Honggang Hu
Orcid: 0000-0002-8903-8413
According to our database1,
Honggang Hu
authored at least 103 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Bitwise Garbling Schemes - A Model with $\frac{3}{2}\kappa$-bit Lower Bound of Ciphertexts.
IACR Cryptol. ePrint Arch., 2024
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks.
IACR Cryptol. ePrint Arch., 2024
Mixture-of-Noises Enhanced Forgery-Aware Predictor for Multi-Face Manipulation Detection and Localization.
CoRR, 2024
Adv. Math. Commun., 2024
2023
IEEE Trans. Inf. Theory, December, 2023
Design Space Exploration of Galois and Fibonacci Configuration Based on Espresso Stream Cipher.
ACM Trans. Reconfigurable Technol. Syst., September, 2023
ACM Trans. Reconfigurable Technol. Syst., June, 2023
Adaptively code-correlation robustness functions and its applications to private set intersection.
Theor. Comput. Sci., February, 2023
F<sup>2</sup>Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023
Quantum attacks against BBB secure PRFs or MACs built from public random permutations.
Quantum Inf. Process., 2023
Multi-spectral Class Center Network for Face Manipulation Detection and Localization.
CoRR, 2023
Adv. Math. Commun., 2023
2022
Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022
2021
IEEE Trans. Serv. Comput., 2021
A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Entropy, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021
Strengthening Profiled Side Channel Attacks on AES via Multi-view Information Aggregation.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021
2020
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020
2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019
A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a.
J. Ambient Intell. Humaniz. Comput., 2019
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019
Proceedings of the Science of Cyber Security - Second International Conference, 2019
Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IEEE Trans. Inf. Theory, 2018
J. Comput. Sci. Technol., 2018
IACR Cryptol. ePrint Arch., 2018
Entropy, 2018
Sci. China Inf. Sci., 2018
Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh Spectrum.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy.
Multim. Tools Appl., 2017
Necessary conditions for designing secure stream ciphers with the minimal internal states.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
IACR Cryptol. ePrint Arch., 2016
On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Sci. China Inf. Sci., 2016
Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n.
Cryptogr. Commun., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Sci. China Inf. Sci., 2015
2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
IEEE Trans. Inf. Theory, 2014
FCSR periodic multisequences with maximal joint <i>N</i>-adic complexity and large <i>k</i>-error joint <i>N</i>-adic complexity over <i>Z</i>/(<i>N</i>).
J. Syst. Sci. Complex., 2014
The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications.
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
2013
Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
IEEE Trans. Inf. Theory, 2012
IEEE Trans. Inf. Theory, 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
2011
IEEE Trans. Wirel. Commun., 2011
IEEE Trans. Inf. Theory, 2011
Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions.
Int. J. Found. Comput. Sci., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEEE Trans. Inf. Theory, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
IEEE Trans. Inf. Theory, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
2008
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Trans. Inf. Theory, 2008
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.
Proceedings of the Sequences and Their Applications, 2008
Proceedings of the Information Security Practice and Experience, 2008
2007
IEEE Trans. Inf. Theory, 2007
2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z<sub>2</sub><sup>l</sup>.
IEEE Trans. Inf. Theory, 2006
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006
2005
A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z<sub>2<sup>l</sup></sub>.
IACR Cryptol. ePrint Arch., 2004