Search the dblp DataBase
Lei Hu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xuyun Nie , Lei Hu , Jianyu Li , Crystal Updegrove , Jintai Ding Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:210-225 [Conf ] Li Lu , Lei Hu Pairing-Based Multi-Recipient Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:159-165 [Conf ] Lei Hu , Ian Gorton Performance Oriented Design Using HL. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:167-176 [Conf ] Jinsong Han , Yunhao Liu , Li Lu , Lei Hu , Abhishek P. Patil A Random Walk Based Anonymous Peer-to-Peer Protocol Design. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:143-152 [Conf ] Jinsong Han , Yanmin Zhu , Yunhao Liu , Jianfeng Cai , Lei Hu Provide Privacy for Mobile P2P Systems. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:829-834 [Conf ] Weijia Wang , Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:118-132 [Conf ] Tianmiao Wang , Da Liu , Lei Hu , Hongbo Lv , Zingang Wang , Zesheng Tang A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality. [Citation Graph (0, 0)][DBLP ] MIAR, 2001, pp:103-0 [Conf ] Honggang Hu , Lei Hu , Dengguo Feng On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:199-208 [Conf ] Lei Hu , Xiangyong Zeng Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:402-416 [Conf ] Xiangyong Zeng , Lei Hu , Qingchong Liu A Novel Method for Constructing Almost Perfect Polyphase Sequences. [Citation Graph (0, 0)][DBLP ] WCC, 2005, pp:346-353 [Conf ] Lei Hu , Dingyi Pei Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2004, v:278, n:1-3, pp:139-149 [Journal ] Xiangyong Zeng , Lei Hu Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:59-66 [Journal ] Xiangyong Zeng , Lei Hu Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:305-310 [Journal ] Nigang Sun , Lei Hu Expansion and linear complexity of the coordinate sequences over Galois rings. [Citation Graph (0, 0)][DBLP ] J. Complexity, 2006, v:22, n:3, pp:382-395 [Journal ] Lei Hu , Jun-Wu Dong , Dingyi Pei Implementation of Cryptosystems Based on Tate Pairing. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2005, v:20, n:2, pp:264-269 [Journal ] Mulan Liu , Lei Hu Properties of Gröbner Bases and Applications to Doubly Periodic Arrays. [Citation Graph (0, 0)][DBLP ] J. Symb. Comput., 1998, v:26, n:3, pp:301-314 [Journal ] Fen Liu , Wen Ji , Lei Hu , Jintai Ding , Shuwang Lv , Andrei Pyshkin , Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:158-170 [Conf ] Xuyun Nie , Lei Hu , Jintai Ding , Jianyu Li , John Wagner Cryptanalysis of the TRMC-4 Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:104-115 [Conf ] Li Lu , Jinsong Han , Lei Hu , Jinpeng Huai , Yunhao Liu , Lionel M. Ni Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1-10 [Conf ] Jintai Ding , Lei Hu , Xuyun Nie , Jianyu Li , John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:233-248 [Conf ] Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP ] Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. [Citation Graph (, )][DBLP ] Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP ] People re-detection using Adaboost with sift and color correlogram. [Citation Graph (, )][DBLP ] Human reappearance detection based on on-line learning. [Citation Graph (, )][DBLP ] New Description of SMS4 by an Embedding overGF(28 ). [Citation Graph (, )][DBLP ] Square Attack on Reduced-Round Zodiac Cipher. [Citation Graph (, )][DBLP ] ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience. [Citation Graph (, )][DBLP ] SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth. [Citation Graph (, )][DBLP ] Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP ] Dynamic Analysis and Design Pattern Detection in Java Programs. [Citation Graph (, )][DBLP ] A Class of Nonbinary Codes and Sequence Families. [Citation Graph (, )][DBLP ] Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. [Citation Graph (, )][DBLP ] A New Family of Gold-Like Sequences. [Citation Graph (, )][DBLP ] Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis. [Citation Graph (, )][DBLP ] A Novel Approach for Blood Vessel Edge Detection in Retinal Images. [Citation Graph (, )][DBLP ] Algebraic Attack to SMS4 and the Comparison with AES. [Citation Graph (, )][DBLP ] Embedded Control System of Digital Operating Table. [Citation Graph (, )][DBLP ] Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. [Citation Graph (, )][DBLP ] An Internet Robot Assistant Tele-neurosurgery System Case. [Citation Graph (, )][DBLP ] A fluoroscopic-based navigation system for ACL reconstruction assisted by robot. [Citation Graph (, )][DBLP ] Fair E-cash Payment Model on Credit Overdraft. [Citation Graph (, )][DBLP ] New family of binary sequences of period 4(2 n - 1) with low correlation. [Citation Graph (, )][DBLP ] A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span [Citation Graph (, )][DBLP ] New Sequence Sets with Zero-Correlation Zone [Citation Graph (, )][DBLP ] Generalized Kasami Sequences: The Large Set [Citation Graph (, )][DBLP ] Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation [Citation Graph (, )][DBLP ] A Class of Nonbinary Codes and Their Weight Distribution [Citation Graph (, )][DBLP ] Weight Distribution of A p-ary Cyclic Code [Citation Graph (, )][DBLP ] On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields [Citation Graph (, )][DBLP ] On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields [Citation Graph (, )][DBLP ] A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions [Citation Graph (, )][DBLP ] Some results on skew Hadamard difference sets. [Citation Graph (, )][DBLP ] Further properties of several classes of Boolean functions with optimum algebraic immunity. [Citation Graph (, )][DBLP ] Authentication codes and bipartite graphs. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.305secs