Ruida Wang

ORCID: 0009-0002-1276-1299
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Algorithms and Data Compression
  • Parallel Computing and Optimization Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Mathematical Analysis and Transform Methods
  • Advancements in Semiconductor Devices and Circuit Design
  • Quantum-Dot Cellular Automata
  • Advanced Graph Neural Networks
  • Topic Modeling
  • Electromagnetic Scattering and Analysis
  • Complexity and Algorithms in Graphs
  • Embedded Systems Design Techniques
  • Ferroelectric and Negative Capacitance Devices
  • Security and Verification in Computing
  • Silicon Carbide Semiconductor Technologies
  • Marine Sponges and Natural Products
  • Blockchain Technology Applications and Security
  • Synthesis and Biological Activity
  • Network Packet Processing and Optimization
  • Cloud Data Security Solutions
  • Semantic Web and Ontologies
  • Microbial Natural Products and Biosynthesis
  • Semiconductor materials and devices

East China University of Science and Technology
2025

Tarim University
2025

Institute of Information Engineering
2023-2024

Chinese Academy of Sciences
2022-2024

University of Chinese Academy of Sciences
2023-2024

Institute of Microelectronics
2023

Anhui University
2022

Hefei Institutes of Physical Science
2022

Institute of Intelligent Machines
2022

The antitumor drug candidate, loonamycin, was isolated from Nocardiopsis flavescens NA01583 and exerts its activity by inhibiting topoisomerase I activity. However, the current production levels of loonamycin are insufficient for further research. To address this limitation, a liquid fermentation method developed, optimizing both conditions medium components. This optimization increased 1 mg/mL on agar plate to 602.32 in shake flask ultimately 532.51 5-L bioreactor. Exogenous addition...

10.1002/jobm.70012 article EN Journal of Basic Microbiology 2025-03-06

Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully by integrating a specific symmetric scheme, which requires selected scheme that be efficiently evaluated homomorphically. While there has been recent surge in development of FHE-friendly ciphers, concerns have arisen regarding their security. A significant challenge for transciphering community remains efficient evaluation algorithms undergone extensive study and...

10.46586/tches.v2024.i3.530-573 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-07-18

FHEW-like schemes utilize exact gadget decomposition to reduce error growth and ensure that the bootstrapping incurs only polynomial growth. However, method requires higher computation complexity larger memory storage. In this paper, we improve efficiency of FHEWlike by utilizing composite NTT performs Number Theoretic Transform (NTT) with a modulus. Specifically, based on NTT, integrate modulus raising in external product, which reduces number NTTs required blind rotation from 2(dg + 1)n...

10.46586/tches.v2024.i1.563-591 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2023-12-04

Bootstrapping is a critical technique in constructing fully homomorphic encryption (FHE), which serves to refresh the noise FHE ciphertexts, enabling an arbitrary number of operations. Among published results, TFHE-rs library [Zam22] offers fastest bootstrapping implementation on CPU platforms by taking advantage AVX-512 instructions.In this paper, we improve efficiency algorithm based NTRU problem. First, introduce approximate gadget decomposition method tailored for ciphertext, reducing...

10.46586/tches.v2024.i3.418-451 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-07-18

Abstract Stealth address protocol (SAP) is widely used in blockchain to achieve anonymity. In this paper, we formalize a key derivable signature scheme (KDS) capture the functionality and security requirements of SAP. We then propose framework construct separation KDS, which follows principle as all existing SAP solutions avoid reuse master keys derivation component. also study joint KDS reusing framework, implies first compact stealth using single pair. Finally, provide instantiations based...

10.1186/s42400-024-00231-x article EN cc-by Cybersecurity 2024-05-30

Abstract Partially-depleted silicon-on-insulator (PDSOI) MOSFETs with full dielectric isolation structure are widely used in the high temperature field of 225 °C, but affected by threshold voltage and carrier mobility, saturated output current has a rate change as 24.9% at 25 °C–300 which will reduce working speed accuracy analog circuit. This paper studies characteristics ultra-thin body buried oxide (UTBB) fully-depleted (FDSOI) 28 nm low structure. The experimental results show that when...

10.1088/1361-6463/acb449 article EN Journal of Physics D Applied Physics 2023-01-18

Abstract In the knowledge reasoning filed, algorithms based on translation have achieved great results in recent years. However, when translation-based models fit multi-map attribute relations, different relations will compete for same embedding vector. At time, many graphs can automatically extract new triples from Internet now. This further reduces frequency of occurrence a single relation graph, which creates more difficulty models. Thus, TransE_rel model is proposed by relaxing...

10.1088/1742-6596/2303/1/012028 article EN Journal of Physics Conference Series 2022-07-01
Coming Soon ...