Dengguo Feng

Orcid: 0000-0002-8515-7124

According to our database1, Dengguo Feng authored at least 338 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks.
IEEE Trans. Mob. Comput., December, 2024

Survey of research on confidential computing.
IET Commun., June, 2024

Privacy-Preserving Techniques with e-Healthcare Applications
Wireless Networks, Springer, ISBN: 978-3-031-76921-4, 2024

ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024

NTRU-based Bootstrapping for MK-FHEs without using Overstretched Parameters.
IACR Cryptol. ePrint Arch., 2024

A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024

TULAM: trajectory-user linking via attention mechanism.
Sci. China Inf. Sci., 2024

An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

SeqMIA: Sequential-Metric Based Membership Inference Attack.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure.
ACM Trans. Embed. Comput. Syst., November, 2023

New method for combining Matsui's bounding conditions with sequential encoding method.
Des. Codes Cryptogr., November, 2023

An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images.
IEEE Trans. Serv. Comput., 2023

Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023

NEV: Faster and Smaller NTRU Encryption using Vector Decoding.
IACR Cryptol. ePrint Arch., 2023

Fast Blind Rotation for Bootstrapping FHEs.
IACR Cryptol. ePrint Arch., 2023

New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

LOL: A Highly Flexible Framework for Designing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2023

2022
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a.
IACR Trans. Symmetric Cryptol., 2022

Practical Attacks on Full-round FRIET.
IACR Trans. Symmetric Cryptol., 2022

Concretely efficient secure multi-party computation protocols: survey and more.
Secur. Saf., 2022

A robust authentication scheme for remote diagnosis and maintenance in 5G V2N.
J. Netw. Comput. Appl., 2022

The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method.
IACR Cryptol. ePrint Arch., 2022

Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V.
Des. Codes Cryptogr., 2022

Introduction to the special issue dedicated to Cunsheng Ding on the occasion of his 60th birthday.
Adv. Math. Commun., 2022

Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V.
IACR Cryptol. ePrint Arch., 2021

Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021

Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Collecting Spatial Data Under Local Differential Privacy.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

FAN: A Lightweight Authenticated Cryptographic Algorithm.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.
Wirel. Commun. Mob. Comput., 2020

FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device.
Secur. Commun. Networks, 2020

Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020

Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine.
J. Inf. Secur. Appl., 2020

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020

Interactive Proofs for Quantum Black-Box Computations.
IACR Cryptol. ePrint Arch., 2020

Stream cipher designs: a review.
Sci. China Inf. Sci., 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SeRoT: A Secure Runtime System on Trusted Execution Environments.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
On the (Quantum) Random Oracle Methodology: New Separations and More.
IACR Cryptol. ePrint Arch., 2019

A new discrete Fourier transform randomness test.
Sci. China Inf. Sci., 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Multiple Privacy Regimes Mechanism for Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2019

Log-Based Control Flow Attestation for Embedded Devices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Using mobile phones to enhance computing platform trust.
Telecommun. Syst., 2018

Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
J. Cryptol., 2018

Formal analysis of HMAC authorisation in the TPM2.0 specification.
IET Inf. Secur., 2018

Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.
IACR Cryptol. ePrint Arch., 2018

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Comput. Networks, 2018

2017
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptol. ePrint Arch., 2017

Secure Code Updates for Smart Embedded Devices based on PUFs.
IACR Cryptol. ePrint Arch., 2017

Towards Efficient Heap Overflow Discovery.
Proceedings of the 26th USENIX Security Symposium, 2017

How Well Can WordNet Measure Privacy: A Comparative Study?
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

Automatically assessing crashes from heap overflows.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Theoretical and practical aspects of multiple samples correlation power analysis.
Secur. Commun. Networks, 2016

Towards optimal leakage exploitation rate in template attacks.
Secur. Commun. Networks, 2016

Direct Resource Hijacking in Android.
IEEE Internet Comput., 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016

Computational Soundness Results for Stateful Applied pi Calculus.
CoRR, 2016

Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Multiple Handshakes Security of TLS 1.3 Candidates.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Computational Soundness Results for Stateful Applied π Calculus.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Attacks and Defence on Android Free Floating Windows.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Boolean Functions and Their Applications in Cryptography
Advances in Computer Science and Technology, Springer, ISBN: 978-3-662-48865-2, 2016

2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur., 2015

Security analysis of SM2 key exchange protocol in TPM2.0.
Secur. Commun. Networks, 2015

Mahalanobis distance similarity measure based distinguisher for template attack.
Secur. Commun. Networks, 2015

On the provable security of TPM2.0 cryptography APIs.
Int. J. Embed. Syst., 2015

Practical-time related-key attack on Hummingbird-2.
IET Inf. Secur., 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone.
IACR Cryptol. ePrint Arch., 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptol. ePrint Arch., 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Access Control for Privacy Protection for Dynamic and Correlated Databases.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Improving Accuracy of Static Integer Overflow Detection in Binary.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

A Rapid and Scalable Method for Android Application Repackaging Detection.
Proceedings of the Information Security Practice and Experience, 2015

Operating System Security Policy Hardening via Capability Dependency Graphs.
Proceedings of the Information Security Practice and Experience, 2015

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015

A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Fast password recovery attack: application to APOP.
J. Intell. Manuf., 2014

Universally Composable secure TNC protocol based on IF-T binding to TLS.
IACR Cryptol. ePrint Arch., 2014

Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptol. ePrint Arch., 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptol. ePrint Arch., 2014

Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptol. ePrint Arch., 2014

How to Choose Interesting Points for Template Attack More Effectively?
IACR Cryptol. ePrint Arch., 2014

How to Choose Interesting Points for Template Attacks?
IACR Cryptol. ePrint Arch., 2014

Template Attacks Based On Priori Knowledge.
IACR Cryptol. ePrint Arch., 2014

Evaluating and comparing the quality of access control in different operating systems.
Comput. Secur., 2014

Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP.
Sci. China Inf. Sci., 2014

Computing Walsh coefficients from the algebraic normal form of a Boolean function.
Cryptogr. Commun., 2014

FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Long Term Tracking and Characterization of P2P Botnet.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Efficiently Attribute-Based Access Control for Mobile Cloud Storage System.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Automated User Profiling in Location-Based Mobile Messaging Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

DAA-Related APIs in TPM 2.0 Revisited.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Revisiting Node Injection of P2P Botnet.
Proceedings of the Network and System Security - 8th International Conference, 2014

Formal Analysis of DAA-Related APIs in TPM 2.0.
Proceedings of the Network and System Security - 8th International Conference, 2014

ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication.
Proceedings of the Information Security - 17th International Conference, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Proceedings of the Information Security Practice and Experience, 2014

Template Attacks Based on Priori Knowledge.
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Choose Interesting Points for Template Attacks More Effectively?
Proceedings of the Trusted Systems - 6th International Conference, 2014

Linear Cryptanalysis of FASER128/256 and TriviA-ck.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

A Clustering Approach for Privacy-Preserving in Social Networks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Efficient identity-based strong designated verifier signature schemes.
Secur. Commun. Networks, 2013

Fast Collision Attack on MD5.
IACR Cryptol. ePrint Arch., 2013

Type-Based Analysis of Protected Storage in the TPM (full version).
IACR Cryptol. ePrint Arch., 2013

Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2013

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2013

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptol. ePrint Arch., 2013

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Proceedings of the Security and Privacy in Communication Networks, 2013

VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2013

On the Security of an Efficient Attribute-Based Signature.
Proceedings of the Network and System Security - 7th International Conference, 2013

Measuring and Comparing the Protection Quality in Different Operating Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

Type-Based Analysis of Protected Storage in the TPM.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Cryptanalysis of Helix and Phelix Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

On the security of PPPoE network.
Secur. Commun. Networks, 2012

Understanding and analyzing network traffic.
IEEE Netw., 2012

On the nonexistence of nontrivial small cycles of the <i>µ</i> function in 3<i>x</i>+1 conjecture.
J. Syst. Sci. Complex., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012

Round-optimal zero-knowledge proofs of knowledge for NP.
Sci. China Inf. Sci., 2012

Black-box testing based on colorful taint analysis.
Sci. China Inf. Sci., 2012

TSD: A Flexible Root of Trust for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Proceedings of the Provable Security - 6th International Conference, 2012

Combined Public-Key Schemes: The Case of ABE and ABS.
Proceedings of the Provable Security - 6th International Conference, 2012

Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

An attribute based encryption scheme with fine-grained attribute revocation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
The Weight Enumerator of a Class of Cyclic Codes.
IEEE Trans. Inf. Theory, 2011

Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Netw., 2011

Generic Constructions for Strong Designated Verifier Signature.
J. Inf. Process. Syst., 2011

On Guess and Determine Analysis of Rabbit.
Int. J. Found. Comput. Sci., 2011

Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.
IACR Cryptol. ePrint Arch., 2011

On the Security of NMAC and Its Variants.
IACR Cryptol. ePrint Arch., 2011

Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge.
IACR Cryptol. ePrint Arch., 2011

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions.
IACR Cryptol. ePrint Arch., 2011

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.
Comput. Commun., 2011

Improved multi-pass fast correlation attacks with applications.
Sci. China Inf. Sci., 2011

A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A DRTM-Based Method for Trusted Network Connection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Proceedings of the Provable Security - 5th International Conference, 2011

How to Characterize Side-Channel Leakages More Accurately?
Proceedings of the Information Security Practice and Experience, 2011

DAA Protocol Analysis and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Selective Disclosure on Encrypted Documents.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Comments on the SM2 Key Exchange Protocol.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Towards Attribute Revocation in Key-Policy Attribute Based Encryption.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
New Disturbance Vector for SHA-0 Collision.
J. Inf. Sci. Eng., 2010

Some results on cryptanalysis of SMS4 block cipher.
Int. J. Appl. Cryptogr., 2010

Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Inf. Secur., 2010

Construct MD5 Collisions Using Just A Single Block Of Message.
IACR Cryptol. ePrint Arch., 2010

Loiss: A Byte-Oriented Stream Cipher.
IACR Cryptol. ePrint Arch., 2010

On constant-round zero-knowledge proofs of knowledge for NP-relations.
Sci. China Inf. Sci., 2010

A property-based attestation protocol for TCM.
Sci. China Inf. Sci., 2010

Security model and modular design of fair authentication key exchange protocols.
Sci. China Inf. Sci., 2010

Fine-Grained Cloud DB Damage Examination Based on Bloom Filters.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Real-Time Remote Attestation with Privacy Protection.
Proceedings of the Trust, 2010

Privacy Preserving of Trust Management Credentials Based on Trusted Computing.
Proceedings of the Information Security, 2010

Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security.
Proceedings of the Global Communications Conference, 2010

CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.
Proceedings of the Cloud Computing, Second International Conference, 2010

DepSim: A Dependency-Based Malware Similarity Comparison System.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

A Byte-Based Guess and Determine Attack on SOSEMANUK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
New results on periodic sequences with large k-error linear complexity.
IEEE Trans. Inf. Theory, 2009

How To Find Weak Input Differences For MD5 Collision Attacks.
IACR Cryptol. ePrint Arch., 2009

An improved smart card based password authentication scheme with provable security.
Comput. Stand. Interfaces, 2009

ReconBin: Reconstructing Binary File from Execution for Software Analysis.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Cryptanalysis of the LANE Hash Function.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
Proceedings of the Information Security Practice and Experience, 2009

Reconstructing a Packed DLL Binary for Static Analysis.
Proceedings of the Information Security Practice and Experience, 2009

Practical Rebound Attack on 12-Round Cheetah-256.
Proceedings of the Information, Security and Cryptology, 2009

Bring Efficient Connotation Expressible Policies to Trust Management.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model.
Proceedings of the Computer Science, 2009

TBDRM: A TPM-Based Secure DRM Architecture.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

L-UCON: Towards Layered Access Control with UCON.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A New Client-to-Client Password-Authenticated Key Agreement Protocol.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Trans. Inf. Theory, 2008

Direct Anonymous Attestation for Next Generation TPM.
J. Comput., 2008

Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
IACR Cryptol. ePrint Arch., 2008

A New Collision Differential For MD5 With Its Full Differential Path.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of the Hash Function LUX-256.
IACR Cryptol. ePrint Arch., 2008

On the Correctness of An Approach Against Side-channel attacks.
IACR Cryptol. ePrint Arch., 2008

Research on Malicious Transaction Processing Method of Database System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

An Improved Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
Proceedings of the Information Security Practice and Experience, 2008

A Fast Implementation of Computing the Transparency Order of S-Boxes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A New Direct Anonymous Attestation Scheme from Bilinear Maps.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

BIFI: Architectural Support for Information Flow Integrity Measurement.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Security of Truncated MACs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Exploring Malware Behaviors Based on Environment Constitution.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

On the Unprovable Security of 2-Key XCBC.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 2007

On Quadratic Bent Functions in Polynomial Forms.
IEEE Trans. Inf. Theory, 2007

Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia.
J. Comput. Sci. Technol., 2007

Security Proof of the Original SOK-IBS Scheme.
Int. J. Netw. Secur., 2007

Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
Frontiers Comput. Sci. China, 2007

Survey of information security.
Sci. China Ser. F Inf. Sci., 2007

Constructing parallel long-message signcryption scheme from trapdoor permutation.
Sci. China Ser. F Inf. Sci., 2007

Modular approach to the design and analysis of password-based security protocols.
Sci. China Ser. F Inf. Sci., 2007

SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

Related-Key Differential-Linear Attacks on Reduced AES-192.
Proceedings of the Progress in Cryptology, 2007

New Results on Impossible Differential Cryptanalysis of Reduced AES.
Proceedings of the Information Security and Cryptology, 2007

Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Differential Fault Analysis on CLEFIA.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

An Effective Genetic Algorithm for Self-Inverse S-Boxes.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Improved Client-to-Client Password-Authenticated Key Exchange Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z<sub>2</sub><sup>l</sup>.
IEEE Trans. Inf. Theory, 2006

Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol., 2006

DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory.
J. Comput. Res. Dev., 2006

Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Key Replacement Attack on a Certificateless Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

Impossible Differential Cryptanalysis of ARIA and Camellia.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of the MEM Mode of Operation.
IACR Cryptol. ePrint Arch., 2006

Security analysis of a new stream cipher.
Sci. China Ser. F Inf. Sci., 2006

On Non-binary Quantum BCH Codes.
Proceedings of the Theory and Applications of Models of Computation, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Multi-pass Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

A New Variant of the Self-Shrinking Generator.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
Proceedings of the Progress in Cryptology, 2006

The Design of an Artificial Immune System.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Composing Administrative Scope of Delegation Policies based on extended XACML.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

New Guess-and-Determine Attack on the Self-Shrinking Generator.
Proceedings of the Advances in Cryptology, 2006

Efficient Anonymous Electronic Metering Scheme.
Proceedings of the Advances in Intelligent IT, 2006

Fault-tolerate Multiparty Electronic Contract Signing Protocol.
Proceedings of the Advances in Intelligent IT, 2006

Identity-based PKI Scheme for Machine Readable Travel Document.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Certificateless Public-Key Signature: Security Model and Efficient Construction.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

Proxy Oblivious Transfer Protocol.
Proceedings of the The First International Conference on Availability, 2006

2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Commun. Lett., 2005

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.
IACR Cryptol. ePrint Arch., 2005

On the Security of a Certificateless Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2005

Improved Integral Cryptanalysis of FOX Block Cipher.
IACR Cryptol. ePrint Arch., 2005

Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electron. Colloquium Comput. Complex., 2005

Collision attack on reduced-round Camellia.
Sci. China Ser. F Inf. Sci., 2005

An attack on hash function HAVAL-128.
Sci. China Ser. F Inf. Sci., 2005

Cryptanalysis of some signature schemes with message recovery.
Appl. Math. Comput., 2005

Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A Generic Scheme for Zero-Knowledge Sets.
Proceedings of the Applied Public Key Infrastructure, 2005

On the Security of Tweakable Modes of Operation: TBC and TAE.
Proceedings of the Information Security, 8th International Conference, 2005

Intrusion Tolerant CA Scheme with Cheaters Detection Ability.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Efficient Fair Certified E-Mail Delivery Based on RSA.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Detecting the Deviations of Privileged Process Execution.
Proceedings of the Networking, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005

Weaknesses of COSvd (2, 128) Stream Cipher.
Proceedings of the Information Security and Cryptology, 2005

Integral Cryptanalysis of Reduced FOX Block Cipher.
Proceedings of the Information Security and Cryptology, 2005

Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Proceedings of the Advances in Cryptology, 2005

A Fast Correlation Attack on the Shrinking Generator.
Proceedings of the Topics in Cryptology, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Experiences on Intrusion Tolerance Distributed Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

HCTR: A Variable-Input-Length Enciphering Mode.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Incremental Fuzzy Decision Tree-Based Network Forensic System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

ID-Based Aggregate Signatures from Bilinear Pairings.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
New Semantic Model for Authentication Protocols in ASMs.
J. Comput. Sci. Technol., 2004

Distributed Oblivious Function Evaluation and Its Applications.
J. Comput. Sci. Technol., 2004

Oblivious Polynomial Evaluation.
J. Comput. Sci. Technol., 2004

Identity Based Threshold Proxy Signature.
IACR Cryptol. ePrint Arch., 2004

ID-Based Proxy Signature Using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
IACR Cryptol. ePrint Arch., 2004

Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes.
IACR Cryptol. ePrint Arch., 2004

Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z<sub>2<sup>l</sup></sub>.
IACR Cryptol. ePrint Arch., 2004

A New k-Anonymous Message Transmission Protocol.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Ring Signature Scheme Using Bilinear Pairings.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Towards the Public but Noninvertible Watermarking.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.
Proceedings of the Progress in Cryptology, 2004

An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
Proceedings of the Information Security and Cryptology, 2004

Security Analysis of the Generalized Self-shrinking Generator.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

An Arbitrated Quantum Message Signature Scheme.
Proceedings of the Computational and Information Science, First International Symposium, 2004

An effective evolutionary strategy for bijective S-boxes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Study on Strand Space Model Theory.
J. Comput. Sci. Technol., 2003

Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2003

Quantum Digital Signature Based on Quantum One-way Functions.
IACR Cryptol. ePrint Arch., 2003

UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

ARECA: a highly attack resilient certification authority.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Cryptanalysis on AW digital signature scheme based on error-correcting codes.
Sci. China Ser. F Inf. Sci., 2002

Linear cryptanalysis of NUSH block cipher.
Sci. China Ser. F Inf. Sci., 2002

2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000

The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Three Characterizations of Correlation-immune Functions over Rings Z<sub>N</sub>.
Theor. Comput. Sci., 1999

Cryptanalysis of some AES Candidate Algorithms.
Proceedings of the Information and Communication Security, Second International Conference, 1999


  Loading...