Hongjun Wu

Orcid: 0000-0002-9713-7542

Affiliations:
  • University of Texas at San Antonio, San Antonio, TX, USA


According to our database1, Hongjun Wu authored at least 41 papers between 1998 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2021

2019
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

2018
Distinguishing Attack on NORX Permutation.
IACR Trans. Symmetric Cryptol., 2018

Cryptography and Future Security.
Discret. Appl. Math., 2018

On the Weakness of Constant Blinding PRNG in Flash Player.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Improved Differential Cryptanalysis on Generalized Feistel Schemes.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Simpira v2.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2015
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Authenticated Encryption Algorithm COFFE.
IACR Cryptol. ePrint Arch., 2015

Differential-Linear Cryptanalysis of ICEPOLE.
IACR Cryptol. ePrint Arch., 2015

URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Improving the Biclique Cryptanalysis of AES.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2013
AEGIS: A Fast Authenticated Encryption Algorithm.
IACR Cryptol. ePrint Arch., 2013

2012
Differential Attacks against Stream Cipher ZUC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptol. ePrint Arch., 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2008
The Stream Cipher HC-128.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

2007
Differential-Linear Attacks Against the Stream Cipher Phelix.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.
Proceedings of the Advances in Cryptology, 2007

MAME: A Compression Function with Reduced Hardware Requirements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Cryptanalysis of the Stream Cipher ABC v2.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Resynchronization Attacks on WG and LEX.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Cryptanalysis of the Stream Cipher DECIM.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Weaknesses of COSvd (2, 128) Stream Cipher.
Proceedings of the Information Security and Cryptology, 2005

A Fast Correlation Attack on the Shrinking Generator.
Proceedings of the Topics in Cryptology, 2005

2004
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.
Proceedings of the Progress in Cryptology, 2004

Security Analysis of the Generalized Self-shrinking Generator.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
An Efficient Known Plaintext Attack on FEA-M.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes.
Informatica (Slovenia), 2002

Cryptanalysis of Stream Cipher COS (2, 128) Mode I.
IACR Cryptol. ePrint Arch., 2002

2001
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Public Key Cryptography, 2001

Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2001

Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Cryptanalysis of Polynominal Authentication and Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Cryptanalysis of the <i>m</i>-Permutation Protection Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1998
Improved Truncated Differential Attacks on SAFER.
Proceedings of the Advances in Cryptology, 1998

Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Proceedings of the Advances in Cryptology, 1998


  Loading...