The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lei Hu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
    Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:210-225 [Conf]
  2. Li Lu, Lei Hu
    Pairing-Based Multi-Recipient Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:159-165 [Conf]
  3. Lei Hu, Ian Gorton
    Performance Oriented Design Using HL. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:167-176 [Conf]
  4. Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil
    A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:143-152 [Conf]
  5. Jinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu
    Provide Privacy for Mobile P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:829-834 [Conf]
  6. Weijia Wang, Lei Hu
    Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:118-132 [Conf]
  7. Tianmiao Wang, Da Liu, Lei Hu, Hongbo Lv, Zingang Wang, Zesheng Tang
    A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality. [Citation Graph (0, 0)][DBLP]
    MIAR, 2001, pp:103-0 [Conf]
  8. Honggang Hu, Lei Hu, Dengguo Feng
    On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:199-208 [Conf]
  9. Lei Hu, Xiangyong Zeng
    Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:402-416 [Conf]
  10. Xiangyong Zeng, Lei Hu, Qingchong Liu
    A Novel Method for Constructing Almost Perfect Polyphase Sequences. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:346-353 [Conf]
  11. Lei Hu, Dingyi Pei
    Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2004, v:278, n:1-3, pp:139-149 [Journal]
  12. Xiangyong Zeng, Lei Hu
    Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:59-66 [Journal]
  13. Xiangyong Zeng, Lei Hu
    Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:305-310 [Journal]
  14. Nigang Sun, Lei Hu
    Expansion and linear complexity of the coordinate sequences over Galois rings. [Citation Graph (0, 0)][DBLP]
    J. Complexity, 2006, v:22, n:3, pp:382-395 [Journal]
  15. Lei Hu, Jun-Wu Dong, Dingyi Pei
    Implementation of Cryptosystems Based on Tate Pairing. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2005, v:20, n:2, pp:264-269 [Journal]
  16. Mulan Liu, Lei Hu
    Properties of Gröbner Bases and Applications to Doubly Periodic Arrays. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1998, v:26, n:3, pp:301-314 [Journal]
  17. Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann
    Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:158-170 [Conf]
  18. Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
    Cryptanalysis of the TRMC-4 Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:104-115 [Conf]
  19. Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni
    Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]
  20. Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
    High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:233-248 [Conf]

  21. Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP]


  22. Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. [Citation Graph (, )][DBLP]


  23. Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  24. People re-detection using Adaboost with sift and color correlogram. [Citation Graph (, )][DBLP]


  25. Human reappearance detection based on on-line learning. [Citation Graph (, )][DBLP]


  26. New Description of SMS4 by an Embedding overGF(28). [Citation Graph (, )][DBLP]


  27. Square Attack on Reduced-Round Zodiac Cipher. [Citation Graph (, )][DBLP]


  28. ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. [Citation Graph (, )][DBLP]


  29. SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth. [Citation Graph (, )][DBLP]


  30. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP]


  31. Dynamic Analysis and Design Pattern Detection in Java Programs. [Citation Graph (, )][DBLP]


  32. A Class of Nonbinary Codes and Sequence Families. [Citation Graph (, )][DBLP]


  33. Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. [Citation Graph (, )][DBLP]


  34. A New Family of Gold-Like Sequences. [Citation Graph (, )][DBLP]


  35. Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis. [Citation Graph (, )][DBLP]


  36. A Novel Approach for Blood Vessel Edge Detection in Retinal Images. [Citation Graph (, )][DBLP]


  37. Algebraic Attack to SMS4 and the Comparison with AES. [Citation Graph (, )][DBLP]


  38. Embedded Control System of Digital Operating Table. [Citation Graph (, )][DBLP]


  39. Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. [Citation Graph (, )][DBLP]


  40. An Internet Robot Assistant Tele-neurosurgery System Case. [Citation Graph (, )][DBLP]


  41. A fluoroscopic-based navigation system for ACL reconstruction assisted by robot. [Citation Graph (, )][DBLP]


  42. Fair E-cash Payment Model on Credit Overdraft. [Citation Graph (, )][DBLP]


  43. New family of binary sequences of period 4(2 n - 1) with low correlation. [Citation Graph (, )][DBLP]


  44. A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span [Citation Graph (, )][DBLP]


  45. New Sequence Sets with Zero-Correlation Zone [Citation Graph (, )][DBLP]


  46. Generalized Kasami Sequences: The Large Set [Citation Graph (, )][DBLP]


  47. Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation [Citation Graph (, )][DBLP]


  48. A Class of Nonbinary Codes and Their Weight Distribution [Citation Graph (, )][DBLP]


  49. Weight Distribution of A p-ary Cyclic Code [Citation Graph (, )][DBLP]


  50. On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields [Citation Graph (, )][DBLP]


  51. On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields [Citation Graph (, )][DBLP]


  52. A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions [Citation Graph (, )][DBLP]


  53. Some results on skew Hadamard difference sets. [Citation Graph (, )][DBLP]


  54. Further properties of several classes of Boolean functions with optimum algebraic immunity. [Citation Graph (, )][DBLP]


  55. Authentication codes and bipartite graphs. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002