</author>
<author pid="13/5236">Bin Zhang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.</title>
<pages>104-119</pages>
<year>2014</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-13257-0_7</ee>
<crossref>conf/isw/2014</crossref>
<url>db/conf/isw/isc2014.html#JiaoZW14</url>
</inproceedings>
</r>
<r><article key="journals/dam/YuW13" mdate="2022-10-02">
<author orcid="0000-0002-7902-603X" pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Permutation polynomials and their differential properties over residue class rings.</title>
<pages>3104-3108</pages>
<year>2013</year>
<volume>161</volume>
<journal>Discret. Appl. Math.</journal>
<number>18</number>
<ee type="oa">https://doi.org/10.1016/j.dam.2013.06.020</ee>
<url>db/journals/dam/dam161.html#YuW13</url>
</article>
</r>
<r><article key="journals/tit/LiW13" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>The Nonexistence of Permutations EA-Equivalent to Certain AB Functions.</title>
<pages>672-679</pages>
<year>2013</year>
<volume>59</volume>
<journal>IEEE Trans. Inf. Theory</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TIT.2012.2213064</ee>
<url>db/journals/tit/tit59.html#LiW13</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/WuWHWW13" mdate="2023-11-28">
<author pid="30/10309">Shengbao Wu</author>
<author orcid="0000-0002-9713-7542" pid="91/5936-1">Hongjun Wu 0001</author>
<author pid="34/808-15">Tao Huang 0015</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="74/2464">Wenling Wu</author>
<title>Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE.</title>
<pages>377-404</pages>
<year>2013</year>
<booktitle>ASIACRYPT (1)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-42033-7_20</ee>
<crossref>conf/asiacrypt/2013-1</crossref>
<url>db/conf/asiacrypt/asiacrypt2013-1.html#WuWHWW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/WuW13" mdate="2019-10-31">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Integral Attacks on Reduced-Round PRESENT.</title>
<pages>331-345</pages>
<year>2013</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-02726-5_24</ee>
<crossref>conf/icics/2013</crossref>
<url>db/conf/icics/icics2013.html#WuW13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/JiaoZW13" mdate="2017-05-21">
<author pid="48/8078">Lin Jiao</author>
<author pid="13/5236">Bin Zhang</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.</title>
<pages>169-184</pages>
<year>2013</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-27659-5_12</ee>
<crossref>conf/isw/2013</crossref>
<url>db/conf/isw/isc2013.html#JiaoZW13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/YuWL13" mdate="2020-08-31">
<author pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<title>A Matrix Approach for Constructing Quadratic APN Functions.</title>
<pages>7</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/007</ee>
<url>db/journals/iacr/iacr2013.html#YuWL13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/YuW13" mdate="2020-05-11">
<author pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Permutation Polynomials and Their Differential Properties over Residue Class Rings.</title>
<pages>251</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/251</ee>
<url>db/journals/iacr/iacr2013.html#YuW13</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiWY13" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="38/10308">Yuyin Yu</author>
<title>Constructing Differentially 4-uniform Permutations over GF(2<sup>2k</sup>) from the Inverse Function Revisited.</title>
<pages>731</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/731</ee>
<url>db/journals/iacr/iacr2013.html#LiWY13</url>
</article>
</r>
<r><inproceedings key="conf/cisc/JiaoWZL12" mdate="2020-08-31">
<author pid="48/8078">Lin Jiao</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="13/5236">Bin Zhang</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<title>An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.</title>
<pages>294-310</pages>
<year>2012</year>
<booktitle>Inscrypt</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38519-3_19</ee>
<crossref>conf/cisc/2012</crossref>
<url>db/conf/cisc/inscrypt2012.html#JiaoWZL12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/WuW12" mdate="2017-05-19">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.</title>
<pages>283-302</pages>
<year>2012</year>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34931-7_17</ee>
<crossref>conf/indocrypt/2012</crossref>
<url>db/conf/indocrypt/indocrypt2012.html#WuW12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacrypt/WuWW12" mdate="2017-05-21">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="74/2464">Wenling Wu</author>
<title>Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.</title>
<pages>355-371</pages>
<year>2012</year>
<booktitle>Selected Areas in Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35999-6_23</ee>
<crossref>conf/sacrypt/2012</crossref>
<url>db/conf/sacrypt/sacrypt2012.html#WuWW12</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/WuW12" mdate="2020-05-11">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Automatic Search of Truncated Impossible Differentials and Applications.</title>
<pages>214</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/214</ee>
<url>db/journals/iacr/iacr2012.html#WuW12</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ZhongW12" mdate="2020-05-11">
<author pid="15/7449">Xiao Zhong</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions.</title>
<pages>338</pages>
<year>2012</year>
<volume>2012</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2012/338</ee>
<url>db/journals/iacr/iacr2012.html#ZhongW12</url>
</article>
</r>
<r><article key="journals/ccds/LiW11" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Permutation polynomials EA-equivalent to the inverse function over GF (2<sup><i>n</i></sup>).</title>
<pages>175-186</pages>
<year>2011</year>
<volume>3</volume>
<journal>Cryptogr. Commun.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s12095-011-0045-3</ee>
<url>db/journals/ccds/ccds3.html#LiW11</url>
</article>
</r>
<r><article key="journals/cssp/LiuLW11" mdate="2023-08-28">
<author pid="73/8650">Jinwang Liu</author>
<author pid="27/1131">Dongmei Li</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On General Factorizations for <i>n</i>-D Polynomial Matrices.</title>
<pages>553-566</pages>
<year>2011</year>
<volume>30</volume>
<journal>Circuits Syst. Signal Process.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00034-010-9229-x</ee>
<ee>https://www.wikidata.org/entity/Q114231762</ee>
<url>db/journals/cssp/cssp30.html#LiuLW11</url>
</article>
</r>
<r><article key="journals/dcc/LiW11" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On EA-equivalence of certain permutations to power mappings.</title>
<pages>259-269</pages>
<year>2011</year>
<volume>58</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10623-010-9406-8</ee>
<url>db/journals/dcc/dcc58.html#LiW11</url>
</article>
</r>
<r><inproceedings key="conf/icics/YuW11" mdate="2022-10-02">
<author orcid="0000-0002-7902-603X" pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure.</title>
<pages>136-142</pages>
<year>2011</year>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-25243-3_11</ee>
<crossref>conf/icics/2011</crossref>
<url>db/conf/icics/icics2011.html#YuW11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/YuWL11" mdate="2020-08-31">
<author pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="76/6452-1">Yongqiang Li 0001</author>
<title>Constructing differential 4-uniform permutations from know ones.</title>
<pages>47</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/047</ee>
<url>db/journals/iacr/iacr2011.html#YuWL11</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WuW11" mdate="2020-05-11">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Security Evaluation against Differential Cryptanalysis for Block Cipher Structures.</title>
<pages>551</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/551</ee>
<url>db/journals/iacr/iacr2011.html#WuW11</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiW11" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Constructing differentially 4-uniform permutations over 2<sup>2m</sup> from quadratic APN permutations over 2<sup>2m+1</sup>.</title>
<pages>642</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/642</ee>
<url>db/journals/iacr/iacr2011.html#LiW11</url>
</article>
</r>
<r><article key="journals/mssp/LiuW10" mdate="2023-08-28">
<author pid="73/8650">Jinwang Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Notes on factor prime factorizations for <i>n</i>-D polynomial matrices.</title>
<pages>87</pages>
<year>2010</year>
<volume>21</volume>
<journal>Multidimens. Syst. Signal Process.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11045-009-0089-0</ee>
<ee>https://www.wikidata.org/entity/Q114224598</ee>
<url>db/journals/mssp/mssp21.html#LiuW10</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/WuWY10" mdate="2020-05-11">
<author pid="30/10309">Shengbao Wu</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="56/2877">Zheng Yuan</author>
<title>A Flaw in The Internal State Recovery Attack on ALPHA-MAC.</title>
<pages>160</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/160</ee>
<url>db/journals/iacr/iacr2010.html#WuWY10</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LiW10a" mdate="2020-08-31">
<author pid="76/6452-1">Yongqiang Li 0001</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On permutation polynomials EA-equivalent to the inverse function over GF(2<sup>n</sup>).</title>
<pages>573</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/573</ee>
<url>db/journals/iacr/iacr2010.html#LiW10a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GaoVW10" mdate="2020-05-11">
<author pid="97/1429">Shuhong Gao</author>
<author pid="86/9379">Frank Volny</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A new algorithm for computing Groebner bases.</title>
<pages>641</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/641</ee>
<url>db/journals/iacr/iacr2010.html#GaoVW10</url>
</article>
</r>
<r><article key="journals/moc/GaoWW09" mdate="2021-02-17">
<author pid="97/1429">Shuhong Gao</author>
<author pid="41/544">Daqing Wan</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Primary decomposition of zero-dimensional ideals over finite fields.</title>
<pages>509-521</pages>
<year>2009</year>
<volume>78</volume>
<journal>Math. Comput.</journal>
<number>265</number>
<ee type="oa">https://doi.org/10.1090/S0025-5718-08-02115-7</ee>
<url>db/journals/moc/moc78.html#GaoWW09</url>
</article>
</r>
<r><inproceedings key="conf/ifip12/ZhangCW09" mdate="2018-06-26">
<author pid="94/6627">Wensheng Zhang</author>
<author pid="23/8118">Hongfu Chen</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A Forecast Model of Agricultural and Livestock Products Price.</title>
<pages>40-48</pages>
<year>2009</year>
<booktitle>CCTA</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-12220-0_7</ee>
<crossref>conf/ifip12/2009ccta</crossref>
<url>db/conf/ifip12/ccta2009.html#ZhangCW09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/YuW09a" mdate="2020-05-11">
<author pid="38/10308">Yuyin Yu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure.</title>
<pages>301</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/301</ee>
<url>db/journals/iacr/iacr2009.html#YuW09a</url>
</article>
</r>
<r><article key="journals/cca/WangL08" mdate="2020-03-04">
<author pid="65/1908">Mingsheng Wang</author>
<author pid="73/8650">Jinwang Liu</author>
<title>Factorization problems on n-D polynomial matrices (abstract only).</title>
<pages>88-89</pages>
<year>2008</year>
<volume>42</volume>
<journal>ACM Commun. Comput. Algebra</journal>
<number>1-2</number>
<ee>https://doi.org/10.1145/1394042.1394098</ee>
<url>db/journals/cca/cca42.html#WangL08</url>
</article>
</r>
<r><article key="journals/tcas/Wang08" mdate="2020-05-27">
<author pid="65/1908">Mingsheng Wang</author>
<title>Remarks on n -D Polynomial Matrix Factorization Problems.</title>
<pages>61-64</pages>
<year>2008</year>
<volume>55-II</volume>
<journal>IEEE Trans. Circuits Syst. II Express Briefs</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TCSII.2007.909866</ee>
<url>db/journals/tcas/tcasII55.html#Wang08</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TangPLYW08" mdate="2021-01-22">
<author pid="91/470-3">Chunming Tang 0003</author>
<author pid="49/2823">Dingyi Pei</author>
<author pid="06/6369">Zhuojun Liu</author>
<author pid="42/2248">Zheng-an Yao</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation.</title>
<pages>34</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/034</ee>
<url>db/journals/iacr/iacr2008.html#TangPLYW08</url>
</article>
</r>
<r><article key="journals/ffa/Wang07" mdate="2021-02-12">
<author pid="65/1908">Mingsheng Wang</author>
<title>Parameter choices on Guruswami-Sudan algorithm for polynomial reconstruction.</title>
<pages>877-886</pages>
<year>2007</year>
<volume>13</volume>
<journal>Finite Fields Their Appl.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1016/j.ffa.2005.10.002</ee>
<url>db/journals/ffa/ffa13.html#Wang07</url>
</article>
</r>
<r><article key="journals/tcas/Wang07" mdate="2023-08-28">
<author pid="65/1908">Mingsheng Wang</author>
<title>On Factor Prime Factorizations for n-D Polynomial Matrices.</title>
<pages>1398-1405</pages>
<year>2007</year>
<volume>54-I</volume>
<journal>IEEE Trans. Circuits Syst. I Regul. Pap.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TCSI.2007.897720</ee>
<ee>https://www.wikidata.org/entity/Q114085042</ee>
<url>db/journals/tcas/tcasI54.html#Wang07</url>
</article>
</r>
<r><inproceedings key="conf/ispec/TanLM05" mdate="2017-05-21">
<author pid="91/6587">Zuowen Tan</author>
<author pid="06/6369">Zhuojun Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes.</title>
<pages>374-385</pages>
<ee>https://doi.org/10.1007/978-3-540-31979-5_32</ee>
<year>2005</year>
<crossref>conf/ispec/2005</crossref>
<booktitle>ISPEC</booktitle>
<url>db/conf/ispec/ispec2005.html#TanLM05</url>
</inproceedings>
</r>
<r><article key="journals/jsc/JinwangLM03" mdate="2021-02-17">
<author pid="73/8650">Jinwang Liu</author>
<author pid="06/6369">Zhuojun Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>The term orderings which are compatible with composition II.</title>
<pages>153-168</pages>
<year>2003</year>
<volume>35</volume>
<journal>J. Symb. Comput.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.1016/S0747-7171(02)00129-3</ee>
<url>db/journals/jsc/jsc35.html#JinwangLM03</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/TangLW03" mdate="2021-01-22">
<author pid="91/470-3">Chunming Tang 0003</author>
<author pid="06/6369">Zhuojun Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>A Verifiable Secret Sharing Scheme with Statistical zero-knowledge.</title>
<pages>222</pages>
<year>2003</year>
<volume>2003</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2003/222</ee>
<url>db/journals/iacr/iacr2003.html#TangLW03</url>
</article>
</r>
<r><inproceedings key="conf/icics/WangQWZ01" mdate="2017-05-23">
<author pid="w/GuilinWang">Guilin Wang</author>
<author pid="83/130">Sihan Qing</author>
<author pid="65/1908">Mingsheng Wang</author>
<author pid="23/5641">Zhanfei Zhou</author>
<title>Threshold Undeniable RSA Signature Scheme.</title>
<pages>221-232</pages>
<year>2001</year>
<crossref>conf/icics/2001</crossref>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45600-7_25</ee>
<url>db/conf/icics/icics2001.html#WangQWZ01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/issac/JinwangZXM01" mdate="2018-11-06">
<author pid="73/8650">Jinwang Liu</author>
<author pid="06/6369">Zhuojun Liu</author>
<author pid="32/10769">Xiaoqi Liu</author>
<author pid="65/1908">Mingsheng Wang</author>
<title>The membership problem for ideals of binomial skew polynomial rings.</title>
<pages>192-195</pages>
<year>2001</year>
<crossref>conf/issac/2001</crossref>
<booktitle>ISSAC</booktitle>
<ee>https://doi.org/10.1145/384101.384127</ee>
<url>db/conf/issac/issac2001.html#JinwangZXM01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/issac/MingshengL01" mdate="2018-11-06">
<author pid="65/1908">Mingsheng Wang</author>
<author pid="06/6369">Zhuojun Liu</author>
<title>Remarks on Gr&#246;bner basis for ideals under composition.</title>
<pages>237-244</pages>
<year>2001</year>
<crossref>conf/issac/2001</crossref>
<booktitle>ISSAC</booktitle>
<ee>https://doi.org/10.1145/384101.384134</ee>
<url>db/conf/issac/issac2001.html#MingshengL01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/MingshengSD00" mdate="2010-05-26">
<author pid="65/1908">Mingsheng Wang</author>
<author pid="83/130">Sihan Qing</author>
<author pid="79/2089">Dengguo Feng</author>
<title>A Simple Algorithm for Computing Several Sequences Synthesis.</title>
<pages>211-220</pages>
<year>2000</year>
<crossref>conf/sec/2000</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec2000.html#MingshengSD00</url>
</inproceedings>
</r>
<coauthors n="104" nc="3">
<co c="0"><na f="a/Abla:Parhat" pid="216/6090">Parhat Abla</na></co>
<co c="0"><na f="a/An:Zhuo" pid="304/9479">Zhuo An</na></co>
<co c="0"><na f="c/Cao:Heyang" pid="259/3569">Heyang Cao</na></co>
<co c="1"><na f="c/Chai:Yingbin" pid="250/4593">Yingbin Chai</na></co>
<co c="2"><na f="c/Chen:Hongfu" pid="23/8118">Hongfu Chen</na></co>
<co c="0"><na f="c/Chen:Huiqin" pid="01/10070">Huiqin Chen</na></co>
<co c="0"><na f="c/Chen:Kai" pid="181/2839">Kai Chen</na></co>
<co c="1"><na f="c/Cheng:Cong" pid="176/3012">Cong Cheng</na></co>
<co c="0" n="2"><na f="d/Deng:Zhi=Hong" pid="161/4814">Zhi-Hong Deng</na><na>Zhihong Deng</na></co>
<co c="0"><na f="f/Fan:Xiong" pid="143/4451">Xiong Fan</na></co>
<co c="0"><na f="f/Feng:Dengguo" pid="79/2089">Dengguo Feng</na></co>
<co c="0"><na f="g/Gao:Shuhong" pid="97/1429">Shuhong Gao</na></co>
<co c="1"><na f="g/Gong:Zhixiong" pid="292/8521">Zhixiong Gong</na></co>
<co c="0"><na f="h/Han:Ya" pid="182/0736">Ya Han</na></co>
<co c="0"><na f="h/Hou:Hanxu" pid="135/4973">Hanxu Hou</na></co>
<co c="0"><na f="h/Hu:Xichao" pid="275/3635">Xichao Hu</na></co>
<co c="0"><na f="h/Huang:Qingjia" pid="36/10372">Qingjia Huang</na></co>
<co c="0"><na f="h/Huang_0015:Tao" pid="34/808-15">Tao Huang 0015</na></co>
<co c="0"><na f="j/Jia:Xiaoqi" pid="41/761">Xiaoqi Jia</na></co>
<co c="0"><na f="j/Jiang:Shaoquan" pid="30/6713">Shaoquan Jiang</na></co>
<co c="0"><na f="j/Jiao:Lin" pid="48/8078">Lin Jiao</na></co>
<co c="0"><na f="k/Kang:Man" pid="215/3232">Man Kang</na></co>
<co c="0"><na f="l/Lai:Qiang" pid="00/7515">Qiang Lai</na></co>
<co c="0"><na f="l/Lai:Wuxuan" pid="242/0077">Wuxuan Lai</na></co>
<co c="0"><na f="l/Leng:Siyuan" pid="273/9280">Siyuan Leng</na></co>
<co c="0"><na f="l/Li:Dequan" pid="41/972">Dequan Li</na></co>
<co c="0"><na f="l/Li:Dongmei" pid="27/1131">Dongmei Li</na></co>
<co c="0"><na f="l/Li_0004:Hong" pid="93/6234-4">Hong Li 0004</na></co>
<co c="0"><na f="l/Li:Peiyao" pid="76/8613">Peiyao Li</na></co>
<co c="0"><na f="l/Li:Shujun" pid="09/6954">Shujun Li</na></co>
<co c="0"><na f="l/Li:Taotao" pid="126/7974">Taotao Li</na></co>
<co c="1"><na f="l/Li:Tianyun" pid="02/7633">Tianyun Li</na></co>
<co c="0"><na f="l/Li_0059:Wei" pid="64/6025-59">Wei Li 0059</na></co>
<co c="1"><na f="l/Li_0103:Wei" pid="64/6025-103">Wei Li 0103</na></co>
<co c="0"><na f="l/Li:Yongqiang" pid="76/6452">Yongqiang Li</na></co>
<co c="0"><na f="l/Li_0001:Yongqiang" pid="76/6452-1">Yongqiang Li 0001</na></co>
<co c="0"><na f="l/Li:Zhiran" pid="287/7649">Zhiran Li</na></co>
<co c="0"><na f="l/Liao:Huimei" pid="301/9812">Huimei Liao</na></co>
<co c="0"><na f="l/Lin:Suqing" pid="175/4135">Suqing Lin</na></co>
<co c="0"><na f="l/Lin:Xi" pid="43/489">Xi Lin</na></co>
<co c="0"><na f="l/Liu:Dongdong" pid="45/8193">Dongdong Liu</na></co>
<co c="0"><na f="l/Liu:Fen" pid="88/193">Fen Liu</na></co>
<co c="0"><na f="l/Liu:Feng=Hao" pid="53/608">Feng-Hao Liu</na></co>
<co c="0"><na f="l/Liu:Jinwang" pid="73/8650">Jinwang Liu</na></co>
<co c="0"><na f="l/Liu_0005:Peng" pid="21/6121-5">Peng Liu 0005</na></co>
<co c="0"><na f="l/Liu:Xiaoqi" pid="32/10769">Xiaoqi Liu</na></co>
<co c="0"><na f="l/Liu:Yuting" pid="20/7910">Yuting Liu</na></co>
<co c="0"><na f="l/Liu:Zhengbin" pid="175/8593">Zhengbin Liu</na></co>
<co c="0"><na f="l/Liu:Zhuojun" pid="06/6369">Zhuojun Liu</na></co>
<co c="0"><na f="l/Luo:Ming" pid="73/2249">Ming Luo</na></co>
<co c="0"><na f="m/Meier:Willi" pid="47/6600">Willi Meier</na></co>
<co c="0"><na f="p/Pang:Bo" pid="16/6344">Bo Pang</na></co>
<co c="0"><na f="p/Pei:Dingyi" pid="49/2823">Dingyi Pei</na></co>
<co c="0"><na f="p/Peng:Chunying" pid="330/5562">Chunying Peng</na></co>
<co c="0"><na f="q/Qing:Sihan" pid="83/130">Sihan Qing</na></co>
<co c="0"><na f="r/Ren:Xingwei" pid="179/4495">Xingwei Ren</na></co>
<co c="0"><na f="s/Song:Peizhe" pid="414/1315">Peizhe Song</na></co>
<co c="0"><na f="s/Song:Qiang" pid="39/4333">Qiang Song</na></co>
<co c="0"><na f="t/Tai:Jianwei" pid="201/1260">Jianwei Tai</na></co>
<co c="0"><na f="t/Tan:Zuowen" pid="91/6587">Zuowen Tan</na></co>
<co c="0"><na f="t/Tang_0003:Chunming" pid="91/470-3">Chunming Tang 0003</na></co>
<co c="0"><na f="t/Tang:Jinling" pid="362/3553">Jinling Tang</na></co>
<co c="0"><na f="t/Tang:Tao" pid="35/1524">Tao Tang</na></co>
<co c="0"><na f="t/Tang:Zailiang" pid="152/1683">Zailiang Tang</na></co>
<co c="0"><na f="t/Tian:Shizhu" pid="165/6175">Shizhu Tian</na></co>
<co c="0" n="2"><na f="v/Volny:Frank" pid="86/9379">Frank Volny</na><na>Frank Volny IV</na></co>
<co c="0"><na f="w/Wan:Daqing" pid="41/544">Daqing Wan</na></co>
<co c="0"><na f="w/Wang:Chang" pid="93/96">Chang Wang</na></co>
<co c="0"><na f="w/Wang:Guilin" pid="w/GuilinWang">Guilin Wang</na></co>
<co c="0"><na f="w/Wang:Han" pid="67/1771">Han Wang</na></co>
<co c="0"><na f="w/Wang_0030:Han" pid="67/1771-30">Han Wang 0030</na></co>
<co c="0"><na f="w/Wang:Zhedong" pid="217/6920">Zhedong Wang</na></co>
<co c="0"><na f="w/Wei:Qianwen" pid="216/6250">Qianwen Wei</na></co>
<co c="0"><na f="w/Wu_0001:Hongjun" pid="91/5936-1">Hongjun Wu 0001</na></co>
<co c="0"><na f="w/Wu:Shengbao" pid="30/10309">Shengbao Wu</na></co>
<co c="0"><na f="w/Wu:Wenling" pid="74/2464">Wenling Wu</na></co>
<co c="0"><na f="x/Xia:Bingbing" pid="18/3941">Bingbing Xia</na></co>
<co c="0"><na f="x/Xia:Han" pid="194/1034">Han Xia</na></co>
<co c="0"><na f="x/Xie:Yuanyuan" pid="194/9729">Yuanyuan Xie</na></co>
<co c="0"><na f="x/Xiong:Zhenyu" pid="76/91">Zhenyu Xiong</na></co>
<co c="0"><na f="x/Xu_0002:Haixia" pid="26/5544-2">Haixia Xu 0002</na></co>
<co c="0"><na f="x/Xu:Kaiwen" pid="273/8517">Kaiwen Xu</na></co>
<co c="0"><na f="x/Xu:Zheng" pid="83/2535">Zheng Xu</na></co>
<co c="0"><na f="y/Yan:Lianglin" pid="398/4118">Lianglin Yan</na></co>
<co c="0"><na f="y/Yao:Qing" pid="62/5358">Qing Yao</na></co>
<co c="0"><na f="y/Yao:Zheng=an" pid="42/2248">Zheng-an Yao</na></co>
<co c="0"><na f="y/Yu:Yuyin" pid="38/10308">Yuyin Yu</na></co>
<co c="0"><na f="y/Yuan:Zheng" pid="56/2877">Zheng Yuan</na></co>
<co c="0"><na f="z/Zeng:Pengfei" pid="16/3851">Pengfei Zeng</na></co>
<co c="0"><na f="z/Zhang:Bin" pid="13/5236">Bin Zhang</na></co>
<co c="0"><na f="z/Zhang_0003:Bin" pid="13/5236-3">Bin Zhang 0003</na></co>
<co c="0"><na f="z/Zhang:Nianzhong" pid="386/5266">Nianzhong Zhang</na></co>
<co c="1"><na f="z/Zhang:Qifan" pid="44/8211">Qifan Zhang</na></co>
<co c="0"><na f="z/Zhang_0002:Rui" pid="z/RuiZhang2">Rui Zhang 0002</na></co>
<co c="0"><na f="z/Zhang:Shengzhi" pid="65/3618">Shengzhi Zhang</na></co>
<co c="0"><na f="z/Zhang:Wei" pid="10/4661">Wei Zhang</na></co>
<co c="0"><na f="z/Zhang:Weijuan" pid="07/8436">Weijuan Zhang</na></co>
<co c="2"><na f="z/Zhang:Wensheng" pid="94/6627">Wensheng Zhang</na></co>
<co c="0"><na f="z/Zhao:Sifang" pid="248/2954">Sifang Zhao</na></co>
<co c="0"><na f="z/Zhao:Xianfeng" pid="76/7010">Xianfeng Zhao</na></co>
<co c="0"><na f="z/Zhong:Xiao" pid="15/7449">Xiao Zhong</na></co>
<co c="0"><na f="z/Zhou:Yang" pid="07/4580">Yang Zhou</na></co>
<co c="0"><na f="z/Zhou:Yichao" pid="146/9862">Yichao Zhou</na></co>
<co c="0"><na f="z/Zhou:Zhanfei" pid="23/5641">Zhanfei Zhou</na></co>
</coauthors>
</dblpperson>

