• Source: Scopus
20142020

Research activity per year

If you made any changes in Pure these will be visible here soon.

Personal profile

Research Interests

Computer security, privacy, and cryptography.

Education/Academic qualification

Computer Science, BE, Hong Kong University of Science and Technology

Computer Science, PhD, University of Maryland, College Park

Fingerprint

Dive into the research topics where Xiao Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Better concrete security for half-gates garbling (in the multi-instance setting)

    Guo, C., Katz, J., Wang, X., Weng, C. & Yu, Y., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 793-822 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Blazing Fast OT for Three-Round UC OT Extension

    Canetti, R., Sarkar, P. & Wang, X., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 299-327 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security

    Canetti, R., Sarkar, P. & Wang, X., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 277-308 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient and secure multiparty computation from fixed-key block ciphers

    Guo, C., Katz, J., Wang, X. & Yu, Y., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 825-841 17 p. 9152760. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Ferret: Fast Extension for Correlated OT with Small Communication

    Yang, K., Weng, C., Lan, X., Zhang, J. & Wang, X., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1607-1626 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations