Shenghui Su

According to our database1, Shenghui Su authored at least 45 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Time Complexities of Multiple-precision Modular Operations and Related Ratios.
IACR Cryptol. ePrint Arch., 2023

2021
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio.
IACR Cryptol. ePrint Arch., 2021

A New Rational Approach to the Square Root of 5.
CoRR, 2021

A New Lever Function with Adequate Indeterminacy.
CoRR, 2021

2019
Secure Email Login Based on Lightweight Asymmetric Identities.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Design of a Program Identification System for Preventing Malicious Codes.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2018
The Multiphoton Boson Sampling Machine Doesn't Beat Early Classical Computers for Five-boson Sampling.
CoRR, 2018

2017
A Fast Asymmetric Cryptosystem Using Extra Superincreasing Sequences.
CoRR, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

2016
A provably secure non-iterative hash function resisting birthday attack.
Theor. Comput. Sci., 2016

A semantically secure public key cryptoscheme using bit-pair shadows.
Theor. Comput. Sci., 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

2015
Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015

A New Non-Merkle-Damgård Structural Hash Function with Provable Security.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
A 128-bit Block Cipher Based on Three Group Arithmetics.
IACR Cryptol. ePrint Arch., 2014

A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
CoRR, 2014

A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes.
CoRR, 2014

Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Quantum Algorithm for Polynomial Root Finding Problem.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Diploma Anti-forgery System Based on Lightweight Digital Signatures.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
A Public Key Cryptoscheme Using the Bit-pair Method.
IACR Cryptol. ePrint Arch., 2013

A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
IACR Cryptol. ePrint Arch., 2013

A Lever Function to a New Codomain with Adequate Indeterminacy.
IACR Cryptol. ePrint Arch., 2013

The Improvement of the Commonly Used Linear Polynomial Selection Methods.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A public key cryptosystem based on three new provable problems.
Theor. Comput. Sci., 2012

Digital Copyright Protection Scheme Based on JUNA Lightweight Digital Signatures.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Asymptotic granularity reduction and its application.
Theor. Comput. Sci., 2011

Asymptotic Granularity Reduction and Its Application
CoRR, 2011

An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Analysis of the Success Rate of the LLL Lattice Basis Reduction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Design Verification of BJUT Library Management System with PVS.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
REESSE1+ . Reward . Proof by Experiment
CoRR, 2009

Design of a Passport Anti-forgery System Based on Digital Signature Schemes.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

2008
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation
CoRR, 2008

Operation of Super Long Integers in Cryptographic Applications.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

The Banknote Anti-forgery System Based on Digital Signature Algorithms.
Proceedings of the Intelligence and Security Informatics, 2008

2007
The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem
CoRR, 2007

Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
CoRR, 2007

To Solve the High Degree Congruence.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Design and Analysis of a Hash Ring-iterative Structure.
IACR Cryptol. ePrint Arch., 2006

The REESSE1+ Public Key Cryptosystem v2.2.
IACR Cryptol. ePrint Arch., 2006


  Loading...