default search action
Dengguo Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Dan Zhu, Dengguo Feng, Xuemin (Sherman) Shen:
Privacy-Preserving Techniques with e-Healthcare Applications. Wireless Networks, Springer 2024, ISBN 978-3-031-76921-4, pp. 1-172 - [j90]Hao Li, Shuyu Cao, Yaqing Chen, Min Zhang, Dengguo Feng:
TULAM: trajectory-user linking via attention mechanism. Sci. China Inf. Sci. 67(1) (2024) - [j89]Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. IET Commun. 18(9): 535-556 (2024) - [j88]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Dengguo Feng, Xuemin Shen:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 21(2): 860-875 (2024) - [j87]Wei Xu, Hui Zhu, Yandong Zheng, Fengwei Wang, Jiafeng Hua, Dengguo Feng, Hui Li:
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE. IEEE Trans. Inf. Forensics Secur. 19: 7335-7348 (2024) - [j86]Axin Wu, Dengguo Feng, Min Zhang, Anjia Yang, Jialin Chi:
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks. IEEE Trans. Mob. Comput. 23(12): 11080-11090 (2024) - [c204]Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang:
SeqMIA: Sequential-Metric Based Membership Inference Attack. CCS 2024: 3496-3510 - [c203]Zhaojun Lu, Weizong Yu, Peng Xu, Wei Wang, Jiliang Zhang, Dengguo Feng:
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE. DAC 2024: 158:1-158:6 - [i60]Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang:
SeqMIA: Sequential-Metric Based Membership Inference Attack. CoRR abs/2407.15098 (2024) - [i59]Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. IACR Cryptol. ePrint Arch. 2024: 1008 (2024) - [i58]Binwu Xiang, Jiang Zhang, Kaixing Wang, Yi Deng, Dengguo Feng:
NTRU-based Bootstrapping for MK-FHEs without using Overstretched Parameters. IACR Cryptol. ePrint Arch. 2024: 1898 (2024) - 2023
- [j85]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
New method for combining Matsui's bounding conditions with sequential encoding method. Des. Codes Cryptogr. 91(11): 3603-3642 (2023) - [j84]Dan Zhu, Hui Zhu, Xiangyu Wang, Rongxing Lu, Dengguo Feng:
Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data. IEEE Trans. Cloud Comput. 11(2): 1286-1302 (2023) - [j83]Haining Yang, Dengguo Feng, Jing Qin:
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment. IEEE Trans. Dependable Secur. Comput. 20(5): 3873-3889 (2023) - [j82]Yu Fu, Jingqiang Lin, Dengguo Feng, Wei Wang, Mingyu Wang, Wenjie Wang:
RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure. ACM Trans. Embed. Comput. Syst. 22(6): 97:1-97:22 (2023) - [j81]Dan Zhu, Hui Zhu, Xiangyu Wang, Rongxing Lu, Dengguo Feng:
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images. IEEE Trans. Serv. Comput. 16(2): 913-926 (2023) - [c202]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption Using Vector Decoding. ASIACRYPT (7) 2023: 157-189 - [c201]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. CRYPTO (4) 2023: 3-36 - [i57]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Ting Cui, Tairong Shi, Kai Zhang:
New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 316 (2023) - [i56]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - [i55]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption using Vector Decoding. IACR Cryptol. ePrint Arch. 2023: 1298 (2023) - [i54]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. IACR Cryptol. ePrint Arch. 2023: 1564 (2023) - 2022
- [j80]Dengguo Feng:
Introduction to the special issue dedicated to Cunsheng Ding on the occasion of his 60th birthday. Adv. Math. Commun. 16(4): 667-670 (2022) - [j79]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V. Des. Codes Cryptogr. 90(10): 2449-2479 (2022) - [j78]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu:
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Netw. Comput. Appl. 198: 103281 (2022) - [j77]Dengguo Feng, Kang Yang:
Concretely efficient secure multi-party computation protocols: survey and more. Secur. Saf. 1: 2021001 (2022) - [j76]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Trans. Symmetric Cryptol. 2022(2): 322-350 (2022) - [j75]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on Full-round FRIET. IACR Trans. Symmetric Cryptol. 2022(4): 105-119 (2022) - [c200]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Xuemin Shen, Dengguo Feng:
Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation. GLOBECOM 2022: 3041-3046 - [i53]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi, Kai Zhang:
The Simplest SAT Model of Combining Matsui's Bounding Conditions with Sequential Encoding Method. IACR Cryptol. ePrint Arch. 2022: 626 (2022) - [i52]Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on the Full-round FRIET. IACR Cryptol. ePrint Arch. 2022: 1121 (2022) - 2021
- [j74]Jingyi Feng, Hua Chen, Weiqiong Cao, Limin Fan, Wei Xi, Dengguo Feng:
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure. Sci. China Inf. Sci. 64(5) (2021) - [c199]Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du:
FAN: A Lightweight Authenticated Cryptographic Algorithm. CT-RSA 2021: 299-325 - [c198]Yutong Ye, Min Zhang, Dengguo Feng:
Collecting Spatial Data Under Local Differential Privacy. MSN 2021: 120-127 - [c197]Zhangtan Li, Liang Cheng, Yang Zhang, Dengguo Feng:
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System. WASA (2) 2021: 123-134 - [i51]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Cryptol. ePrint Arch. 2021: 1435 (2021) - [i50]Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Efficient and Extensive Search Linear Approximations with High for Precise Correlations of Full SNOW-V. IACR Cryptol. ePrint Arch. 2021: 1607 (2021) - 2020
- [j73]Lin Jiao, Yonglin Hao, Dengguo Feng:
Stream cipher designs: a review. Sci. China Inf. Sci. 63(3) (2020) - [j72]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li:
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet Things J. 7(4): 2791-2805 (2020) - [j71]Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li, Dengguo Feng:
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN. Inf. Sci. 514: 244-262 (2020) - [j70]Mimi Ma, Debiao He, Shuqin Fan, Dengguo Feng:
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. J. Inf. Secur. Appl. 50 (2020) - [j69]Mimi Ma, Shuqin Fan, Dengguo Feng:
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J. Inf. Secur. Appl. 55: 102652 (2020) - [j68]Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. Secur. Commun. Networks 2020: 8957641:1-8957641:14 (2020) - [j67]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Shiyang He:
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Trans. Veh. Technol. 69(2): 2126-2140 (2020) - [j66]Mimi Ma, Min Luo, Shuqin Fan, Dengguo Feng:
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT. Wirel. Commun. Mob. Comput. 2020: 8850520:1-8850520:11 (2020) - [c196]Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. TrustCom 2020: 30-37 - [c195]Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. TrustCom 2020: 434-441 - [c194]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [i49]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. IACR Cryptol. ePrint Arch. 2020: 1391 (2020)
2010 – 2019
- 2019
- [j65]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j64]Meihui Chen, Hua Chen, Limin Fan, Shaofeng Zhu, Wei Xi, Dengguo Feng:
A new discrete Fourier transform randomness test. Sci. China Inf. Sci. 62(3): 32107:1-32107:16 (2019) - [c193]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. CCS 2019: 1723-1740 - [c192]Jingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo:
Log-Based Control Flow Attestation for Embedded Devices. CSS (1) 2019: 117-132 - [c191]Yutong Ye, Min Zhang, Dengguo Feng, Hao Li, Jialin Chi:
Multiple Privacy Regimes Mechanism for Local Differential Privacy. DASFAA (2) 2019: 247-263 - [c190]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. RAID 2019: 105-120 - [c189]Shaofeng Zhu, Hua Chen, Wei Xi, Meihui Chen, Limin Fan, Dengguo Feng:
A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs. TrustCom/BigDataSE 2019: 152-159 - [i48]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. IACR Cryptol. ePrint Arch. 2019: 1101 (2019) - 2018
- [j63]Wei Feng, Yu Qin, Shijun Zhao, Dengguo Feng:
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Networks 134: 167-182 (2018) - [j62]Jianxiong Shao, Yu Qin, Dengguo Feng:
Formal analysis of HMAC authorisation in the TPM2.0 specification. IET Inf. Secur. 12(2): 133-140 (2018) - [j61]Bin Zhang, Chao Xu, Dengguo Feng:
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking. J. Cryptol. 31(2): 394-433 (2018) - [j60]Wei Feng, Yu Qin, Dengguo Feng:
Using mobile phones to enhance computing platform trust. Telecommun. Syst. 69(2): 187-205 (2018) - [c188]Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng:
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs. CARDIS 2018: 125-139 - [i47]Shaofeng Zhu, Hua Chen, Limin Fan, Meihui Chen, Wei Xi, Dengguo Feng:
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs. IACR Cryptol. ePrint Arch. 2018: 961 (2018) - 2017
- [c187]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices Based on PUFs. CANS 2017: 325-346 - [c186]Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. Inscrypt 2017: 196-208 - [c185]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c184]Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System. ICICS 2017: 3-16 - [c183]Liang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng:
Automatically assessing crashes from heap overflows. ASE 2017: 274-279 - [c182]Yingjun Zhang, Yu Qin, Dengguo Feng, Bo Yang, Weijin Wang:
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators. SecureComm 2017: 585-605 - [c181]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
How Well Can WordNet Measure Privacy: A Comparative Study? SKG 2017: 45-49 - [c180]Xiangkun Jia, Chao Zhang, Purui Su, Yi Yang, Huafeng Huang, Dengguo Feng:
Towards Efficient Heap Overflow Discovery. USENIX Security Symposium 2017: 989-1006 - [i46]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices based on PUFs. IACR Cryptol. ePrint Arch. 2017: 991 (2017) - [i45]Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng:
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version). IACR Cryptol. ePrint Arch. 2017: 1106 (2017) - 2016
- [b1]Chuan Kun Wu, Dengguo Feng:
Boolean Functions and Their Applications in Cryptography. Advances in Computer Science and Technology, Springer 2016, ISBN 978-3-662-48863-8, pp. 1-256 - [j59]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [j58]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards optimal leakage exploitation rate in template attacks. Secur. Commun. Networks 9(16): 3116-3126 (2016) - [j57]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Theoretical and practical aspects of multiple samples correlation power analysis. Secur. Commun. Networks 9(18): 5166-5177 (2016) - [c179]Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:
Attacks and Defence on Android Free Floating Windows. AsiaCCS 2016: 759-770 - [c178]Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng:
Automated Security Proof of Cryptographic Support Commands in TPM 2.0. ICICS 2016: 431-441 - [c177]Jingyi Feng, Hua Chen, Si Gao, Limin Fan, Dengguo Feng:
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round. ICISC 2016: 317-332 - [c176]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146 - [c175]Jianxiong Shao, Yu Qin, Dengguo Feng:
Computational Soundness Results for Stateful Applied π Calculus. POST 2016: 254-275 - [c174]Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu:
Multiple Handshakes Security of TLS 1.3 Candidates. IEEE Symposium on Security and Privacy 2016: 486-505 - [c173]Cheng Hong, Yifu Li, Min Zhang, Dengguo Feng:
Fast Multi-keywords Search over Encrypted Cloud Data. WISE (1) 2016: 433-446 - [i44]Jianxiong Shao, Yu Qin, Dengguo Feng:
Computational Soundness Results for Stateful Applied pi Calculus. CoRR abs/1601.00363 (2016) - [i43]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). IACR Cryptol. ePrint Arch. 2016: 494 (2016) - 2015
- [j56]Zhenqing Shi, Bin Zhang, Dengguo Feng:
Practical-time related-key attack on Hummingbird-2. IET Inf. Secur. 9(6): 321-327 (2015) - [j55]XiaoBo Chu, Dengguo Feng:
On the provable security of TPM2.0 cryptography APIs. Int. J. Embed. Syst. 7(3/4): 230-243 (2015) - [j54]Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. Secur. Commun. Networks 8(3): 383-395 (2015) - [j53]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. Secur. Commun. Networks 8(5): 769-777 (2015) - [j52]Bingbing Xia, Xianfeng Zhao, Dengguo Feng, Mingsheng Wang:
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter. Trans. Data Hiding Multim. Secur. 10: 1-20 (2015) - [c172]Minghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. ACSAC 2015: 331-340 - [c171]Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang:
Formal Analysis of Enhanced Authorization in the TPM 2.0. AsiaCCS 2015: 273-284 - [c170]Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. ICICS 2015: 152-168 - [c169]Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen:
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences. ICICS 2015: 478-484 - [c168]Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:
Operating System Security Policy Hardening via Capability Dependency Graphs. ISPEC 2015: 3-17 - [c167]Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:
A Rapid and Scalable Method for Android Application Repackaging Detection. ISPEC 2015: 349-364 - [c166]Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. ISPEC 2015: 469-484 - [c165]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - [c164]Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng:
Improving Accuracy of Static Integer Overflow Detection in Binary. RAID 2015: 247-269 - [c163]Nafei Zhu, Min Zhang, Dengguo Feng, Jingsha He:
Access Control for Privacy Protection for Dynamic and Correlated Databases. SmartCity 2015: 775-779 - [c162]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - [c161]Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng:
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone. TrustCom/BigDataSE/ISPA (1) 2015: 41-48 - [i42]Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. IACR Cryptol. ePrint Arch. 2015: 22 (2015) - [i41]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. IACR Cryptol. ePrint Arch. 2015: 654 (2015) - 2014
- [j51]Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - [j50]HongDa Li, Dengguo Feng:
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP. Sci. China Inf. Sci. 57(1): 1-14 (2014) - [j49]Liang Cheng, Yang Zhang, Zhihui Han, Yi Deng, Xiaoshan Sun, Dengguo Feng:
Evaluating and comparing the quality of access control in different operating systems. Comput. Secur. 47: 26-40 (2014) - [j48]Fanbao Liu, Yi Liu, Tao Xie, Dengguo Feng, Yumeng Feng:
Fast password recovery attack: application to APOP. J. Intell. Manuf. 25(2): 251-261 (2014) - [c160]Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu:
ExBLACR: Extending BLACR System. ACISP 2014: 397-412 - [c159]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. TrustED@CCS 2014: 25-36 - [c158]Zhiquan Lv, Min Zhang, Dengguo Feng:
Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage. CloudCom 2014: 366-373 - [c157]Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng:
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. ICICS 2014: 31-48 - [c156]Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu:
A Clustering Approach for Privacy-Preserving in Social Networks. ICISC 2014: 193-204 - [c155]Chao Xu, Bin Zhang, Dengguo Feng:
Linear Cryptanalysis of FASER128/256 and TriviA-ck. INDOCRYPT 2014: 237-254 - [c154]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks More Effectively? INTRUST 2014: 168-183 - [c153]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Template Attacks Based on Priori Knowledge. INTRUST 2014: 346-363 - [c152]Weijin Wang, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. ISPEC 2014: 144-158 - [c151]Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng:
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication. ISC 2014: 33-53 - [c150]Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng:
Expressive and Secure Searchable Encryption in the Public Key Setting. ISC 2014: 364-376 - [c149]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. NSS 2014: 110-123 - [c148]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. NSS 2014: 124-137 - [c147]Li Xi, Dengguo Feng:
Formal Analysis of DAA-Related APIs in TPM 2.0. NSS 2014: 421-434 - [c146]Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang:
Direct Anonymous Attestation in practice: Implementation and efficient revocation. PST 2014: 67-74 - [c145]Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng:
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware. SecureComm (1) 2014: 343-361 - [c144]Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng:
DAA-Related APIs in TPM 2.0 Revisited. TRUST 2014: 1-18 - [c143]Bo Yang, Dengguo Feng, Yu Qin:
A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform. TrustCom 2014: 9-17 - [c142]Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng:
Automated User Profiling in Location-Based Mobile Messaging Applications. TrustCom 2014: 18-26 - [c141]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng:
Long Term Tracking and Characterization of P2P Botnet. TrustCom 2014: 244-251 - [c140]Zhiquan Lv, Jialin Chi, Min Zhang, Dengguo Feng:
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System. TrustCom 2014: 292-299 - [c139]Jialin Chi, Zhiquan Lv, Min Zhang, Hao Li, Cheng Hong, Dengguo Feng:
A Novel Privacy-Preserving Group Matching Scheme in Social Networks. WAIM 2014: 336-347 - [c138]Li Xi, Dengguo Feng:
FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs. WPES 2014: 139-148 - [i40]Weijin Wang, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version). IACR Cryptol. ePrint Arch. 2014: 120 (2014) - [i39]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attacks? IACR Cryptol. ePrint Arch. 2014: 332 (2014) - [i38]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using SRAM PUFs. IACR Cryptol. ePrint Arch. 2014: 464 (2014) - [i37]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable secure TNC protocol based on IF-T binding to TLS. IACR Cryptol. ePrint Arch. 2014: 490 (2014) - [i36]Guangjun Fan, Yongbin Zhou, Dengguo Feng:
Template Attacks Based On Priori Knowledge. IACR Cryptol. ePrint Arch. 2014: 583 (2014) - [i35]Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng:
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version). IACR Cryptol. ePrint Arch. 2014: 614 (2014) - [i34]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
How to Choose Interesting Points for Template Attack More Effectively? IACR Cryptol. ePrint Arch. 2014: 864 (2014) - 2013
- [j47]Meijiao Duan, Jing Xu, Dengguo Feng:
Efficient identity-based strong designated verifier signature schemes. Secur. Commun. Networks 6(7): 902-911 (2013) - [c137]Zhenqing Shi, Bin Zhang, Dengguo Feng:
Cryptanalysis of Helix and Phelix Revisited. ACISP 2013: 27-40 - [c136]Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng:
Bind your phone number with caution: automated user profiling through address book matching on smartphone. AsiaCCS 2013: 335-340 - [c135]Xinxin Gong, Bin Zhang, Dengguo Feng, Tongjiang Yan:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. Inscrypt 2013: 86-98 - [c134]Ke Cai, Cheng Hong, Min Zhang, Dengguo Feng, Zhiquan Lv:
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack. CloudCom (1) 2013: 339-346 - [c133]Bin Zhang, Chao Xu, Dengguo Feng:
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract). CRYPTO (1) 2013: 165-182 - [c132]Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang:
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. CT-RSA 2013: 50-67 - [c131]Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin:
Near Collision Attack on the Grain v1 Stream Cipher. FSE 2013: 518-538 - [c130]Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang:
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks. ICICS 2013: 59-74 - [c129]Jianxiong Shao, Dengguo Feng, Yu Qin:
Type-Based Analysis of Protected Storage in the TPM. ICICS 2013: 135-150 - [c128]Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang:
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. ISPEC 2013: 44-59 - [c127]Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang:
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. NSS 2013: 307-320 - [c126]Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang:
On the Security of an Efficient Attribute-Based Signature. NSS 2013: 381-392 - [c125]Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng:
Measuring and Comparing the Protection Quality in Different Operating Systems. NSS 2013: 642-648 - [c124]Jun Jiang, Meining Nie, Purui Su, Dengguo Feng:
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. SecureComm 2013: 122-139 - [c123]Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - [c122]Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang:
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. TRUST 2013: 133-141 - [e3]Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3 [contents] - [i33]Tao Xie, Fanbao Liu, Dengguo Feng:
Fast Collision Attack on MD5. IACR Cryptol. ePrint Arch. 2013: 170 (2013) - [i32]Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng:
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption. IACR Cryptol. ePrint Arch. 2013: 213 (2013) - [i31]Jianxiong Shao, Dengguo Feng, Yu Qin:
Type-Based Analysis of Protected Storage in the TPM (full version). IACR Cryptol. ePrint Arch. 2013: 501 (2013) - [i30]Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards Leakage Exploitation Optimality in Profiled Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2013: 608 (2013) - [i29]Guangjun Fan, Yongbin Zhou, Chengyu Hu, Dengguo Feng:
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function. IACR Cryptol. ePrint Arch. 2013: 802 (2013) - 2012
- [j46]Kai Chen, Dengguo Feng, Purui Su, Yingjun Zhang:
Black-box testing based on colorful taint analysis. Sci. China Inf. Sci. 55(1): 171-183 (2012) - [j45]Hongda Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-optimal zero-knowledge proofs of knowledge for NP. Sci. China Inf. Sci. 55(11): 2473-2484 (2012) - [j44]Dengguo Feng, Xiubin Fan, Liping Ding, Zhang-yi Wang:
On the nonexistence of nontrivial small cycles of the µ function in 3x+1 conjecture. J. Syst. Sci. Complex. 25(6): 1215-1222 (2012) - [j43]Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng:
Understanding and analyzing network traffic. IEEE Netw. 26(1): 4-5 (2012) - [j42]Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng:
On the security of PPPoE network. Secur. Commun. Networks 5(10): 1159-1168 (2012) - [j41]Yun Cao, Xianfeng Zhao, Dengguo Feng:
Video Steganalysis Exploiting Motion Vector Reversion-Based Features. IEEE Signal Process. Lett. 19(1): 35-38 (2012) - [c121]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. ACNS 2012: 117-134 - [c120]Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu:
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. CANS 2012: 12-22 - [c119]Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng:
A secure and efficient revocation scheme for fine-grained access control in cloud storage. CloudCom 2012: 545-550 - [c118]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - [c117]Qiang Li, Dengguo Feng, Liwu Zhang:
An attribute based encryption scheme with fine-grained attribute revocation. GLOBECOM 2012: 885-890 - [c116]Yan Zhang, Dengguo Feng:
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography. ICICS 2012: 408-415 - [c115]Zhenqing Shi, Bin Zhang, Dengguo Feng, Wenling Wu:
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. ICISC 2012: 337-351 - [c114]Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng:
Combined Public-Key Schemes: The Case of ABE and ABS. ProvSec 2012: 53-69 - [c113]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure Doubly-Spatial Encryption under Simple Assumptions. ProvSec 2012: 253-263 - [c112]Dexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng:
TSD: A Flexible Root of Trust for the Cloud. TrustCom 2012: 119-126 - [i28]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - 2011
- [j40]Bin Zhang, Dengguo Feng:
Improved multi-pass fast correlation attacks with applications. Sci. China Inf. Sci. 54(8): 1635-1644 (2011) - [j39]Jing Xu, Wen Tao Zhu, Dengguo Feng:
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3): 319-325 (2011) - [j38]Xiutao Feng, Zhenqing Shi, Chuankun Wu, Dengguo Feng:
On Guess and Determine Analysis of Rabbit. Int. J. Found. Comput. Sci. 22(6): 1283-1296 (2011) - [j37]Dengguo Feng, Jing Xu, Weidong Chen:
Generic Constructions for Strong Designated Verifier Signature. J. Inf. Process. Syst. 7(1): 159-172 (2011) - [j36]Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng:
Network traffic monitoring, analysis and anomaly detection [Guest Editorial]. IEEE Netw. 25(3): 6-7 (2011) - [j35]Changli Ma, Liwei Zeng, Yang Liu, Dengguo Feng, Cunsheng Ding:
The Weight Enumerator of a Class of Cyclic Codes. IEEE Trans. Inf. Theory 57(1): 397-402 (2011) - [c111]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ASIACRYPT 2011: 390-406 - [c110]Jing Xu, Dengguo Feng:
Comments on the SM2 Key Exchange Protocol. CANS 2011: 160-171 - [c109]Pengpian Wang, Dengguo Feng, Liwu Zhang:
Towards Attribute Revocation in Key-Policy Attribute Based Encryption. CANS 2011: 272-291 - [c108]Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. Inscrypt 2011: 113-130 - [c107]Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng:
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3. Inscrypt 2011: 160-178 - [c106]Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu:
Loiss: A Byte-Oriented Stream Cipher. IWCC 2011: 109-125 - [c105]Hao Lei, Dengguo Feng:
Selective Disclosure on Encrypted Documents. DBSec 2011: 255-262 - [c104]Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu:
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. ICICS 2011: 360-373 - [c103]Hailong Zhang, Yongbin Zhou, Dengguo Feng:
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. ICISC 2011: 61-73 - [c102]Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng:
Video Steganography with Perturbed Motion Estimation. Information Hiding 2011: 193-207 - [c101]Yu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng:
DAA Protocol Analysis and Verification. INTRUST 2011: 338-350 - [c100]Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng:
How to Characterize Side-Channel Leakages More Accurately? ISPEC 2011: 196-207 - [c99]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. ProvSec 2011: 84-101 - [c98]Jing Xu, Wen Tao Zhu, Dengguo Feng:
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. SECRYPT 2011: 269-274 - [c97]Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng:
A DRTM-Based Method for Trusted Network Connection. TrustCom 2011: 425-435 - [c96]Cheng Hong, Zhiquan Lv, Min Zhang, Dengguo Feng:
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage. WAIM 2011: 264-276 - [i27]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. IACR Cryptol. ePrint Arch. 2011: 408 (2011) - [i26]Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng:
On the Security of NMAC and Its Variants. IACR Cryptol. ePrint Arch. 2011: 649 (2011) - [i25]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions. IACR Cryptol. ePrint Arch. 2011: 692 (2011) - [i24]Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng:
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. IACR Cryptol. ePrint Arch. 2011: 694 (2011) - 2010
- [j34]Dengguo Feng, Weidong Chen:
Security model and modular design of fair authentication key exchange protocols. Sci. China Inf. Sci. 53(2): 278-287 (2010) - [j33]Dengguo Feng, Yu Qin:
A property-based attestation protocol for TCM. Sci. China Inf. Sci. 53(3): 454-464 (2010) - [j32]HongDa Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. Sci. China Inf. Sci. 53(4): 788-799 (2010) - [j31]Xianfeng Zhao, Dengguo Feng:
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round. IET Inf. Secur. 4(3): 167-184 (2010) - [j30]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. Int. J. Appl. Cryptogr. 2(1): 60-67 (2010) - [j29]Shuang Wu, Dengguo Feng, Wenling Wu:
New Disturbance Vector for SHA-0 Collision. J. Inf. Sci. Eng. 26(6): 2143-2157 (2010) - [c95]Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, Dengguo Feng:
A Byte-Based Guess and Determine Attack on SOSEMANUK. ASIACRYPT 2010: 146-157 - [c94]Shuang Wu, Dengguo Feng, Wenling Wu, Bozhan Su:
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Inscrypt 2010: 155-168 - [c93]Yi Yang, Lingyun Ying, Rui Wang, Purui Su, Dengguo Feng:
DepSim: A Dependency-Based Malware Similarity Comparison System. Inscrypt 2010: 503-522 - [c92]Jia Xu, Jia Yan, Liang He, Purui Su, Dengguo Feng:
CloudSEC: A Cloud Architecture for Composing Collaborative Security Services. CloudCom 2010: 703-711 - [c91]Jing Zhao, Dengguo Feng, Zhenfeng Zhang:
Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. GLOBECOM 2010: 1-6 - [c90]Bin Wu, Dengguo Feng, Meijiao Duan:
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. ISPEC 2010: 251-263 - [c89]Aimin Yu, Dengguo Feng:
Real-Time Remote Attestation with Privacy Protection. TrustBus 2010: 81-92 - [c88]Min Zhang, Ke Cai, Dengguo Feng:
Fine-Grained Cloud DB Damage Examination Based on Bloom Filters. WAIM 2010: 157-168 - [e2]Dengguo Feng, David A. Basin, Peng Liu:
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. ACM 2010, ISBN 978-1-60558-936-7 [contents] - [i23]Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu:
Loiss: A Byte-Oriented Stream Cipher. IACR Cryptol. ePrint Arch. 2010: 489 (2010) - [i22]Tao Xie, Dengguo Feng:
Construct MD5 Collisions Using Just A Single Block Of Message. IACR Cryptol. ePrint Arch. 2010: 643 (2010)
2000 – 2009
- 2009
- [j28]Jing Xu, Wen Tao Zhu, Dengguo Feng:
An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4): 723-728 (2009) - [j27]Honggang Hu, Guang Gong, Dengguo Feng:
New results on periodic sequences with large k-error linear complexity. IEEE Trans. Inf. Theory 55(10): 4687-4694 (2009) - [c87]Zhigang Gao, Dengguo Feng:
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network. Inscrypt 2009: 134-143 - [c86]Dengguo Feng, Jing Xu:
A New Client-to-Client Password-Authenticated Key Agreement Protocol. IWCC 2009: 63-76 - [c85]Aimin Yu, Dengguo Feng, Ren Liu:
TBDRM: A TPM-Based Secure DRM Architecture. CSE (2) 2009: 671-677 - [c84]Yu Qin, Dengguo Feng, Zhen Xu:
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. CSE (2) 2009: 732-738 - [c83]Hao Hu, Hao Li, Dengguo Feng:
L-UCON: Towards Layered Access Control with UCON. CSE (2) 2009: 823-829 - [c82]Yi Deng, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng:
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. CSR 2009: 80-91 - [c81]Yan Zhang, Zhengde Zhai, Dengguo Feng:
Bring Efficient Connotation Expressible Policies to Trust Management. ICICS 2009: 396-410 - [c80]Shuang Wu, Dengguo Feng, Wenling Wu:
Practical Rebound Attack on 12-Round Cheetah-256. ICISC 2009: 300-314 - [c79]Xianggen Wang, Dengguo Feng, Purui Su:
Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82 - [c78]Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 - [c77]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 - [c76]Yun Cao, Xianfeng Zhao, Dengguo Feng:
Entropy codec based on evolutionary MHT and its application in video encryption. MM&Sec 2009: 155-160 - [c75]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the LANE Hash Function. Selected Areas in Cryptography 2009: 126-140 - [c74]Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu:
ReconBin: Reconstructing Binary File from Execution for Software Analysis. SSIRI 2009: 222-229 - [i21]Tao Xie, Dengguo Feng:
How To Find Weak Input Differences For MD5 Collision Attacks. IACR Cryptol. ePrint Arch. 2009: 223 (2009) - 2008
- [j26]Xiaofeng Chen, Dengguo Feng:
Direct Anonymous Attestation for Next Generation TPM. J. Comput. 3(12): 43-50 (2008) - [j25]Honggang Hu, Dengguo Feng:
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences. IEEE Trans. Inf. Theory 54(2): 874-883 (2008) - [c73]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238 - [c72]Purui Su, Lingyun Ying, Dengguo Feng:
Exploring Malware Behaviors Based on Environment Constitution. CIS (1) 2008: 320-325 - [c71]Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. Inscrypt 2008: 96-114 - [c70]Hao Hu, Dengguo Feng:
BIFI: Architectural Support for Information Flow Integrity Measurement. CSSE (3) 2008: 605-609 - [c69]Limin Fan, Yongbin Zhou, Dengguo Feng:
A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211 - [c68]Xiaofeng Chen, Dengguo Feng:
A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313 - [c67]Honggang Hu, Guang Gong, Dengguo Feng:
New results on periodic sequences with large k-error linear complexity. ISIT 2008: 2409-2413 - [c66]Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu:
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ISPEC 2008: 248-262 - [c65]Bin Zhang, Dengguo Feng:
An Improved Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2008: 214-227 - [c64]Chi Chen, Dengguo Feng, Min Zhang, De-Sheng Zhang, He-qun Xian:
Research on Malicious Transaction Processing Method of Database System. WAIM 2008: 435-440 - [i20]Tao Xie, Dengguo Feng, Fanbao Liu:
A New Collision Differential For MD5 With Its Full Differential Path. IACR Cryptol. ePrint Arch. 2008: 230 (2008) - [i19]Tao Xie, Fanbao Liu, Dengguo Feng:
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? IACR Cryptol. ePrint Arch. 2008: 391 (2008) - [i18]Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of An Approach Against Side-channel attacks. IACR Cryptol. ePrint Arch. 2008: 497 (2008) - [i17]Shuang Wu, Dengguo Feng, Wenling Wu:
Cryptanalysis of the Hash Function LUX-256. IACR Cryptol. ePrint Arch. 2008: 520 (2008) - [i16]HongDa Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP. IACR Cryptol. ePrint Arch. 2008: 524 (2008) - 2007
- [j24]ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation. Sci. China Ser. F Inf. Sci. 50(1): 82-98 (2007) - [j23]Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang:
Survey of information security. Sci. China Ser. F Inf. Sci. 50(3): 273-298 (2007) - [j22]Dengguo Feng, Weidong Chen:
Modular approach to the design and analysis of password-based security protocols. Sci. China Ser. F Inf. Sci. 50(3): 381-398 (2007) - [j21]Dengguo Feng, Chuankun Wu:
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Frontiers Comput. Sci. China 1(4): 385-396 (2007) - [j20]Xiao-Ming Lu, Dengguo Feng:
Security Proof of the Original SOK-IBS Scheme. Int. J. Netw. Secur. 5(2): 176-181 (2007) - [j19]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) - [j18]Honggang Hu, Lei Hu, Dengguo Feng:
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Trans. Inf. Theory 53(7): 2598-2605 (2007) - [j17]Honggang Hu, Dengguo Feng:
On Quadratic Bent Functions in Polynomial Forms. IEEE Trans. Inf. Theory 53(7): 2610-2615 (2007) - [c63]Gang Yao, Dengguo Feng, Xiaoxi Han:
Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ARES 2007: 564-574 - [c62]Hua Chen, Dengguo Feng:
An Effective Genetic Algorithm for Self-Inverse S-Boxes. CIS 2007: 618-622 - [c61]Rui Xue, Dengguo Feng:
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253 - [c60]Hua Chen, Wenling Wu, Dengguo Feng:
Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295 - [c59]Wentao Zhang, Wenling Wu, Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 - [c58]Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 - [c57]Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng:
SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37 - 2006
- [j16]Bin Zhang, Dengguo Feng:
Security analysis of a new stream cipher. Sci. China Ser. F Inf. Sci. 49(3): 286-301 (2006) - [j15]Hong Wang, Gang Qiu, Dengguo Feng, Guo-Zhen Xiao:
Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(3): 822-825 (2006) - [j14]Zhongwei Sun, Dengguo Feng, Chuankun Wu:
DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. J. Comput. Res. Dev. 43(11): 1920-1926 (2006) - [j13]Dengguo Feng, Xiaoyun Wang:
Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) - [j12]Honggang Hu, Dengguo Feng, Wenling Wu:
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z2l. IEEE Trans. Inf. Theory 52(5): 2260-2265 (2006) - [c56]Gang Yao, Dengguo Feng:
Proxy Oblivious Transfer Protocol. ARES 2006: 190-197 - [c55]Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 - [c54]Fan Zhang, Dengguo Feng:
Identity-based PKI Scheme for Machine Readable Travel Document. AINA (2) 2006: 461-465 - [c53]Dongyao Ji, Dengguo Feng:
Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85 - [c52]Dongyao Ji, Dengguo Feng:
Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330 - [c51]Bin Zhang, Dengguo Feng:
New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68 - [c50]Xiao Feng Li, Dengguo Feng:
Composing Administrative Scope of Delegation Policies based on extended XACML. EDOC 2006: 467-470 - [c49]Purui Su, Dengguo Feng:
The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195 - [c48]Peng Wang, Dengguo Feng, Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286 - [c47]Bin Zhang, Dengguo Feng:
A New Variant of the Self-Shrinking Generator. ISIT 2006: 1619-1622 - [c46]Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 - [c45]Bin Zhang, Dengguo Feng:
Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248 - [c44]Honggang Hu, Lei Hu, Dengguo Feng:
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208 - [c43]Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng:
On Non-binary Quantum BCH Codes. TAMC 2006: 675-683 - [i15]Peng Wang, Dengguo Feng, Wenling Wu:
Cryptanalysis of the MEM Mode of Operation. IACR Cryptol. ePrint Arch. 2006: 94 (2006) - [i14]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. IACR Cryptol. ePrint Arch. 2006: 350 (2006) - [i13]Zhenfeng Zhang, Dengguo Feng:
Key Replacement Attack on a Certificateless Signature Scheme. IACR Cryptol. ePrint Arch. 2006: 453 (2006) - 2005
- [j11]Zhenfeng Zhang, Dengguo Feng:
Cryptanalysis of some signature schemes with message recovery. Appl. Math. Comput. 170(1): 103-114 (2005) - [j10]Wenling Wu, Dengguo Feng:
Collision attack on reduced-round Camellia. Sci. China Ser. F Inf. Sci. 48(1): 78-90 (2005) - [j9]Xiaoyun Wang, Dengguo Feng, Xiuyuan Yu:
An attack on hash function HAVAL-128. Sci. China Ser. F Inf. Sci. 48(5): 545-556 (2005) - [j8]Yongbin Zhou, Zhenfeng Zhang, Dengguo Feng:
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication. IEEE Commun. Lett. 9(4): 372-374 (2005) - [c42]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119 - [c41]Zhenfeng Zhang, Jing Xu, Dengguo Feng:
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210 - [c40]Zaiqiang Liu, Dengguo Feng:
Incremental Fuzzy Decision Tree-Based Network Forensic System. CIS (2) 2005: 995-1002 - [c39]Peng Wang, Dengguo Feng, Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188 - [c38]Dengguo Feng, Ji Xiang:
Experiences on Intrusion Tolerance Distributed Systems. COMPSAC (1) 2005: 270-271 - [c37]Yuqing Zhang, Xiuying Liu, Dengguo Feng:
An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 - [c36]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 - [c35]Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 - [c34]Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 - [c33]Wenling Wu, Wentao Zhang, Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 - [c32]Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang:
Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 - [c31]Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng:
A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 - [c30]Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng:
Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988 - [c29]Hong Wang, Yuqing Zhang, Dengguo Feng:
Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310 - [c28]Honggang Hu, Lei Hu, Dengguo Feng:
A new class of binary sequences with low correlation and large linear complexity from function fields. ISIT 2005: 1997-2001 - [c27]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367 - [c26]Zhenfeng Zhang, Dengguo Feng:
Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377 - [c25]Liwu Zhang, Dengguo Feng:
Intrusion Tolerant CA Scheme with Cheaters Detection Ability. ISPA Workshops 2005: 378-386 - [c24]Peng Wang, Dengguo Feng, Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287 - [c23]Rui Xue, Dawn Song, Zhenfeng Zhang, Dengguo Feng:
A Generic Scheme for Zero-Knowledge Sets. IWAP 2005: 249-263 - [c22]Yan Zhu, Dengguo Feng, Wei Zou:
Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83 - [e1]Dengguo Feng, Dongdai Lin, Moti Yung:
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3822, Springer 2005, ISBN 3-540-30855-5 [contents] - [i12]Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng:
Generic yet Practical ZK Arguments from any Public-Coin HVZK. Electron. Colloquium Comput. Complex. TR05 (2005) - [i11]Wenling Wu, Wentao Zhang, Dengguo Feng:
Improved Integral Cryptanalysis of FOX Block Cipher. IACR Cryptol. ePrint Arch. 2005: 292 (2005) - [i10]Yongbin Zhou, Dengguo Feng:
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. IACR Cryptol. ePrint Arch. 2005: 388 (2005) - [i9]Zhenfeng Zhang, Dengguo Feng:
On the Security of a Certificateless Public-Key Encryption. IACR Cryptol. ePrint Arch. 2005: 426 (2005) - 2004
- [j7]Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li:
Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) - [j6]Rui Xue, Dengguo Feng:
New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004) - [j5]Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li:
Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004) - [c21]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 - [c20]Hua Chen, Dengguo Feng:
An effective evolutionary strategy for bijective S-boxes. IEEE Congress on Evolutionary Computation 2004: 2120-2123 - [c19]Xin Lü, Dengguo Feng:
An Arbitrated Quantum Message Signature Scheme. CIS 2004: 1054-1060 - [c18]Zhongwei Sun, Dengguo Feng, Rui Xue:
Optimum Detection of MultiplicativeWatermarks for Digital Images in the DWT Domain. Eurographics Multimedia Workshop 2004: 173-179 - [c17]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 - [c16]Hua Chen, Dengguo Feng:
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. ICISC 2004: 352-361 - [c15]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 - [c14]Xianfeng Zhao, Yingxia Dai, Dengguo Feng:
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217 - [c13]Xianfeng Zhao, Yingxia Dai, Dengguo Feng:
Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231 - [c12]Wenling Wu, Dengguo Feng, Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266 - [c11]Honggang Hu, Dengguo Feng:
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. SETA 2004: 185-196 - [c10]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169 - [c9]Gang Yao, Dengguo Feng:
A New k-Anonymous Message Transmission Protocol. WISA 2004: 388-399 - [i8]Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu:
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. IACR Cryptol. ePrint Arch. 2004: 199 (2004) - [i7]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 206 (2004) - [i6]Honggang Hu, Dengguo Feng:
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z2l. IACR Cryptol. ePrint Arch. 2004: 228 (2004) - [i5]Xin Lü, Zhi Ma, Dengguo Feng:
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes. IACR Cryptol. ePrint Arch. 2004: 229 (2004) - [i4]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
Identity Based Threshold Proxy Signature. IACR Cryptol. ePrint Arch. 2004: 250 (2004) - 2003
- [j4]Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng:
Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003) - [c8]Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 - [c7]Jiwu Jing, Peng Liu, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin:
ARECA: a highly attack resilient certification authority. SSRS@CCS 2003: 53-63 - [c6]Zhen Xu, Dengguo Feng, Lan Li, Hua Chen:
UC-RBAC: A Usage Constrained Role-Based Access Control Model. ICICS 2003: 337-347 - [i3]Wenling Wu, Dengguo Feng:
Collision Attack on Reduced-Round Camellia. IACR Cryptol. ePrint Arch. 2003: 135 (2003) - [i2]Zhenfeng Zhang, Jing Xu, Dengguo Feng:
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 2003: 153 (2003) - [i1]Xin Lü, Dengguo Feng:
Quantum Digital Signature Based on Quantum One-way Functions. IACR Cryptol. ePrint Arch. 2003: 246 (2003) - 2002
- [j3]Wenling Wu, Dengguo Feng:
Linear cryptanalysis of NUSH block cipher. Sci. China Ser. F Inf. Sci. 45(1): 59-67 (2002) - [j2]Zhenfeng Zhang, Dengguo Feng, Zongduo Dai:
Cryptanalysis on AW digital signature scheme based on error-correcting codes. Sci. China Ser. F Inf. Sci. 45(5): 397-400 (2002) - 2000
- [c5]Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng:
The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 - [c4]Wenling Wu, Dengguo Feng, Sihan Qing:
Power Analysis of RC6 and Serpent. SEC 2000: 201-209 - [c3]Mingsheng Wang, Sihan Qing, Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 - [c2]Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol. SEC 2000: 281-290
1990 – 1999
- 1999
- [j1]Dengguo Feng:
Three Characterizations of Correlation-immune Functions over Rings ZN. Theor. Comput. Sci. 226(1-2): 37-43 (1999) - [c1]Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint