The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hongjun Wu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu
    Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:190-205 [Conf]
  2. Hongjun Wu
    Cryptanalysis of Stream Cipher Alpha1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:169-175 [Conf]
  3. Hongjun Wu, Feng Bao
    Cryptanalysis of Stream Cipher COS(2, 128) Mode I. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:154-158 [Conf]
  4. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of the m-Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:97-111 [Conf]
  5. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:278-288 [Conf]
  6. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:303-309 [Conf]
  7. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:126-132 [Conf]
  8. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:133-147 [Conf]
  9. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:72-86 [Conf]
  10. Hongjun Wu
    A New Stream Cipher HC-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:226-244 [Conf]
  11. Hongjun Wu, Bart Preneel
    Cryptanalysis of the Stream Cipher DECIM. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:30-40 [Conf]
  12. Hongjun Wu, Bart Preneel
    Resynchronization Attacks on WG and LEX. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:422-432 [Conf]
  13. Hongjun Wu
    Related-Cipher Attacks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:447-455 [Conf]
  14. Hongjun Wu, Feng Bao, Robert H. Deng
    An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:84-87 [Conf]
  15. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:388-400 [Conf]
  16. Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang
    Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:270-283 [Conf]
  17. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:73-83 [Conf]
  18. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  19. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:173-179 [Conf]
  20. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  21. Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel
    MAME: A Compression Function with Reduced Hardware Requirements. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:148-165 [Conf]
  22. Hongjun Wu, Bart Preneel
    Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:276-290 [Conf]
  23. Hongjun Wu, Bart Preneel
    Differential-Linear Attacks Against the Stream Cipher Phelix. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:87-100 [Conf]
  24. Hongjun Wu, Bart Preneel
    Cryptanalysis of the Stream Cipher ABC v2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:56-66 [Conf]

Search in 0.002secs, Finished in 0.154secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002