2009 | ||
---|---|---|
86 | EE | Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su: Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 |
85 | EE | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 |
84 | EE | Xianggen Wang, Dengguo Feng, Purui Su: Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82 |
2008 | ||
83 | EE | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238 |
82 | EE | Hao Hu, Dengguo Feng: BIFI: Architectural Support for Information Flow Integrity Measurement. CSSE (3) 2008: 605-609 |
81 | EE | Limin Fan, Yongbin Zhou, Dengguo Feng: A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211 |
80 | EE | Xiaofeng Chen, Dengguo Feng: A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313 |
79 | EE | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu: Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ISPEC 2008: 248-262 |
78 | EE | Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu: Security of Truncated MACs. Inscrypt 2008: 96-114 |
77 | EE | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences. IEEE Transactions on Information Theory 54(2): 874-883 (2008) |
76 | EE | Xiaofeng Chen, Dengguo Feng: Direct Anonymous Attestation for Next Generation TPM. JCP 3(12): 43-50 (2008) |
2007 | ||
75 | EE | Gang Yao, Dengguo Feng, Xiaoxi Han: Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ARES 2007: 564-574 |
74 | EE | Rui Xue, Dengguo Feng: Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253 |
73 | EE | Hua Chen, Wenling Wu, Dengguo Feng: Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295 |
72 | EE | Wentao Zhang, Wenling Wu, Dengguo Feng: New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 |
71 | EE | Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng: Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 |
70 | EE | Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng: SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37 |
69 | EE | Dengguo Feng, Chuankun Wu: Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Frontiers of Computer Science in China 1(4): 385-396 (2007) |
68 | EE | Honggang Hu, Lei Hu, Dengguo Feng: On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) |
67 | EE | Honggang Hu, Dengguo Feng: On Quadratic Bent Functions in Polynomial Forms. IEEE Transactions on Information Theory 53(7): 2610-2615 (2007) |
66 | EE | Wenling Wu, Wentao Zhang, Dengguo Feng: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) |
65 | EE | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng: Constructing parallel long-message signcryption scheme from trapdoor permutation. Science in China Series F: Information Sciences 50(1): 82-98 (2007) |
64 | EE | ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang: Survey of information security. Science in China Series F: Information Sciences 50(3): 273-298 (2007) |
63 | EE | Dengguo Feng, Weidong Chen: Modular approach to the design and analysis of password-based security protocols. Science in China Series F: Information Sciences 50(3): 381-398 (2007) |
2006 | ||
62 | EE | Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 |
61 | EE | Fan Zhang, Dengguo Feng: Identity-based PKI Scheme for Machine Readable Travel Document. AINA (2) 2006: 461-465 |
60 | Dongyao Ji, Dengguo Feng: Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330 | |
59 | Dongyao Ji, Dengguo Feng: Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85 | |
58 | EE | Gang Yao, Dengguo Feng: Proxy Oblivious Transfer Protocol. ARES 2006: 190-197 |
57 | EE | Bin Zhang, Dengguo Feng: New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68 |
56 | EE | Purui Su, Dengguo Feng: The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195 |
55 | EE | Peng Wang, Dengguo Feng, Wenling Wu: Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286 |
54 | EE | Honggang Hu, Lei Hu, Dengguo Feng: On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208 |
53 | EE | Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 |
52 | EE | Bin Zhang, Dengguo Feng: Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248 |
51 | EE | Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng: On Non-binary Quantum BCH Codes. TAMC 2006: 675-683 |
50 | EE | Honggang Hu, Dengguo Feng, Wenling Wu: Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) |
49 | EE | Hong Wang, Gang Qiu, Dengguo Feng, Guo-Zhen Xiao: Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Transactions 89-A(3): 822-825 (2006) |
48 | EE | Dengguo Feng, Xiaoyun Wang: Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) |
47 | EE | Zhongwei Sun, Dengguo Feng, Chuankun Wu: DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. Journal of Computer Research and Development 43(11): 1920-1926 (2006) |
46 | EE | Bin Zhang, Dengguo Feng: Security analysis of a new stream cipher. Science in China Series F: Information Sciences 49(3): 286-301 (2006) |
2005 | ||
45 | Dengguo Feng, Dongdai Lin, Moti Yung: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Springer 2005 | |
44 | EE | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119 |
43 | EE | Zhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210 |
42 | EE | Zaiqiang Liu, Dengguo Feng: Incremental Fuzzy Decision Tree-Based Network Forensic System. CIS (2) 2005: 995-1002 |
41 | EE | Peng Wang, Dengguo Feng, Wenling Wu: HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188 |
40 | EE | Dengguo Feng, Ji Xiang: Experiences on Intrusion Tolerance Distributed Systems. COMPSAC (1) 2005: 270-271 |
39 | EE | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 |
38 | EE | Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 |
37 | EE | Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 |
36 | EE | Wenling Wu, Wentao Zhang, Dengguo Feng: Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 |
35 | EE | Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang: Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 |
34 | EE | Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng: A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 |
33 | EE | Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng: Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988 |
32 | EE | Hong Wang, Yuqing Zhang, Dengguo Feng: Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310 |
31 | EE | Peng Wang, Dengguo Feng, Wenling Wu: On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287 |
30 | EE | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367 |
29 | EE | Zhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377 |
28 | EE | Liwu Zhang, Dengguo Feng: Intrusion Tolerant CA Scheme with Cheaters Detection Ability. ISPA Workshops 2005: 378-386 |
27 | EE | Yan Zhu, Dengguo Feng, Wei Zou: Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83 |
26 | Yuqing Zhang, Xiuying Liu, Dengguo Feng: An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 | |
25 | EE | Zhenfeng Zhang, Dengguo Feng: Cryptanalysis of some signature schemes with message recovery. Applied Mathematics and Computation 170(1): 103-114 (2005) |
24 | EE | Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) |
2004 | ||
23 | EE | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 |
22 | EE | Xin Lü, Dengguo Feng: An Arbitrated Quantum Message Signature Scheme. CIS 2004: 1054-1060 |
21 | EE | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 |
20 | EE | Hua Chen, Dengguo Feng: An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. ICISC 2004: 352-361 |
19 | EE | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 |
18 | EE | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217 |
17 | EE | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231 |
16 | EE | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. SETA 2004: 185-196 |
15 | EE | Wenling Wu, Dengguo Feng, Hua Chen: Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266 |
14 | EE | Jing Xu, Zhenfeng Zhang, Dengguo Feng: A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169 |
13 | EE | Gang Yao, Dengguo Feng: A New k-Anonymous Message Transmission Protocol. WISA 2004: 388-399 |
12 | EE | Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li: Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) |
11 | EE | Rui Xue, Dengguo Feng: New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004) |
10 | EE | Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li: Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004) |
2003 | ||
9 | EE | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 |
8 | EE | Zhen Xu, Dengguo Feng, Lan Li, Hua Chen: UC-RBAC: A Usage Constrained Role-Based Access Control Model. ICICS 2003: 337-347 |
7 | EE | Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng: Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003) |
2000 | ||
6 | Wenling Wu, Dengguo Feng, Sihan Qing: Power Analysis of RC6 and Serpent. SEC 2000: 201-209 | |
5 | Wang Mingsheng, Sihan Qing, Dengguo Feng: A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 | |
4 | Shaoquan Jiang, Dengguo Feng, Sihan Qing: Analysis and Design of E-voting Protocol. SEC 2000: 281-290 | |
3 | Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng: The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 | |
1999 | ||
2 | Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing: Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21 | |
1 | EE | Dengguo Feng: Three Characterizations of Correlation-immune Functions over Rings ZN. Theor. Comput. Sci. 226(1-2): 37-43 (1999) |