Shuwang Lü

According to our database1, Shuwang Lü authored at least 38 papers between 2001 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio.
IACR Cryptol. ePrint Arch., 2021

A New Rational Approach to the Square Root of 5.
CoRR, 2021

A New Lever Function with Adequate Indeterminacy.
CoRR, 2021

2019
Design of a Program Identification System for Preventing Malicious Codes.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2017
A Fast Asymmetric Cryptosystem Using Extra Superincreasing Sequences.
CoRR, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

2016
A provably secure non-iterative hash function resisting birthday attack.
Theor. Comput. Sci., 2016

A semantically secure public key cryptoscheme using bit-pair shadows.
Theor. Comput. Sci., 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

2015
Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015

A New Non-Merkle-Damgård Structural Hash Function with Provable Security.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

2014
A 128-bit Block Cipher Based on Three Group Arithmetics.
IACR Cryptol. ePrint Arch., 2014

A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
CoRR, 2014

A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes.
CoRR, 2014

2013
A Public Key Cryptoscheme Using the Bit-pair Method.
IACR Cryptol. ePrint Arch., 2013

A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack.
IACR Cryptol. ePrint Arch., 2013

A Lever Function to a New Codomain with Adequate Indeterminacy.
IACR Cryptol. ePrint Arch., 2013

Multi-user Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Public Key Timed-Release Searchable Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
A public key cryptosystem based on three new provable problems.
Theor. Comput. Sci., 2012

2011
Asymptotic granularity reduction and its application.
Theor. Comput. Sci., 2011

Asymptotic Granularity Reduction and Its Application
CoRR, 2011

2009
REESSE1+ . Reward . Proof by Experiment
CoRR, 2009

Research on Model of Trust Degrees for PKI.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Full Service Hopping for Proactive Cyber-Defense.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Construction and Counting Orthomorphism Based on Transversal.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem
CoRR, 2007

Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
CoRR, 2007

Port and Address Hopping for Active Cyber-Defense.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

To Solve the High Degree Congruence.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Analysis of the SMS4 Block Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
The REESSE1+ Public Key Cryptosystem v2.2.
IACR Cryptol. ePrint Arch., 2006

An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Characterization of compactly supported refinable splines whose shifts form a Riesz basis.
J. Approx. Theory, 2005

2003
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
A new asymmetric fingerprinting framework based on secret sharing.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...