Xiao Wang

  • 487 Citations
20142019

Research output per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Computer security, privacy, and cryptography.

Education/Academic qualification

Computer Science, BE, Hong Kong University of Science and Technology

Computer Science, PhD, University of Maryland, College Park

Fingerprint Dive into the research topics where Xiao Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 487 Citations
  • 17 Conference contribution
  • 1 Article

Covert security with public verifiability: faster, leaner, and simpler

Hong, C., Katz, J., Kolesnikov, V., Lu, W. J. & Wang, X., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 97-121 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1 Scopus citations

    Scalable Private Set Union from Symmetric-Key Techniques

    Kolesnikov, V., Rosulek, M., Trieu, N. & Wang, X., Jan 1 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 636-666 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved non-interactive zero knowledge with applications to post-quantum signatures

    Katz, J., Kolesnikov, V. & Wang, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 525-537 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 15 Scopus citations

    Optimizing authenticated garbling for faster secure two-party computation

    Katz, J., Ranellucci, S., Rosulek, M. & Wang, X., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 365-391 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 6 Scopus citations

    Secure computation with low communication from cross-checking

    Dov Gordon, S., Ranellucci, S. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 59-85 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Scopus citations