Lei Hu

According to our database1, Lei Hu authored at least 259 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
IACR Trans. Symmetric Cryptol., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2019

Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas.
IEEE Trans. Mob. Comput., 2019

Intelligent Multibeam Transmissions for Mission-Oriented Airborne Networks.
IEEE Trans. Aerospace and Electronic Systems, 2019

New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm.
Sensors, 2019

Multi-PQTable for Approximate Nearest-Neighbor Search.
Information, 2019

Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling.
Information, 2019

Co-Saliency Detection via Local Prediction and Global Refinement.
IEICE Transactions, 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptology ePrint Archive, 2019

Scrutinizing the Tower Field Implementation of the 픽28 Inverter - with Applications to AES, Camellia, and SM4.
IACR Cryptology ePrint Archive, 2019

Boomerang Connectivity Table Revisited.
IACR Cryptology ePrint Archive, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptology ePrint Archive, 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit.
IACR Cryptology ePrint Archive, 2019

An efficient dynamic volume rendering for large-scale meteorological data in a virtual globe.
Computers & Geosciences, 2019

Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber.
Applied Mathematics and Computation, 2019

Zero-sum Distinguishers for Round-reduced GIMLI Permutation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Security and Communication Networks, 2018

On the Complexity of Impossible Differential Cryptanalysis.
Security and Communication Networks, 2018

A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties.
J. Systems Science & Complexity, 2018

Small Object Detection with Multiscale Features.
Int. J. Digital Multimedia Broadcasting, 2018

Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptology ePrint Archive, 2018

Three new classes of generalized almost perfect nonlinear power functions.
Finite Fields and Their Applications, 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p2m.
Cryptography and Communications, 2018

Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber.
Appl. Math. Lett., 2018

An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm.
IEEE Access, 2018

Video Saliency Estimation via Encoding Deep Spatiotemporal Saliency Cues.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Visual Tracking via Detecting and Removing Outliers Based on Block Sparse Representation.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy.
Proceedings of the Information Security - 21st International Conference, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

A Deterministic Algorithm for Computing Divisors in an Interval.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Trans. Symmetric Cryptol., 2017

Events detection and community partition based on probabilistic snapshot for evolutionary social network.
Peer-to-Peer Networking and Applications, 2017

Co-saliency Detection Based on Superpixel Matching and Cellular Automata.
TIIS, 2017

Several Classes of Boolean Functions with Four-Valued Walsh Spectra.
Int. J. Found. Comput. Sci., 2017

Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction.
IACR Cryptology ePrint Archive, 2017

Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptology ePrint Archive, 2017

Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields and Their Applications, 2017

Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
SCIENCE CHINA Information Sciences, 2017

Fast recovery of non-negative sparse signals under heterogeneous noise.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Anomaly Detection in Crowded Scenes via SA-MHOF and Sparse Combination.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

SMAP DATA for cropland soil moisture assessment - A case study.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

2016
Salient object detection based on discriminative boundary and multiple cues integration.
J. Electronic Imaging, 2016

Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptology ePrint Archive, 2016

Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptology ePrint Archive, 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptology ePrint Archive, 2016

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptology ePrint Archive, 2016

Some classes of permutation polynomials of the form (xpm-x+δ)s+x over Fp2m.
Finite Fields and Their Applications, 2016

An Buffering Optimization Algorithm for Cooperative Mobile Service.
Proceedings of the Smart Computing and Communication, 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

Related-Key Impossible Differential Analysis of Full Khudra.
Proceedings of the Advances in Information and Computer Security, 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

Web service-based SMAP soil moisture data visualization, dissemination and analytics based on vegscape framwork.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Astronomical image superposition using an new improved particle swarm optimization.
Proceedings of the 12th International Conference on Natural Computation, 2016

Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques.
Proceedings of the Information Systems Security and Privacy, 2016

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Improved Results on Cryptanalysis of Prime Power RSA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MST-based Visual Parsing of Online Handwritten Mathematical Expressions.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

Line-of-Sight Stroke Graphs and Parzen Shape Context Features for Handwritten Math Formula Representation and Symbol Segmentation.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

An Improved Analysis on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications.
IEEE Trans. Information Theory, 2015

Adding Geospatial Data Provenance into SDI - A Service-Oriented Approach.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2015

Differential fault attack on Zorro block cipher.
Security and Communication Networks, 2015

Boolean functions with four-valued Walsh spectra.
J. Systems Science & Complexity, 2015

Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity.
Int. J. Found. Comput. Sci., 2015

Improved MILP Modeling for Automatic Security Evaluation and Application to FOX.
IEICE Transactions, 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptology ePrint Archive, 2015

Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN.
IACR Cryptology ePrint Archive, 2015

Constructing permutations and complete permutations over finite fields via subfield-valued polynomials.
Finite Fields and Their Applications, 2015

The weight distributions of two classes of binary cyclic codes.
Finite Fields and Their Applications, 2015

Task-oriented Sensor Web data processing for environmental monitoring.
Earth Science Informatics, 2015

The weight distribution of a family of p-ary cyclic codes.
Des. Codes Cryptogr., 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

Improved Differential Analysis of Block Cipher PRIDE.
Proceedings of the Information Security Practice and Experience, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Building change detection for high-resolution remotely sensed images based on a semantic dependency.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Ship detection from optical satellite images based on visual search mechanism.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Pansharpening based on an improved ratio enhancement.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Registration for long-term multi-temporal remote sensing images under spatial constraints from historical data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

A Time Slices Based Novel DVS Algorithm for Embedded Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Efficient person re-identification by hybrid spatiogram and covariance descriptor.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Information Theory, 2014

Google Fusion Tables for Managing Soil Moisture Sensor Observations.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2014

A Secure and Efficient Handover Authentication Protocol for Wireless Networks.
Sensors, 2014

A generic homomorphic MAC construction for authentication in network coding.
Security and Communication Networks, 2014

Families of p-ary sequences with low correlation and large linear complexity.
J. Systems Science & Complexity, 2014

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Communications, 2014

Cryptanalysis of two cryptosystems based on multiple intractability assumptions.
IET Communications, 2014

Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptology ePrint Archive, 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptology ePrint Archive, 2014

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON.
IACR Cryptology ePrint Archive, 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptology ePrint Archive, 2014

The weight distributions of two classes of p-ary cyclic codes.
Finite Fields and Their Applications, 2014

Constructing new differentially 4-uniform permutations from the inverse function.
Finite Fields and Their Applications, 2014

Several classes of complete permutation polynomials.
Finite Fields and Their Applications, 2014

Constructing permutation polynomials from piecewise permutations.
Finite Fields and Their Applications, 2014

Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH.
Des. Codes Cryptogr., 2014

Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptography and Communications, 2014

New constructions of APN polynomial functions in odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Probabilistic Snapshot Based Evolutionary Social Network Events Detection.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A Fast and Accurate Reconstruction Algorithm for Compressed Sensing of Complex Sinusoids.
IEEE Trans. Signal Processing, 2013

GeoPWProv: Interleaving Map and Faceted Metadata for Provenance Visualization and Navigation.
IEEE Trans. Geoscience and Remote Sensing, 2013

A massage robot based on Chinese massage therapy.
Industrial Robot, 2013

Constructing New APN Functions from known PN Functions.
Int. J. Found. Comput. Sci., 2013

New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013

Analysis of two knapsack public key cryptosystems.
IET Communications, 2013

Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptology ePrint Archive, 2013

Geoprocessing in Cloud Computing platforms - a comparative analysis.
Int. J. Digital Earth, 2013

Compressed sensing of superimposed chirps with adaptive dictionary refinement.
SCIENCE CHINA Information Sciences, 2013

A femur fracture reduction method based on anatomy of the contralateral side.
Comp. in Bio. and Med., 2013

On a class of binomial bent functions over the finite fields of odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2013

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013

Differential Fault Attack on the PRINCE Block Cipher.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Proceedings of the Information Security Practice and Experience, 2013

Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling.
Proceedings of the Document Recognition and Retrieval XX, 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Modeling information diffusion over social networks for temporal dynamic prediction.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Research on SPH Parallel Acceleration Strategies for Multi-GPU Platform.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
Compressed Sensing of Complex Sinusoids: An Approach Based on Dictionary Refinement.
IEEE Trans. Signal Processing, 2012

A Task Ontology Driven Approach for Live Geoprocessing in a Service-Oriented Environment.
Trans. GIS, 2012

A matrix construction of Boolean functions with maximum algebraic immunity.
J. Systems Science & Complexity, 2012

Spam Short Messages Detection via Mining Social Networks.
J. Comput. Sci. Technol., 2012

Linear complexity of binary sequences derived from Euler quotients with prime-power modulus.
Inf. Process. Lett., 2012

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
IJDSN, 2012

Two classes of permutation polynomials over finite fields.
Finite Fields and Their Applications, 2012

A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields and Their Applications, 2012

On the reducibility of some composite polynomials over finite fields.
Des. Codes Cryptogr., 2012

3D navigation and monitoring for spinal milling operation based on registration between multiplanar fluoroscopy and CT images.
Computer Methods and Programs in Biomedicine, 2012

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security.
Computers & Mathematics with Applications, 2012

Baseline extraction-driven Parsing of handwritten mathematical expressions.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Measurement of fundus vessel diameter based on fundus fluorescence angiography image.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
A New Derivation of Constrained Cramér-Rao Bound Via Norm Minimization.
IEEE Trans. Signal Processing, 2011

More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Information Theory, 2011

On the Correlation Distributions of the Optimal Quaternary Sequence Family U and the Optimal Binary Sequence Family V.
IEEE Trans. Information Theory, 2011

Construction of 1-resilient Boolean functions with optimum algebraic immunity.
Int. J. Comput. Math., 2011

A Family of p-ary Binomial Bent Functions.
IEICE Transactions, 2011

New methods for generating permutation polynomials over finite fields.
Finite Fields and Their Applications, 2011

Boolean functions with two distinct Walsh coefficients.
Appl. Algebra Eng. Commun. Comput., 2011

Aperiodic correlation of Kasami sequences in the small set.
Appl. Algebra Eng. Commun. Comput., 2011

Location Privacy Protection in the Presence of Users' Preferences.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A SPH-based method for interactive fluids simulation on the multi-GPU.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011

Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme.
Proceedings of the Information Security Practice and Experience, 2011

A building extraction method using shadow in high resolution multispectral images.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Bridge extraction based on on constrained Delaunay triangulation for panchromatic image.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Application of RFID Technology at the Entrance Gate of Container Terminals.
Proceedings of the Computational Logistics - Second International Conference, 2011

A New Family of Quadriphase Sequences with Low Correlation.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Cube Cryptanalysis of Hitag2 Stream Cipher.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

A fluoroscopy-based navigation system for fixation of femoral neck fracture.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

A fully automatic 2D ultrasound probe calibration method using a simple phantom.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
The large set of p-ary Kasami sequences.
Int. J. Comput. Math., 2010

Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
IEEE Communications Letters, 2010

Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptology ePrint Archive, 2010

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity.
IACR Cryptology ePrint Archive, 2010

On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields.
IACR Cryptology ePrint Archive, 2010

The weight distribution of a class of p-ary cyclic codes.
Finite Fields and Their Applications, 2010

Two new permutation polynomials with the form (x2k+x+d)s+x over F2n.
Appl. Algebra Eng. Commun. Comput., 2010

Further crosscorrelation properties of sequences with the decimation factor d=(pn+1)/(p+1)-(pn-1)/2.
Appl. Algebra Eng. Commun. Comput., 2010

On the generalized large set of Kasami sequences.
Appl. Algebra Eng. Commun. Comput., 2010

Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences.
IEEE Trans. Information Theory, 2009

New Optimal Quadriphase Sequences With Larger Linear Span.
IEEE Trans. Information Theory, 2009

Period-different m-sequences with at most four-valued cross correlation.
IEEE Trans. Information Theory, 2009

A Family of p-ary Binomial Bent Functions.
IACR Cryptology ePrint Archive, 2009

Some results on skew Hadamard difference sets.
Des. Codes Cryptogr., 2009

Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009

Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A fluoroscopic-based navigation system for ACL reconstruction assisted by robot.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

A Novel Approach for Blood Vessel Edge Detection in Retinal Images.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Algebraic Attack to SMS4 and the Comparison with AES.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distrib. Syst., 2008

On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties.
IEICE Transactions, 2008

Binary Constant Weight Codes Based on Cyclic Difference Sets.
IEICE Transactions, 2008

New Family of Binary Sequences with Low Correlation.
IEICE Transactions, 2008

Authentication codes and bipartite graphs.
Eur. J. Comb., 2008

New family of binary sequences of period 4(2 n - 1) with low correlation.
Appl. Algebra Eng. Commun. Comput., 2008

A Class of Nonbinary Codes and Sequence Families.
Proceedings of the Sequences and Their Applications, 2008

Dynamic Analysis and Design Pattern Detection in Java Programs.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Square Attack on Reduced-Round Zodiac Cipher.
Proceedings of the Information Security Practice and Experience, 2008

Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Human reappearance detection based on on-line learning.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Embedded Control System of Digital Operating Table.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

People re-detection using Adaboost with sift and color correlogram.
Proceedings of the International Conference on Image Processing, 2008

2007
Generalized Kasami Sequences: The Large Set.
IEEE Trans. Information Theory, 2007

On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Information Theory, 2007

Using an efficient hash chain and delaying function to improve an e-lottery scheme.
Int. J. Comput. Math., 2007

On The Inequivalence Of Ness-Helleseth APN Functions.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of Two New Instances of TTM Cryptosystem.
IACR Cryptology ePrint Archive, 2007

Kipnis-Shamir's Attack on HFE Revisited.
IACR Cryptology ePrint Archive, 2007

Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity.
IACR Cryptology ePrint Archive, 2007

A New Family of Gold-Like Sequences.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

A 5-DOF table-mounted surgical robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2007

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

New Optimal Quadriphase Sequences with Larger Lnear Span.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

New Description of SMS4 by an Embedding overGF(28).
Proceedings of the Progress in Cryptology, 2007

Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Kipnis-Shamir Attack on HFE Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Analysis of the SMS4 Block Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Expansion and linear complexity of the coordinate sequences over Galois rings.
J. Complexity, 2006

A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span.
IEICE Transactions, 2006

Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptology ePrint Archive, 2006

Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

A New Family of Codes and Generalized Kasami Sequences.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

An Internet Robot Assistant Tele-neurosurgery System Case.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006

Binary Sequences with Optimal Correlations and Large Linear Span.
Proceedings of IEEE International Conference on Communications, 2006

Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006

Fair E-cash Payment Model on Credit Overdraft.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Breaking a New Instance of TTM Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol., 2005

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.
IEICE Transactions, 2005

Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.
IEICE Transactions, 2005

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Sig. Proc., 2005

A Novel Method for Constructing Almost Perfect Polyphase Sequences.
Proceedings of the Coding and Cryptography, International Workshop, 2005

A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Provide Privacy for Mobile P2P Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discrete Mathematics, 2004

BPOR: a fluoroscopy-based robot navigating system for distal locking of intramedullary nails.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

2003
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials.
IACR Cryptology ePrint Archive, 2003

2001
A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001

1998
Properties of Gröbner Bases and Applications to Doubly Periodic Arrays.
J. Symb. Comput., 1998

Performance Oriented Design Using HL.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
A Performance Prototyping Approach to Designing Concurrent Software Architectures.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1997


  Loading...