Honggang Hu

Orcid: 0000-0002-8903-8413

According to our database1, Honggang Hu authored at least 101 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks.
IACR Cryptol. ePrint Arch., 2024

2023
An Open Problem About Monomial Bent Functions.
IEEE Trans. Inf. Theory, December, 2023

Design Space Exploration of Galois and Fibonacci Configuration Based on Espresso Stream Cipher.
ACM Trans. Reconfigurable Technol. Syst., September, 2023

Hardware Optimizations of Fruit-80 Stream Cipher: Smaller than Grain.
ACM Trans. Reconfigurable Technol. Syst., June, 2023

Adaptively code-correlation robustness functions and its applications to private set intersection.
Theor. Comput. Sci., February, 2023

F<sup>2</sup>Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Quantum attacks against BBB secure PRFs or MACs built from public random permutations.
Quantum Inf. Process., 2023

Multi-spectral Class Center Network for Face Manipulation Detection and Localization.
CoRR, 2023

A new twofold Cornacchia-type algorithm and its applications.
Adv. Math. Commun., 2023

2022
Agency or Wholesale? The Role of Retail Pass-Through.
Manag. Sci., 2022

Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022

2021
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server.
IEEE Trans. Serv. Comput., 2021

A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications.
IACR Cryptol. ePrint Arch., 2021

Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves.
IACR Cryptol. ePrint Arch., 2021

A New Twofold Cornacchia-Type Algorithm.
IACR Cryptol. ePrint Arch., 2021

Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher.
IACR Cryptol. ePrint Arch., 2021

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
IACR Cryptol. ePrint Arch., 2021

Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited.
Entropy, 2021

Two Problems about Monomial Bent Functions.
CoRR, 2021

Multi-user security of the tweakable Even-Mansour cipher.
Sci. China Inf. Sci., 2021

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

General 4-GLV Lattice Reduction Algorithms.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

Strengthening Profiled Side Channel Attacks on AES via Multi-view Information Aggregation.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Lattice-Based Cryptanalysis of RSA with Implicitly Related Keys.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020

Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks.
CoRR, 2020

An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020

Research on Online Leakage Assessment.
Proceedings of the Data Science, 2020

Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD Models.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019

A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a.
J. Ambient Intell. Humaniz. Comput., 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019

On designing secure small-state stream ciphers against time-memory-data tradeoff attacks.
IACR Cryptol. ePrint Arch., 2019

Construction of three classes of Strictly Optimal Frequency-Hopping Sequence Sets.
CoRR, 2019

Robust newsvendor problems: effect of discrete demands.
Ann. Oper. Res., 2019

Floating-Point Multiplication Timing Attack on Deep Neural Network.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Implicit-Key Attack on the RSA Cryptosystem.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Post-Quantum Pseudorandom Functions from Mersenne Primes.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Implicit Related-Key Factorization Problem on the RSA Cryptosystem.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions.
IEEE Trans. Inf. Theory, 2018

Close to Optimally Secure Variants of GCM.
Secur. Commun. Networks, 2018

Generalized Tweakable Even-Mansour Cipher and Its Applications.
J. Comput. Sci. Technol., 2018

Efficient KEA-Style Lattice-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments.
Entropy, 2018

On the Arithmetic Complexities of Hamming Codes and Hadamard Codes.
CoRR, 2018

Efficient beyond-birthday-bound secure authenticated encryption modes.
Sci. China Inf. Sci., 2018

Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh Spectrum.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Advanced Slide Attacks on the Even-Mansour Scheme.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Cryptanalysis of RSA Variants with Modified Euler Quotient.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
On the Dual of the Coulter-Matthews Bent Functions.
IEEE Trans. Inf. Theory, 2017

Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy.
Multim. Tools Appl., 2017

Necessary conditions for designing secure stream ciphers with the minimal internal states.
IACR Cryptol. ePrint Arch., 2017

INT-RUP Security of Checksum-Based Authenticated Encryption.
Proceedings of the Provable Security, 2017

Secure Image Denoising over Two Clouds.
Proceedings of the Image and Graphics - 9th International Conference, 2017

New Pseudorandom Number Generators from Block Ciphers.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Permutation-Based Tweakable On-line Cipher with Improved Security Guarantees.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A New Chosen IV Statistical Attack on Grain-128a Cipher.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Secure Nonlocal Denoising in Outsourced Images.
ACM Trans. Multim. Comput. Commun. Appl., 2016

The INT-RUP Security of OCB with Intermediate (Parity) Checksum.
IACR Cryptol. ePrint Arch., 2016

On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2016

Fruit: ultra-lightweight stream cipher with shorter internal state.
IACR Cryptol. ePrint Arch., 2016

Generalized cryptanalysis of RSA with small public exponent.
Sci. China Inf. Sci., 2016

Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n.
Cryptogr. Commun., 2016

Multiple Handshakes Security of TLS 1.3 Candidates.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Prime Power RSA with two private exponents.
Sci. China Inf. Sci., 2015

2014
New Constructions of Codebooks Nearly Meeting the Welch Bound With Equality.
IEEE Trans. Inf. Theory, 2014

The Proof of Lin's Conjecture via the Decimation-Hadamard Transform.
IEEE Trans. Inf. Theory, 2014

Comments on "A New Method to Compute the 2-Adic Complexity of Binary Sequences".
IEEE Trans. Inf. Theory, 2014

FCSR periodic multisequences with maximal joint <i>N</i>-adic complexity and large <i>k</i>-error joint <i>N</i>-adic complexity over <i>Z</i>/(<i>N</i>).
J. Syst. Sci. Complex., 2014

The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications.
Int. J. Distributed Sens. Networks, 2014

On the proof of Lin's conjecture.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Non-local Denoising in Encrypted Images.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
On the Dual of Certain Ternary Weakly Regular Bent Functions.
IEEE Trans. Inf. Theory, 2012

A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences.
IEEE Trans. Inf. Theory, 2012

New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
High-Rate Distributed Space-Time-Frequency Coding for Wireless Cooperative Networks.
IEEE Trans. Wirel. Commun., 2011

Fast Discrete Fourier Spectra Attacks on Stream Ciphers.
IEEE Trans. Inf. Theory, 2011

Periods on Two Kinds of nonlinear Feedback Shift Registers with Time Varying Feedback Functions.
Int. J. Found. Comput. Sci., 2011

Remedying the Hummingbird Cryptographic Algorithm.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
New sets of zero or low correlation zone sequences via interleaving techniques.
IEEE Trans. Inf. Theory, 2010

A new class of ternary and quaternary sequences with two-level autocorrelation.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
New results on periodic sequences with large k-error linear complexity.
IEEE Trans. Inf. Theory, 2009

New sequence families with zero or low correlation zone via interleaving techniques.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Trans. Inf. Theory, 2008

A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order.
Proceedings of the Sequences and Their Applications, 2008

Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
Proceedings of the Information Security Practice and Experience, 2008

2007
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 2007

On Quadratic Bent Functions in Polynomial Forms.
IEEE Trans. Inf. Theory, 2007

2006
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z<sub>2</sub><sup>l</sup>.
IEEE Trans. Inf. Theory, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

2005
A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z<sub>2<sup>l</sup></sub>.
IACR Cryptol. ePrint Arch., 2004


  Loading...