The SCEAS System
| |||||||

## Search the dblp DataBase
Lei Hu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
**Breaking a New Instance of TTM Cryptosystems.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:210-225 [Conf] - Li Lu, Lei Hu
**Pairing-Based Multi-Recipient Public Key Encryption.**[Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:159-165 [Conf] - Lei Hu, Ian Gorton
**Performance Oriented Design Using HL.**[Citation Graph (0, 0)][DBLP] HICSS (3), 1998, pp:167-176 [Conf] - Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil
**A Random Walk Based Anonymous Peer-to-Peer Protocol Design.**[Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:143-152 [Conf] - Jinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu
**Provide Privacy for Mobile P2P Systems.**[Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2005, pp:829-834 [Conf] - Weijia Wang, Lei Hu
**Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:118-132 [Conf] - Tianmiao Wang, Da Liu, Lei Hu, Hongbo Lv, Zingang Wang, Zesheng Tang
**A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.**[Citation Graph (0, 0)][DBLP] MIAR, 2001, pp:103-0 [Conf] - Honggang Hu, Lei Hu, Dengguo Feng
**On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:199-208 [Conf] - Lei Hu, Xiangyong Zeng
**Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:402-416 [Conf] - Xiangyong Zeng, Lei Hu, Qingchong Liu
**A Novel Method for Constructing Almost Perfect Polyphase Sequences.**[Citation Graph (0, 0)][DBLP] WCC, 2005, pp:346-353 [Conf] - Lei Hu, Dingyi Pei
**Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2004, v:278, n:1-3, pp:139-149 [Journal] - Xiangyong Zeng, Lei Hu
**Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:59-66 [Journal] - Xiangyong Zeng, Lei Hu
**Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:305-310 [Journal] - Nigang Sun, Lei Hu
**Expansion and linear complexity of the coordinate sequences over Galois rings.**[Citation Graph (0, 0)][DBLP] J. Complexity, 2006, v:22, n:3, pp:382-395 [Journal] - Lei Hu, Jun-Wu Dong, Dingyi Pei
**Implementation of Cryptosystems Based on Tate Pairing.**[Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2005, v:20, n:2, pp:264-269 [Journal] - Mulan Liu, Lei Hu
**Properties of Gröbner Bases and Applications to Doubly Periodic Arrays.**[Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1998, v:26, n:3, pp:301-314 [Journal] - Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann
**Analysis of the SMS4 Block Cipher.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:158-170 [Conf] - Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
**Cryptanalysis of the TRMC-4 Public Key Cryptosystem.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:104-115 [Conf] - Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni
**Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.**[Citation Graph (0, 0)][DBLP] IPDPS, 2007, pp:1-10 [Conf] - Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
**High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:233-248 [Conf] **Kipnis-Shamir Attack on HFE Revisited.**[Citation Graph (, )][DBLP]**Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.**[Citation Graph (, )][DBLP]**Further Discussions on the Security of a Nominative Signature Scheme.**[Citation Graph (, )][DBLP]**People re-detection using Adaboost with sift and color correlogram.**[Citation Graph (, )][DBLP]**Human reappearance detection based on on-line learning.**[Citation Graph (, )][DBLP]**New Description of SMS4 by an Embedding overGF(2**[Citation Graph (, )][DBLP]^{8}).**Square Attack on Reduced-Round Zodiac Cipher.**[Citation Graph (, )][DBLP]**ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience.**[Citation Graph (, )][DBLP]**SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth.**[Citation Graph (, )][DBLP]**Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.**[Citation Graph (, )][DBLP]**Dynamic Analysis and Design Pattern Detection in Java Programs.**[Citation Graph (, )][DBLP]**A Class of Nonbinary Codes and Sequence Families.**[Citation Graph (, )][DBLP]**Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.**[Citation Graph (, )][DBLP]**A New Family of Gold-Like Sequences.**[Citation Graph (, )][DBLP]**Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis.**[Citation Graph (, )][DBLP]**A Novel Approach for Blood Vessel Edge Detection in Retinal Images.**[Citation Graph (, )][DBLP]**Algebraic Attack to SMS4 and the Comparison with AES.**[Citation Graph (, )][DBLP]**Embedded Control System of Digital Operating Table.**[Citation Graph (, )][DBLP]**Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.**[Citation Graph (, )][DBLP]**An Internet Robot Assistant Tele-neurosurgery System Case.**[Citation Graph (, )][DBLP]**A fluoroscopic-based navigation system for ACL reconstruction assisted by robot.**[Citation Graph (, )][DBLP]**Fair E-cash Payment Model on Credit Overdraft.**[Citation Graph (, )][DBLP]**New family of binary sequences of period 4(2**[Citation Graph (, )][DBLP]^{ n }- 1) with low correlation.**A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span**[Citation Graph (, )][DBLP]**New Sequence Sets with Zero-Correlation Zone**[Citation Graph (, )][DBLP]**Generalized Kasami Sequences: The Large Set**[Citation Graph (, )][DBLP]**Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation**[Citation Graph (, )][DBLP]**A Class of Nonbinary Codes and Their Weight Distribution**[Citation Graph (, )][DBLP]**Weight Distribution of A p-ary Cyclic Code**[Citation Graph (, )][DBLP]**On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields**[Citation Graph (, )][DBLP]**On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields**[Citation Graph (, )][DBLP]**A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions**[Citation Graph (, )][DBLP]**Some results on skew Hadamard difference sets.**[Citation Graph (, )][DBLP]**Further properties of several classes of Boolean functions with optimum algebraic immunity.**[Citation Graph (, )][DBLP]**Authentication codes and bipartite graphs.**[Citation Graph (, )][DBLP]
Search in 0.262secs, Finished in 0.265secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |