Obserwuj
Mingyuan Wang
Mingyuan Wang
Assistant Professor, NYU Shanghai
Zweryfikowany adres z nyu.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Publicly-detectable watermarking for language models
J Fairoze, S Garg, S Jha, S Mahloujifar, M Mahmoody, M Wang
arXiv preprint arXiv:2310.18491, 2023
392023
Experimenting with zero-knowledge proofs of training
S Garg, A Goel, S Jha, S Mahloujifar, M Mahmoody, GV Policharla, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
302023
hints: Threshold signatures with silent setup
S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
2024 IEEE Symposium on Security and Privacy (SP), 3034-3052, 2024
252024
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Conference on the Theory and Applications of …, 2021
252021
Constructing locally leakage-resilient linear secret-sharing schemes
HK Maji, A Paskin-Cherniavsky, T Suad, M Wang
Annual International Cryptology Conference, 779-808, 2021
24*2021
Non-malleable codes against lookahead tampering
D Gupta, HK Maji, M Wang
International Conference on Cryptology in India, 307-328, 2018
20*2018
Threshold signatures in the multiverse
L Baird, S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
2023 IEEE Symposium on Security and Privacy (SP), 1454-1470, 2023
172023
Cryptography with weights: MPC, encryption and signatures
S Garg, A Jain, P Mukherjee, R Sinha, M Wang, Y Zhang
Annual International Cryptology Conference, 295-327, 2023
162023
Improved bound on the local leakage-resilience of Shamir’s secret sharing
HK Maji, HH Nguyen, A Paskin-Cherniavsky, M Wang
2022 IEEE International Symposium on Information Theory (ISIT), 2678-2683, 2022
142022
Threshold encryption with silent setup
S Garg, D Kolonelos, GV Policharla, M Wang
Annual International Cryptology Conference, 352-386, 2024
122024
How to prove statements obliviously?
S Garg, A Goel, M Wang
Annual International Cryptology Conference, 449-487, 2024
122024
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks
DQ Adams, HK Maji, HH Nguyen, ML Nguyen, A Paskin-Cherniavsky, ...
2021 IEEE International Symposium on Information Theory (ISIT), 976-981, 2021
122021
Black-box use of one-way functions is useless for optimal fair coin-tossing
HK Maji, M Wang
Annual International Cryptology Conference, 593-617, 2020
122020
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family
HK Maji, HH Nguyen, A Paskin-Cherniavsky, T Suad, M Wang, X Ye, A Yu
Theory of Cryptography Conference, 355-383, 2022
102022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences
HK Maji, HH Nguyen, A Paskin, T Suad, M Wang, X Ye, A Yu
3rd Conference on Information-Theoretic Cryptography, ITC, 2022
102022
Optimally-secure Coin-tossing against a Byzantine Adversary
HA Khorasgani, HK Maji, M Wang
2021 IEEE International Symposium on Information Theory (ISIT), 2858-2863, 2021
5*2021
Coin tossing with lazy defense: Hardness of computation results
HA Khorasgani, HK Maji, M Wang
Cryptology ePrint Archive, 2020
52020
Explicit rate-1 non-malleable codes for local tampering
D Gupta, HK Maji, M Wang
Annual International Cryptology Conference, 435-466, 2019
52019
Practical mempool privacy via one-time setup batched threshold encryption
AR Choudhuri, S Garg, GV Policharla, M Wang
Cryptology ePrint Archive, 2024
32024
Overparameterization from computational constraints
S Garg, S Jha, S Mahloujifar, M Mahmoody, M Wang
Advances in Neural Information Processing Systems 35, 13557-13569, 2022
22022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20