Dengguo Feng
Orcid: 0000-0002-8515-7124
According to our database1,
Dengguo Feng
authored at least 338 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks.
IEEE Trans. Mob. Comput., December, 2024
Wireless Networks, Springer, ISBN: 978-3-031-76921-4, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure.
ACM Trans. Embed. Comput. Syst., November, 2023
New method for combining Matsui's bounding conditions with sequential encoding method.
Des. Codes Cryptogr., November, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023
IACR Cryptol. ePrint Arch., 2023
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a.
IACR Trans. Symmetric Cryptol., 2022
Secur. Saf., 2022
J. Netw. Comput. Appl., 2022
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method.
IACR Cryptol. ePrint Arch., 2022
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V.
Des. Codes Cryptogr., 2022
Introduction to the special issue dedicated to Cunsheng Ding on the occasion of his 60th birthday.
Adv. Math. Commun., 2022
Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V.
IACR Cryptol. ePrint Arch., 2021
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.
Wirel. Commun. Mob. Comput., 2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020
Secur. Commun. Networks, 2020
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine.
J. Inf. Secur. Appl., 2020
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
IACR Cryptol. ePrint Arch., 2019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
J. Cryptol., 2018
IET Inf. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Comput. Networks, 2018
2017
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Advances in Computer Science and Technology, Springer, ISBN: 978-3-662-48865-2, 2016
2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptol. ePrint Arch., 2015
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptol. ePrint Arch., 2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Evaluating and comparing the quality of access control in different operating systems.
Comput. Secur., 2014
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP.
Sci. China Inf. Sci., 2014
Cryptogr. Commun., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Secur. Commun. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IEEE Signal Process. Lett., 2012
On the nonexistence of nontrivial small cycles of the <i>µ</i> function in 3<i>x</i>+1 conjecture.
J. Syst. Sci. Complex., 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Netw., 2011
J. Inf. Process. Syst., 2011
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.
Comput. Commun., 2011
Sci. China Inf. Sci., 2011
Proceedings of the Web-Age Information Management - 12th International Conference, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Inf. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the Information Security, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IEEE Trans. Inf. Theory, 2009
IACR Cryptol. ePrint Arch., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Computer Science, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IEEE Trans. Inf. Theory, 2007
J. Comput. Sci. Technol., 2007
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
Frontiers Comput. Sci. China, 2007
Sci. China Ser. F Inf. Sci., 2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z<sub>2</sub><sup>l</sup>.
IEEE Trans. Inf. Theory, 2006
J. Comput. Sci. Technol., 2006
J. Comput. Res. Dev., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Advances in Intelligent IT, 2006
Proceedings of the Advances in Intelligent IT, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Commun. Lett., 2005
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Electron. Colloquium Comput. Complex., 2005
Appl. Math. Comput., 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Networking, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Topics in Cryptology, 2005
An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
J. Comput. Sci. Technol., 2004
J. Comput. Sci. Technol., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z<sub>2<sup>l</sup></sub>.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Sci. China Ser. F Inf. Sci., 2002
2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000
A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000
The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Theor. Comput. Sci., 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999