Dengguo Feng

According to our database1, Dengguo Feng authored at least 294 papers between 1999 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Using mobile phones to enhance computing platform trust.
Telecommunication Systems, 2018

Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
J. Cryptology, 2018

Formal analysis of HMAC authorisation in the TPM2.0 specification.
IET Information Security, 2018

Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.
IACR Cryptology ePrint Archive, 2018

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Computer Networks, 2018

2017
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptology ePrint Archive, 2017

Secure Code Updates for Smart Embedded Devices based on PUFs.
IACR Cryptology ePrint Archive, 2017

Towards Efficient Heap Overflow Discovery.
Proceedings of the 26th USENIX Security Symposium, 2017

How Well Can WordNet Measure Privacy: A Comparative Study?
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

Automatically assessing crashes from heap overflows.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Secure Code Updates for Smart Embedded Devices Based on PUFs.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Theoretical and practical aspects of multiple samples correlation power analysis.
Security and Communication Networks, 2016

Towards optimal leakage exploitation rate in template attacks.
Security and Communication Networks, 2016

Direct Resource Hijacking in Android.
IEEE Internet Computing, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptology ePrint Archive, 2016

Computational Soundness Results for Stateful Applied pi Calculus.
CoRR, 2016

Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Multiple Handshakes Security of TLS 1.3 Candidates.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Computational Soundness Results for Stateful Applied π Calculus.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Attacks and Defence on Android Free Floating Windows.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Boolean Functions and Their Applications in Cryptography
Advances in Computer Science and Technology, Springer, ISBN: 978-3-662-48865-2, 2016

2015
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding and Multimedia Security, 2015

Security analysis of SM2 key exchange protocol in TPM2.0.
Security and Communication Networks, 2015

Mahalanobis distance similarity measure based distinguisher for template attack.
Security and Communication Networks, 2015

On the provable security of TPM2.0 cryptography APIs.
IJES, 2015

Practical-time related-key attack on Hummingbird-2.
IET Information Security, 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone.
IACR Cryptology ePrint Archive, 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptology ePrint Archive, 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Access Control for Privacy Protection for Dynamic and Correlated Databases.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Improving Accuracy of Static Integer Overflow Detection in Binary.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

A Rapid and Scalable Method for Android Application Repackaging Detection.
Proceedings of the Information Security Practice and Experience, 2015

Operating System Security Policy Hardening via Capability Dependency Graphs.
Proceedings of the Information Security Practice and Experience, 2015

On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes.
Proceedings of the Information Security Practice and Experience, 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Fast password recovery attack: application to APOP.
J. Intelligent Manufacturing, 2014

Universally Composable secure TNC protocol based on IF-T binding to TLS.
IACR Cryptology ePrint Archive, 2014

Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptology ePrint Archive, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptology ePrint Archive, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptology ePrint Archive, 2014

How to Choose Interesting Points for Template Attack More Effectively?
IACR Cryptology ePrint Archive, 2014

How to Choose Interesting Points for Template Attacks?
IACR Cryptology ePrint Archive, 2014

Template Attacks Based On Priori Knowledge.
IACR Cryptology ePrint Archive, 2014

Evaluating and comparing the quality of access control in different operating systems.
Computers & Security, 2014

Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP.
SCIENCE CHINA Information Sciences, 2014

Computing Walsh coefficients from the algebraic normal form of a Boolean function.
Cryptography and Communications, 2014

FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Long Term Tracking and Characterization of P2P Botnet.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Efficiently Attribute-Based Access Control for Mobile Cloud Storage System.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Automated User Profiling in Location-Based Mobile Messaging Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

DAA-Related APIs in TPM 2.0 Revisited.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS.
Proceedings of the Network and System Security - 8th International Conference, 2014

Revisiting Node Injection of P2P Botnet.
Proceedings of the Network and System Security - 8th International Conference, 2014

Formal Analysis of DAA-Related APIs in TPM 2.0.
Proceedings of the Network and System Security - 8th International Conference, 2014

ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication.
Proceedings of the Information Security - 17th International Conference, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Proceedings of the Information Security Practice and Experience, 2014

Template Attacks Based on Priori Knowledge.
Proceedings of the Trusted Systems - 6th International Conference, 2014

How to Choose Interesting Points for Template Attacks More Effectively?
Proceedings of the Trusted Systems - 6th International Conference, 2014

Linear Cryptanalysis of FASER128/256 and TriviA-ck.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

A Clustering Approach for Privacy-Preserving in Social Networks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Efficient identity-based strong designated verifier signature schemes.
Security and Communication Networks, 2013

Fast Collision Attack on MD5.
IACR Cryptology ePrint Archive, 2013

Type-Based Analysis of Protected Storage in the TPM (full version).
IACR Cryptology ePrint Archive, 2013

Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks.
IACR Cryptology ePrint Archive, 2013

On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption.
IACR Cryptology ePrint Archive, 2013

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
IACR Cryptology ePrint Archive, 2013

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Proceedings of the Security and Privacy in Communication Networks, 2013

VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2013

On the Security of an Efficient Attribute-Based Signature.
Proceedings of the Network and System Security - 7th International Conference, 2013

Measuring and Comparing the Protection Quality in Different Operating Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

Type-Based Analysis of Protected Storage in the TPM.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Near Collision Attack on the Grain v1 Stream Cipher.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Cryptanalysis of Helix and Phelix Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

On the security of PPPoE network.
Security and Communication Networks, 2012

Understanding and analyzing network traffic.
IEEE Network, 2012

On the nonexistence of nontrivial small cycles of the µ function in 3x+1 conjecture.
J. Systems Science & Complexity, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptology ePrint Archive, 2012

Round-optimal zero-knowledge proofs of knowledge for NP.
SCIENCE CHINA Information Sciences, 2012

Black-box testing based on colorful taint analysis.
SCIENCE CHINA Information Sciences, 2012

TSD: A Flexible Root of Trust for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Proceedings of the Provable Security - 6th International Conference, 2012

Combined Public-Key Schemes: The Case of ABE and ABS.
Proceedings of the Provable Security - 6th International Conference, 2012

Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

An attribute based encryption scheme with fine-grained attribute revocation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
The Weight Enumerator of a Class of Cyclic Codes.
IEEE Trans. Information Theory, 2011

Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Network, 2011

Generic Constructions for Strong Designated Verifier Signature.
JIPS, 2011

On Guess and Determine Analysis of Rabbit.
Int. J. Found. Comput. Sci., 2011

Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.
IACR Cryptology ePrint Archive, 2011

On the Security of NMAC and Its Variants.
IACR Cryptology ePrint Archive, 2011

Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge.
IACR Cryptology ePrint Archive, 2011

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions.
IACR Cryptology ePrint Archive, 2011

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks.
Computer Communications, 2011

Improved multi-pass fast correlation attacks with applications.
SCIENCE CHINA Information Sciences, 2011

A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A DRTM-Based Method for Trusted Network Connection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Proceedings of the Provable Security - 5th International Conference, 2011

How to Characterize Side-Channel Leakages More Accurately?
Proceedings of the Information Security Practice and Experience, 2011

DAA Protocol Analysis and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Selective Disclosure on Encrypted Documents.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Loiss: A Byte-Oriented Stream Cipher.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Benchmarking for Steganography by Kernel Fisher Discriminant Criterion.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Comments on the SM2 Key Exchange Protocol.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Towards Attribute Revocation in Key-Policy Attribute Based Encryption.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
New Disturbance Vector for SHA-0 Collision.
J. Inf. Sci. Eng., 2010

Some results on cryptanalysis of SMS4 block cipher.
IJACT, 2010

Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round.
IET Information Security, 2010

Construct MD5 Collisions Using Just A Single Block Of Message.
IACR Cryptology ePrint Archive, 2010

Loiss: A Byte-Oriented Stream Cipher.
IACR Cryptology ePrint Archive, 2010

On constant-round zero-knowledge proofs of knowledge for NP-relations.
SCIENCE CHINA Information Sciences, 2010

A property-based attestation protocol for TCM.
SCIENCE CHINA Information Sciences, 2010

Security model and modular design of fair authentication key exchange protocols.
SCIENCE CHINA Information Sciences, 2010

Fine-Grained Cloud DB Damage Examination Based on Bloom Filters.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Real-Time Remote Attestation with Privacy Protection.
Proceedings of the Trust, 2010

Privacy Preserving of Trust Management Credentials Based on Trusted Computing.
Proceedings of the Information Security, 2010

Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security.
Proceedings of the Global Communications Conference, 2010

CloudSEC: A Cloud Architecture for Composing Collaborative Security Services.
Proceedings of the Cloud Computing, Second International Conference, 2010

DepSim: A Dependency-Based Malware Similarity Comparison System.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

A Byte-Based Guess and Determine Attack on SOSEMANUK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
New results on periodic sequences with large k-error linear complexity.
IEEE Trans. Information Theory, 2009

How To Find Weak Input Differences For MD5 Collision Attacks.
IACR Cryptology ePrint Archive, 2009

An improved smart card based password authentication scheme with provable security.
Computer Standards & Interfaces, 2009

ReconBin: Reconstructing Binary File from Execution for Software Analysis.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Cryptanalysis of the LANE Hash Function.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
Proceedings of the Information Security Practice and Experience, 2009

On the Correctness of an Approach against Side-Channel Attacks.
Proceedings of the Information Security Practice and Experience, 2009

Reconstructing a Packed DLL Binary for Static Analysis.
Proceedings of the Information Security Practice and Experience, 2009

Practical Rebound Attack on 12-Round Cheetah-256.
Proceedings of the Information, Security and Cryptology, 2009

Bring Efficient Connotation Expressible Policies to Trust Management.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model.
Proceedings of the Computer Science, 2009

TBDRM: A TPM-Based Secure DRM Architecture.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

L-UCON: Towards Layered Access Control with UCON.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A New Client-to-Client Password-Authenticated Key Agreement Protocol.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Trans. Information Theory, 2008

Direct Anonymous Attestation for Next Generation TPM.
JCP, 2008

Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
IACR Cryptology ePrint Archive, 2008

A New Collision Differential For MD5 With Its Full Differential Path.
IACR Cryptology ePrint Archive, 2008

Cryptanalysis of the Hash Function LUX-256.
IACR Cryptology ePrint Archive, 2008

On the Correctness of An Approach Against Side-channel attacks.
IACR Cryptology ePrint Archive, 2008

Round-Optimal Zero-Knowledge Proofs of Knowledge for NP.
IACR Cryptology ePrint Archive, 2008

Research on Malicious Transaction Processing Method of Database System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

An Improved Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
Proceedings of the Information Security Practice and Experience, 2008

New results on periodic sequences with large k-error linear complexity.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

A Fast Implementation of Computing the Transparency Order of S-Boxes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A New Direct Anonymous Attestation Scheme from Bilinear Maps.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

BIFI: Architectural Support for Information Flow Integrity Measurement.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Security of Truncated MACs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Exploring Malware Behaviors Based on Environment Constitution.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

On the Unprovable Security of 2-Key XCBC.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Information Theory, 2007

On Quadratic Bent Functions in Polynomial Forms.
IEEE Trans. Information Theory, 2007

Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia.
J. Comput. Sci. Technol., 2007

Security Proof of the Original SOK-IBS Scheme.
I. J. Network Security, 2007

Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
Frontiers Comput. Sci. China, 2007

Survey of information security.
Science in China Series F: Information Sciences, 2007

Constructing parallel long-message signcryption scheme from trapdoor permutation.
Science in China Series F: Information Sciences, 2007

Modular approach to the design and analysis of password-based security protocols.
Science in China Series F: Information Sciences, 2007

SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007

Related-Key Differential-Linear Attacks on Reduced AES-192.
Proceedings of the Progress in Cryptology, 2007

New Results on Impossible Differential Cryptanalysis of Reduced AES.
Proceedings of the Information Security and Cryptology, 2007

Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Differential Fault Analysis on CLEFIA.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

An Effective Genetic Algorithm for Self-Inverse S-Boxes.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Improved Client-to-Client Password-Authenticated Key Exchange Protocol.
Proceedings of the The Second International Conference on Availability, 2007

2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/.
IEEE Trans. Information Theory, 2006

Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol., 2006

DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory.
Journal of Computer Research and Development, 2006

Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes.
IEICE Transactions, 2006

Key Replacement Attack on a Certificateless Signature Scheme.
IACR Cryptology ePrint Archive, 2006

Impossible Differential Cryptanalysis of ARIA and Camellia.
IACR Cryptology ePrint Archive, 2006

Cryptanalysis of the MEM Mode of Operation.
IACR Cryptology ePrint Archive, 2006

Security analysis of a new stream cipher.
Science in China Series F: Information Sciences, 2006

On Non-binary Quantum BCH Codes.
Proceedings of the Theory and Applications of Models of Computation, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Multi-pass Fast Correlation Attack on Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
Proceedings of the Progress in Cryptology, 2006

The Design of an Artificial Immune System.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Composing Administrative Scope of Delegation Policies based on extended XACML.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

New Guess-and-Determine Attack on the Self-Shrinking Generator.
Proceedings of the Advances in Cryptology, 2006

Efficient Anonymous Electronic Metering Scheme.
Proceedings of the Advances in Intelligent IT, 2006

Fault-tolerate Multiparty Electronic Contract Signing Protocol.
Proceedings of the Advances in Intelligent IT, 2006

Identity-based PKI Scheme for Machine Readable Travel Document.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Certificateless Public-Key Signature: Security Model and Efficient Construction.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

Proxy Oblivious Transfer Protocol.
Proceedings of the The First International Conference on Availability, 2006

2005
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication.
IEEE Communications Letters, 2005

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.
IACR Cryptology ePrint Archive, 2005

On the Security of a Certificateless Public-Key Encryption.
IACR Cryptology ePrint Archive, 2005

Improved Integral Cryptanalysis of FOX Block Cipher.
IACR Cryptology ePrint Archive, 2005

Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electronic Colloquium on Computational Complexity (ECCC), 2005

Collision attack on reduced-round Camellia.
Science in China Series F: Information Sciences, 2005

An attack on hash function HAVAL-128.
Science in China Series F: Information Sciences, 2005

Cryptanalysis of some signature schemes with message recovery.
Applied Mathematics and Computation, 2005

Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

On the Security of Tweakable Modes of Operation: TBC and TAE.
Proceedings of the Information Security, 8th International Conference, 2005

Intrusion Tolerant CA Scheme with Cheaters Detection Ability.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Efficient Fair Certified E-Mail Delivery Based on RSA.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

ID-Based Proxy Signature Using Bilinear Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Detecting the Deviations of Privileged Process Execution.
Proceedings of the Networking, 2005

A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005

Weaknesses of COSvd (2, 128) Stream Cipher.
Proceedings of the Information Security and Cryptology, 2005

Integral Cryptanalysis of Reduced FOX Block Cipher.
Proceedings of the Information Security and Cryptology, 2005

Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Proceedings of the Advances in Cryptology, 2005

A Fast Correlation Attack on the Shrinking Generator.
Proceedings of the Topics in Cryptology, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Experiences on Intrusion Tolerance Distributed Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

HCTR: A Variable-Input-Length Enciphering Mode.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Incremental Fuzzy Decision Tree-Based Network Forensic System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

ID-Based Aggregate Signatures from Bilinear Pairings.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
New Semantic Model for Authentication Protocols in ASMs.
J. Comput. Sci. Technol., 2004

Distributed Oblivious Function Evaluation and Its Applications.
J. Comput. Sci. Technol., 2004

Oblivious Polynomial Evaluation.
J. Comput. Sci. Technol., 2004

Identity Based Threshold Proxy Signature.
IACR Cryptology ePrint Archive, 2004

ID-Based Proxy Signature Using Bilinear Pairings.
IACR Cryptology ePrint Archive, 2004

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
IACR Cryptology ePrint Archive, 2004

Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes.
IACR Cryptology ePrint Archive, 2004

Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z2l.
IACR Cryptology ePrint Archive, 2004

A New k-Anonymous Message Transmission Protocol.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Ring Signature Scheme Using Bilinear Pairings.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences.
Proceedings of the Sequences and Their Applications, 2004

Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Towards the Public but Noninvertible Watermarking.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.
Proceedings of the Progress in Cryptology, 2004

An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
Proceedings of the Information Security and Cryptology, 2004

Security Analysis of the Generalized Self-shrinking Generator.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

An Arbitrated Quantum Message Signature Scheme.
Proceedings of the Computational and Information Science, First International Symposium, 2004

An effective evolutionary strategy for bijective S-boxes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Study on Strand Space Model Theory.
J. Comput. Sci. Technol., 2003

Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem.
IACR Cryptology ePrint Archive, 2003

Collision Attack on Reduced-Round Camellia.
IACR Cryptology ePrint Archive, 2003

Quantum Digital Signature Based on Quantum One-way Functions.
IACR Cryptology ePrint Archive, 2003

UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Cryptanalysis on AW digital signature scheme based on error-correcting codes.
Science in China Series F: Information Sciences, 2002

Linear cryptanalysis of NUSH block cipher.
Science in China Series F: Information Sciences, 2002

2000
Power Analysis of RC6 and Serpent.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Analysis and Design of E-voting Protocol.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A Simple Algorithm for Computing Several Sequences Synthesis.
Proceedings of the Information Security for Global Information Infrastructures, 2000

The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Three Characterizations of Correlation-immune Functions over Rings ZN.
Theor. Comput. Sci., 1999

Cryptanalysis of some AES Candidate Algorithms.
Proceedings of the Information and Communication Security, Second International Conference, 1999


  Loading...