Dawu Gu

According to our database1, Dawu Gu authored at least 220 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Dual System in Lattice: Fully Secure ABE from LWE Assumption.
IACR Cryptology ePrint Archive, 2020

New insights on linear cryptanalysis.
SCIENCE CHINA Information Sciences, 2020

Improved Cryptanalysis of Reduced-Version QARMA-64/128.
IEEE Access, 2020

2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Sec. Comput., 2019

Tightly secure signature schemes from the LWE and subset sum assumptions.
Theor. Comput. Sci., 2019

A generic construction of tightly secure signatures in the multi-user setting.
Theor. Comput. Sci., 2019

Structure-preserving public-key encryption with leakage-resilient CCA security.
Theor. Comput. Sci., 2019

Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
Security and Communication Networks, 2019

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.
TIIS, 2019

Security analysis of third-party in-app payment in mobile applications.
J. Inf. Sec. Appl., 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptology ePrint Archive, 2019

Generic Constructions of Robustly Reusable Fuzzy Extractor.
IACR Cryptology ePrint Archive, 2019

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.
IACR Cryptology ePrint Archive, 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

Towards a Multi-Chain Future of Proof-of-Space.
CoRR, 2019

A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison.
CoRR, 2019

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.
Comput. J., 2019

Side channel attack of multiplication in GF(q)-application to secure RSA-CRT.
SCIENCE CHINA Information Sciences, 2019

Improved impossible differential cryptanalysis of large-block Rijndael.
SCIENCE CHINA Information Sciences, 2019

Pseudo random oracle of Merkle-Damgård hash functions revisited.
SCIENCE CHINA Information Sciences, 2019

Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

Pseudorandom Functions from LWE: RKA Security and Application.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Information Forensics and Security, 2018

AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
TIIS, 2018

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
TIIS, 2018

ISO/IEC 9797-1 Revisited: Beyond Birthday Bound.
IACR Cryptology ePrint Archive, 2018

Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions.
IACR Cryptology ePrint Archive, 2018

Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness.
Des. Codes Cryptogr., 2018

Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.
Comput. J., 2018

Tightly Secure Encryption Schemes against Related-Key Attacks.
Comput. J., 2018

Similar operation template attack on RSA-CRT as a case study.
SCIENCE CHINA Information Sciences, 2018

Improved meet-in-the-middle attacks on reduced-round Piccolo.
SCIENCE CHINA Information Sciences, 2018

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Burn After Reading: Expunging Execution Footprints of Android Apps.
Proceedings of the Network and System Security - 12th International Conference, 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embedded Comput. Syst., 2017

Public key encryption resilient to leakage and tampering attacks.
J. Comput. Syst. Sci., 2017

Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
TIIS, 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptology ePrint Archive, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptology ePrint Archive, 2017

Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
IACR Cryptology ePrint Archive, 2017

Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed.
Proceedings of the 26th USENIX Security Symposium, 2017

Learning AC0 Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Efficient and Constant Time Modular Inversions Over Prime Fields.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Implementation of Trojan Side-Channel with a Masking Scheme.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Information Forensics and Security, 2016

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications.
IEEE Trans. Dependable Sec. Comput., 2016

Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Sec. Comput., 2016

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Security and Communication Networks, 2016

Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Public key cryptosystems secure against memory leakage attacks.
IET Information Security, 2016

Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions.
IET Information Security, 2016

Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Information Security, 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptology ePrint Archive, 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
IACR Cryptology ePrint Archive, 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
SCIENCE CHINA Information Sciences, 2016

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

On the Robustness of Learning Parity with Noise.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Security and Communication Networks, 2015

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things.
TIIS, 2015

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
IJDSN, 2015

Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192.
IET Information Security, 2015

Secure Sketch Metamorphosis: Tight Unified Bounds.
IACR Cryptology ePrint Archive, 2015

A Survey on Lightweight Entity Authentication with Strong PUFs.
ACM Comput. Surv., 2015

Efficient Pairing Computation on Huff Curves.
Cryptologia, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Comput. J., 2015

The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

CLIP: Continuous Location Integrity and Provenance for Mobile Phones.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptology ePrint Archive, 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II.
IACR Cryptology ePrint Archive, 2014

The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electronic Colloquium on Computational Complexity (ECCC), 2014

iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

Proofs of Retrievability Based on MRD Codes.
Proceedings of the Information Security Practice and Experience, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

An Improved Side-Channel Attack Based on Support Vector Machine.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Legitimate-reader-only attack on MIFARE Classic.
Math. Comput. Model., 2013

Differential Fault Analysis on the MD5 Compression Function.
JCP, 2013

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
IJDSN, 2013

Proofs of Data Possession and Retrievability Based on MRD Codes.
IACR Cryptology ePrint Archive, 2013

Differential power analysis of stream ciphers with LFSRs.
Comput. Math. Appl., 2013

Efficient, fast and scalable authentication for VANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Efficient Implementation of Tate Pairing with Montgomery Ladder Method.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Security analysis and enhancement for three-party password-based authenticated key exchange protocol.
Security and Communication Networks, 2012

On weaknesses of the HDCP authentication and key exchange protocol and its repair.
Math. Comput. Model., 2012

Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012

Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher.
JNW, 2012

Provably secure three-party password-based authenticated key exchange protocol.
Inf. Sci., 2012

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256.
IACR Cryptology ePrint Archive, 2012

Impossible Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information Security Practice and Experience, 2012

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On Constant-Round Precise Zero-Knowledge.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Android Malware Forensics: Reconstruction of Malicious Events.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

Reducing extra storage in searchable symmetric encryption scheme.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A Highly Efficient Correlation Power Analysis on PRINT Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Improved Differential Fault Analysis of SOSEMANUK.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Fault Analysis of the Piccolo Block Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Linear Fault Analysis of Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher.
JCP, 2011

Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptology ePrint Archive, 2011

A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011

Detection and Analysis of Cryptographic Data Inside Software.
Proceedings of the Information Security, 14th International Conference, 2011

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Proceedings of the Information Security Practice and Experience, 2011

Fault Detection of the MacGuffin Cipher against Differential Fault Attack.
Proceedings of the Trusted Systems - Third International Conference, 2011

Linear Cryptanalysis of ARIA Block Cipher.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

An improved dynamic provable data possession model.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Provably secure authenticated key exchange protocol under the CDH assumption.
J. Syst. Softw., 2010

CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
J. Syst. Softw., 2010

Differential fault analysis on Camellia.
J. Syst. Softw., 2010

New Fuzzy Identity-Based Encryption in the Standard Model.
Informatica, Lith. Acad. Sci., 2010

Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Int. J. Found. Comput. Sci., 2010

Stronger Security Model of Group Key Agreement.
IACR Cryptology ePrint Archive, 2010

An efficient fault-tolerant group key agreement protocol.
Comput. Commun., 2010

Precise bounded-concurrent zero-knowledge proofs for NP.
SCIENCE CHINA Information Sciences, 2010

Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Efficient Pairing Computation on Elliptic Curves in Hessian Form.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Digital Forensic Analysis on Runtime Instruction Flow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

On Obfuscating Programs with Tamper-proof Hardware.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Correlation Power Analysis Against Stream Cipher MICKEY v2.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
J. Syst. Softw., 2009

Fully CCA2 secure identity based broadcast encryption without random oracles.
Inf. Process. Lett., 2009

Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher.
IACR Cryptology ePrint Archive, 2009

Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.
IACR Cryptology ePrint Archive, 2009

Precise Time and Space Simulatable Zero-Knowledge.
IACR Cryptology ePrint Archive, 2009

Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication.
Cryptologia, 2009

An Extension of Differential Fault Analysis on AES.
Proceedings of the Third International Conference on Network and System Security, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Differential-Multiple Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Differential fault analysis on the ARIA algorithm.
Inf. Sci., 2008

Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model.
Informatica (Slovenia), 2008

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008

Secure Remote Storage through Authenticated Encryption.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Efficient disk encryption and verification through trusted nonce.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Secure Hierarchical Identity Based Encryption Scheme in the Standard Model.
Proceedings of the Progress in Cryptology, 2008

An Easy-to-Deploy Penetration Testing Platform.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Data privacy and integrity appropriate for disk protection.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.
Proceedings of the Provable Security, 2007

A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
An extension of secure group communication using key graph.
Inf. Sci., 2006

2005
An Efficient Group Key Management Scheme: Link Tree Protocol.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

2002
A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Proceedings of the Information Security, 5th International Conference, 2002

2001
On the Techniques of Enhancing the Security of Block Ciphers.
Operating Systems Review, 2001


  Loading...