Yongge Wang's Publications

Survey articles
  1. Yongge Wang. A Review of Threshold Digital Signature Schemes (pdf)
  2. Yongge Wang. Smart Grid, Automation, and SCADA Systems Security (pdf, 200K). Invited and anonymously refereed Chapter of "Security and Privacy in Smart Grids", 2013, CRC Press (Taylor & Grancis Group). ISBN 978-1-4398-7783-8
  3. Yongge Wang. Public Key Cryptography Standards: PKCS (pdf, 150K). Invited and anonymously refereed Chapter of "Handbook of Information Security", John Wiley & Sons, Inc., 2005 Publisher's ToC
  4. Securing eBusiness with cryptographic techniques (pdf 319KB or pdf 945KB). In Bank Fraud and IT Security December 2004 Issue, by Southeast Consulting Inc.

Refereed conference and journal papers
  1. Wang, Y. and Desmedt, Y. (2015). Towards fully homomorphic encryption schemes from codes. In Submitted, pages 1-1
  2. Yongge Wang: On LIL Tests. (pdf)
  3. Yongge Wang. Another Look at CBC Casper Consensus Protocol , March, 2020 (pdf).
  4. Yongge Wang. Byzantine Fault Tolerance in Partially Connected Asynchronous Networks IACR ePrint, December 2019 (pdf).
  5. Yongge Wang. Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. (pdf)
  6. Yongge Wang: Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes. Manuscripts 2017. (pdf)
  7. Liu, Jingang, Yongge Wang, Zongxinag Yi, and Dingyi Pei. "Quantum Resistant Public Key Encryption Scheme polarRLCE." In International Conference on Algebra, Codes and Cryptology, pp. 114-128. Springer, Cham, 2019. Online
  8. M. Ahmed, J. Wei, Yongge Wang, Ehab Al-Shaer: A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154. (pdf)
  9. Y.Wang and Q. Malluhi. Reusable Garbled Turing Machines without FHE (pdf). Proc. 3rd Conference C2SI, Codes, Cryptology and Information Security. LNCS, Springer-Verlag, 2019.
  10. Yongge Wang and Khaled Khan. Matrix Barcode Based Secure Authentication without Trusting Third Party. IEEE IT Professionals, May 2019. (pdf).
  11. Gretchen Mattthews and Yongge Wang. Quantum Resistant Public Key Encryption Scheme HermitianRLCE. Proc. Code Based Cryptography. 2019 (pdf).
  12. Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, and Tianyuan Xie. Breaking HK17 in Practice. Proc. ISIT 2019. (pdf).
  13. Yongge Wang and Q.M.Malluhi. The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. Communications of ACM, May 2019 (pdf).
  14. K. Khan, M.Shaheen, and Y.Wang. Using Sparse Matrices to Prevent Information Leakage in Cloud Computing. Proc. 2018 IEEE 6th International Conference on Future Internet of Things and Cloud. (pdf).
  15. M. Punekar, Q. Malluhi, Y. Wang, and Y. Desmedt. Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. Proc. ACM BDCAT’17, December 5–8, 2017, Austin, Texas, USA. (pdf).
  16. M. Punekar, Q. Malluhi, Y. Wang, and Y. Desmedt. Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. Proc. CANS 2017. (pdf).
  17. Khaled Khan, Mahboob Shaheen, and Yongge Wang. Data Confidentiality in Cloud-based Pervasive System. Proc. ACM 2nd International Conference on Internet of Things, Data and Cloud Computing 2017. (pdf).
  18. Yongge Wang. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems. In Proc. CyberICPS 2016 (ESORICS Workshop), LNCS 10166, pages 103-120. (pdf).
  19. Y. Wang. and Q.M. Malluhi. Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. Proc. ESORICS 2016, LNCS 9878, pp. 301-323. (pdf).
  20. Yongge Wang: Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE. Proc. IEEE pages 2519-2523 ISIT 2016 (Barcelona) (pdf).
  21. P.Li, X.Liu, X.Yi, Y.Wang and Yongge Wang. Brownian Motion Properties of Random Bit Generators Based on Laser Chaos. Optics Express 24(14):15822-15833 (pdf, Publisher version, impact factor: 3.148 for 2015)
  22. Y.Wang and Q. Malluhi and K.Khan: Garbled computation in cloud. Future Generation of Computer Systems, Vol 62, pages 54-65, 2015 (pdf)
  23. Yongge Wang and Yvo Desmedt. Efficient Secret Sharing Schemes Achieving Optimal Information Rate. In Information Theory Workshop (ITW) pages 516-520, 2014. (pdf)
  24. Yongge Wang: Privacy-preserving data storage in cloud using array BP-XOR codes. IEEE Transactions on Cloud Computing (TCC), 3(4):425-435, 2015 (pdf)
  25. M. Paterson, Douglas R. Stinson, and Yongge Wang: On Encoding Symbol Degrees of Array BP-XOR Codes. Cryptography and Communications, pages 1-14, 2015. (pdf)
  26. Yongge Wang and Tony Nicol: Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. Computers and Security (53):44-64, September 2015. An extended abstract appeared in ESORICS 2014, LNCS 8712, pp. 454--471. (pdf) Elsevier version. (LIL Software, 432KB). The JAR file runs on all platforms. For instructions, run: java -jar LILtest.jar
  27. Q. Duan, Y.Wang, F.Mohsen, and E.Al-Shaer. Private and Anonymous Data Storage and Distribution in Cloud. Proc. IEEE SCC 2013, pages 264-271. (pdf)
  28. Yongge Wang: Array BP-XOR Codes for Reliable Cloud Storage Systems. Proc. IEEE ISIT 2013, pages 326--330. (pdf) and (presentation slide).
  29. Y.Wang: Efficient Identity-Based and Authenticated Key Agreement Protocol (pdf). M.L. Gavrilova and C.J.K. Tan (Eds.) Trans. on Comput. Sci. XVII, LNCS 7420, pp. 172--197. Springer, Heidelberg (2013)
  30. Y.Wang. Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. In: D. Gritzalis, S. Furnell, and M. Theoharidou (Eds.): SEC 2012, IFIP AICT 376, pp. 489-500, 2012. (pdf).
  31. M.Tozal, Y.Wang, E.Al-Shaer, K.Sarac, B.Thuraisingham, B.Chu. Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. In Mobile Networks and Applications MONET, 18(5):697-711. 2011 (pdf)
  32. M.Tozal, Y.Wang, E.Al-Shaer, K.Sarac, B.Thuraisingham, B.Chu. On Secure and Resilient Telesurgery Communications over Unreliable Networks. In INFOCOM Cyber-Physical Networking Systems (CPNS), pages 714--719, IEEE 2011. (pdf)
  33. Y.Wang and Y.Desmedt. Edge-Colored Graphs with Applications To Homogeneous Faults. Information Processing Letters 111(2011) 634-641 (pdf). Publisher's version.
  34. Y.Wang and Y.Desmedt. Homogeneous Faults, Colored Edge Graphs, and Cover Free Families. In Proc. 5th International Conference on Information Theoretic Security (ICITS 2011), pages 58-72. LNCS 6673. pdf
  35. Y.Wang. sSCADA: Securing SCADA Infrastructure Communications (pdf). Int. J. Communication Networks and Distributed Systems, 6(1):59--78, 2011.
  36. M.Boujettif and Y.Wang. Constructivist Approach To Information Security Awareness In The Middle East. BWCCA, pp.192-199, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010, IEEE press. (pdf, pptx).
  37. Y.Wang and Y.Desmedt. Perfectly Secure Message Transmission Revisited. IEEE Transaction on Information Theory 54(6):2582--2595, June 2008.
  38. Y.Desmedt, Y.Wang and M.Burmester. Revisiting Colored Networks and Privacy Preserving Censorship. Proc. 1st International Workshop on Critical Information Infrastructures Security (CRITIS'06) August 30 - September 2, 2006, Samos Island, Greece. LNCS 4347, pages 140-150, 2006. (pdf), (Yvo Desmedt's slide), ( Springer Verlag version).
  39. Z.Zhao, Z.Dong, and Y.Wang. Security Analysis of a Password-Based Authentication Protocol Proposed to IEEE 1363 Theoretical Computer Science, 352(1-3):280--287, 7 March 2006. (pdf). Publisher's version.
  40. Y.Desmedt and Y. Wang. Survey of Models for Critical Infrastructures and Methods to Measure Robustness. Proc. of the first CRIS International Workshop on Critical Information Infrastructures (CIIW'05).
  41. Y.Desmedt, Y.Wang and M.Burmester. A complete characterization of tolerable adversary structures for secure point-to-point transmissions. In Proc. 16th ISAAC (ratio: 112/549), LNCS 3827, pages 277-287, 2005. (pdf). Publisher's version.
  42. Y.Wang and X.Wu. Approximate inverse frequent itemset mining: privacy, complexity, and approximation. In Proc. 5th IEEE ICDM, (ratio: 69/630), pages 482-289, 2005. (pdf, 79K)
  43. Y.Zheng and Y.Wang. Efficient and provably secure ciphers for storage device block level encryption. In Proc. ACM StorageSS workshop. pages 103-107, 2005. (pdf, 72K)
  44. X.Wu, C.Sanghvi, Y.Wang, and Y.Zheng. Privacy aware data generation for testing database applications. Proc. of Ninth International Database Engineering and Applications Symposium (IDEAS 2005)}, pages 317--326. IEEE Press.
  45. Y.Desmedt, Y.Wang, R.Safavi-Naini, and H.Wang. Radio networks with reliable communications. In Proc. COCOON (ratio: 96/360), pages 156-166, LNCS 3595, 2005. (pdf, 79K)
  46. X.Wu, Y.Wu, Y.Wang, and Y.Li. Privacy aware market basket data set generation: a feasible approach for inverse frequent set mining. In Proc. 5th SIAM International Conference on Data Mining, April 2005.
  47. Y.Wang, X. Wu, and Y. Zheng. Privacy preserving data generation for database application performance testing. In: Proc. 1st International Conference on Trust and Privacy in Digital Business (TrustBus '04) (together with DEXA conference, Zaragoza, Spain), LNCS 3184, pages 142-151. Springer-Verlag. (pdf, 79K)
  48. Y.Wang. Robust key establishment in sensor networks. ACM SIGMOD Record, 33(1):14--19, March 2004. (pdf, 79K, publisher's version)
  49. Y.Desmedt and Y.Wang: Analyzing vulnerabilities of critical infrastructures using flows and critical vertices in AND/OR graphs. International Journal of Foundations of Computer Science, 15(1):107--125, 2004 (pdf, 61K)
  50. Y.Wang and Y.Zheng. Fast and secure WORM storage systems. In: Proceedings of the IEEE Security in Storage Workshop (SISW), pages 11-19, 2003 (pdf, 73K). Publisher's version
  51. M.Burmester, Y.Desmedt, and Y.Wang. A Critical Analysis of Models for Fault-Tolerant and Secure Computation. In: Proceedings of the IASTED Communication, Network, and Information Security (CNIS) 2003, pages 147-152, 2003 (pdf, 73K).
  52. X.Wu, Y.Wang, and Y.Zheng: Privacy preserving database application testing. Proceedings of the ACM Workshop on Privacy in Electronic Society, (ratio 16/50) pages 118--128, 2003 (pdf, 150K)
  53. Z.Liu and Y.Wang: A secure agent architecture for sensor networks. Proceedings of The 2003 International Conference on Artificial Intelligence--Intelligent Pervasive Computing Workshop (IC-AI'03 June 23-26, 2003, Las Vegas, Nevada, USA), pages 10--16, 2003 (Eds. H.R.Arabnia, R. Joshua, and Y.Mun), CSREA Press (pdf, 61K)
  54. Y.Wang, Y.Zheng, and B.Chu: Efficient and secure storage systems based on peer-to-peer systems. Proceedings of The 2003 International Conference on Artificial IntelligenceIntelligent Pervasive Computing Workshop (IC-AI'03 June 23-26, 2003, Las Vegas, Nevada, USA), pages 17--22, 2003 (Eds. H.R.Arabnia, R. Joshua, and Y.Mun) CSREA Press (pdf, 61K)
  55. Y.Desmedt and Y.Wang: Efficient Zero-knowledge proofs for some practical graph problems. Proceedings of Third Conference on Security in Communication Networks, LNCS 2576, pages 296--308, 2002 (pdf, 150K)
  56. Y.Wang: A comparison of two approaches to pseudorandomness. Theoretical Computer Science 276(1-2):449--459, 2002. (pdf, 170K, publisher's version)
  57. Y.Wang: The algebraic structure of the isomorphic types of tally polynomial time sets. Archive for Mathematical Logic 41(3): 215--244, 2002. (pdf, 301K, publisher's version)
  58. Y.Desmedt and Y.Wang: Maximum Flows and Critical Vertices in AND/OR Graphs COCOON '02 2002, pages 238-248. LNCS 2387, Springer-Verlag. (pdf, 202K). Preliminary results was presented at INFORMS '99 Cincinnati, section SA34.1
  59. Y.Desmedt and Y.Wang: Perfectly Secure Message Transmission Revisited. EuroCrypt'02 2002, pages 502-517. LNCS 2332, Springer-Verlag. (pdf, 259K)
  60. W.Merkle and Y.Wang: Separations by random oracles and almost-classes for generalized reducibilities. Mathematical Logic Quarterly 47(2):249--269, 2001. (pdf, 301K, publisher's version). A preliminary version of this paper appeared in: Proc. of 20th MFCS. LNCS 969, pages 179-190, 1995.
  61. Y.Wang and Y.Desmedt: Secure communication in multicast channels. Journal of Cryptology 14(2):121--135, 2001. (pdf, 264K, publisher's version). A preliminary version of this paper appeared in: Proc. Eurocrypt 99, pages 443--455. LNCS 1592, Springer Verlag. (publisher's version)
  62. C.Calude, P.Hertling, B.Khoussainov, and Y.Wang: Recursively enumerable reals and Chaitin's Ω numbers. Theoretical Computer Science 255:125--149, 2001. (pdf, 200K, publisher's version). A preliminary version of this paper appeared in: Proc. 15th STACS, pages 596--606. LNCS 1373, Springer Verlag, 1998.
  63. Y.Wang, Y.Desmedt, and M.Burmester: Models for dependable computation with multiple inputs and some hardness results. Fundamenta Informaticae, 42(1):61--73, 2000. (pdf, 251K, publisher's version)
  64. Y.Wang: Resource bounded randomness and computational complexity. Theoretical Computer Science 237(1-2):33--55, 2000. (pdf, 164K, publisher's version)
  65. Y.Wang: Using mobile agent results to create hard-to-detect computer viruses In: Information Security for Global Information Infrastructures, the 16th IFIP SEC (2000), pages 161--170, Kluwer Academic Publishers. (pdf, 159K)
  66. Y.Wang: Genericity, randomness, and polynomial time approximations. SIAM Journal on Computing, 28(2):394-408, 1999. (pdf, 253K, publisher's version)
  67. Y.Wang: A separation of two randomness concepts. Information Processing Letters, 69(3):115--118, 1999. (pdf, 154K, publisher's version)
  68. Y.Wang: Randomness, stochasticity, and approximations. Theory of Computing Systems (formerly: Mathematical Systems Theory) 32:517--529, 1999. (pdf, 77K, publisher's version). A preliminary version of this paper appeared in: Proc. of RANDOM 97 (Italy), pages 213--225. LNCS 1269, Springer Verlag.
  69. Y.Wang: Linear complexity versus pseudorandomness: on Beth and Dai's result. In: Proc. Asiacrypt 99, pages 288--298. LNCS 1716, Springer Verlag. (pdf, 170K)
  70. Y.Desmedt and Y.Wang: Approximation hardness and secure communication in broadcast channels. In: Proc. Asiacrypt 99, pages 247--257. LNCS 1716, Springer Verlag. (pdf, 180K)
  71. Y.Wang: Abuses of probabilistic encryption schemes. IEE Electronics Letters, 34(8):753--754, 1998. (pdf, 92K).
  72. Y.Desmedt, M.Burmester, and Y.Wang: Using approximation hardness to achieve dependable computation. In: Proc. of RANDOM 98, pages 172-186. LNCS 1518, Springer Verlag. (pdf, 201K, publisher's version)
  73. P.Hertling and Y.Wang: Invariance properties of random sequences. Journal of Universal Computer Science, 3(11):1241-1449, 1997. (pdf, 153K, publisher's version)
  74. Y.Wang: NP-hard sets are superterse unless NP is small. Information Processing Letters 61(1):1-6, 1997. (pdf, 153K, publisher's version)
  75. Y.Wang: The law of the iterated logarithm for p-random sequences. In: Proc. 11th IEEE Conference on Computational Complexity (CCC), pages 180-189. IEEE Computer Society Press, 1996. (pdf, 212K)
  76. K.Ambos-Spies, E.Mayordomo, Y.Wang, and X. Zheng: Resource bounded balanced genericity, stochasticity and weak randomness. In: Proc. 13rd STACS, pages 63-74. LNCS 1046, 1996. (pdf, 185K)
  77. Y.Wang: Modified data-flow models and their applications. Chinese Journal of Software, 5(3):43-48, 1994. (pdf, 85K; guobiao, 37K)
  78. G.Hu and Y.Wang: The fundamental theory for object-oriented languages. Chinese Journal of Computer Science, 20(4):1-6, 1993. (pdf, 174K; Word, 86K)
  79. Y.Wang: The computing power of ordered Petri nets. Chinese Journal of Software, 4(3):35-41, 1993. (pdf, 106K; Word, 75K)
  80. S.Xu and Y.Wang: Blum's speedup theorem and the hierarchy of recursive functions. Chinese Journal of Software, 4(4):38-43, 1993. (pdf, 97K; Word, 80K)
  81. G.Hu and Y.Wang: An algorithm and its data structure from sequential US MMCM to parallel machine. In: Computer Mathematics, pages 58-65, World Sci. Publishing, River Edge, NJ, 1993 (MR: 94m:68041). (tex, 18K) The software to implement the algorithm.
  82. Y.Wang: Randomness and Complexity. PhD Thesis, 1996. (pdf, 523K)


Over the past years I have benefited from joint works with following co-authors: