Shenghui Su
According to our database1,
Shenghui Su
authored at least 45 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2021
IACR Cryptol. ePrint Arch., 2021
2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
2018
The Multiphoton Boson Sampling Machine Doesn't Beat Early Classical Computers for Five-boson Sampling.
CoRR, 2018
2017
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017
2016
Theor. Comput. Sci., 2016
Theor. Comput. Sci., 2016
2015
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Theor. Comput. Sci., 2012
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009
2008
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation
CoRR, 2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
CoRR, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006