dblp.uni-trier.dewww.uni-trier.de

Dengguo Feng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
86EEWentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su: Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335
85EEPeng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344
84EEXianggen Wang, Dengguo Feng, Purui Su: Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82
2008
83EEPeng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238
82EEHao Hu, Dengguo Feng: BIFI: Architectural Support for Information Flow Integrity Measurement. CSSE (3) 2008: 605-609
81EELimin Fan, Yongbin Zhou, Dengguo Feng: A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211
80EEXiaofeng Chen, Dengguo Feng: A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313
79EEXingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu: Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ISPEC 2008: 248-262
78EEPeng Wang, Dengguo Feng, Changlu Lin, Wenling Wu: Security of Truncated MACs. Inscrypt 2008: 96-114
77EEHonggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences. IEEE Transactions on Information Theory 54(2): 874-883 (2008)
76EEXiaofeng Chen, Dengguo Feng: Direct Anonymous Attestation for Next Generation TPM. JCP 3(12): 43-50 (2008)
2007
75EEGang Yao, Dengguo Feng, Xiaoxi Han: Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ARES 2007: 564-574
74EERui Xue, Dengguo Feng: Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253
73EEHua Chen, Wenling Wu, Dengguo Feng: Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295
72EEWentao Zhang, Wenling Wu, Dengguo Feng: New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250
71EEWentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng: Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85
70EEKai Chen, Purui Su, Yingjun Zhang, Dengguo Feng: SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37
69EEDengguo Feng, Chuankun Wu: Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Frontiers of Computer Science in China 1(4): 385-396 (2007)
68EEHonggang Hu, Lei Hu, Dengguo Feng: On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Transactions on Information Theory 53(7): 2598-2605 (2007)
67EEHonggang Hu, Dengguo Feng: On Quadratic Bent Functions in Polynomial Forms. IEEE Transactions on Information Theory 53(7): 2610-2615 (2007)
66EEWenling Wu, Wentao Zhang, Dengguo Feng: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007)
65EEZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng: Constructing parallel long-message signcryption scheme from trapdoor permutation. Science in China Series F: Information Sciences 50(1): 82-98 (2007)
64EEChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang: Survey of information security. Science in China Series F: Information Sciences 50(3): 273-298 (2007)
63EEDengguo Feng, Weidong Chen: Modular approach to the design and analysis of password-based security protocols. Science in China Series F: Information Sciences 50(3): 381-398 (2007)
2006
62EEZhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308
61EEFan Zhang, Dengguo Feng: Identity-based PKI Scheme for Machine Readable Travel Document. AINA (2) 2006: 461-465
60 Dongyao Ji, Dengguo Feng: Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330
59 Dongyao Ji, Dengguo Feng: Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85
58EEGang Yao, Dengguo Feng: Proxy Oblivious Transfer Protocol. ARES 2006: 190-197
57EEBin Zhang, Dengguo Feng: New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68
56EEPurui Su, Dengguo Feng: The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195
55EEPeng Wang, Dengguo Feng, Wenling Wu: Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286
54EEHonggang Hu, Lei Hu, Dengguo Feng: On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208
53EEWentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27
52EEBin Zhang, Dengguo Feng: Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248
51EEZhi Ma, Xin Lu, Keqin Feng, Dengguo Feng: On Non-binary Quantum BCH Codes. TAMC 2006: 675-683
50EEHonggang Hu, Dengguo Feng, Wenling Wu: Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. IEEE Transactions on Information Theory 52(5): 2260-2265 (2006)
49EEHong Wang, Gang Qiu, Dengguo Feng, Guo-Zhen Xiao: Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Transactions 89-A(3): 822-825 (2006)
48EEDengguo Feng, Xiaoyun Wang: Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006)
47EEZhongwei Sun, Dengguo Feng, Chuankun Wu: DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. Journal of Computer Research and Development 43(11): 1920-1926 (2006)
46EEBin Zhang, Dengguo Feng: Security analysis of a new stream cipher. Science in China Series F: Information Sciences 49(3): 286-301 (2006)
2005
45 Dengguo Feng, Dongdai Lin, Moti Yung: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Springer 2005
44EEJing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119
43EEZhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210
42EEZaiqiang Liu, Dengguo Feng: Incremental Fuzzy Decision Tree-Based Network Forensic System. CIS (2) 2005: 995-1002
41EEPeng Wang, Dengguo Feng, Wenling Wu: HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188
40EEDengguo Feng, Ji Xiang: Experiences on Intrusion Tolerance Distributed Systems. COMPSAC (1) 2005: 270-271
39EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86
38EEXiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18
37EEZhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26
36EEWenling Wu, Wentao Zhang, Dengguo Feng: Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241
35EEBin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang: Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283
34EEHaipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng: A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971
33EEPurui Su, Dequan Li, Haipeng Qu, Dengguo Feng: Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988
32EEHong Wang, Yuqing Zhang, Dengguo Feng: Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310
31EEPeng Wang, Dengguo Feng, Wenling Wu: On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287
30EEJing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367
29EEZhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377
28EELiwu Zhang, Dengguo Feng: Intrusion Tolerant CA Scheme with Cheaters Detection Ability. ISPA Workshops 2005: 378-386
27EEYan Zhu, Dengguo Feng, Wei Zou: Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83
26 Yuqing Zhang, Xiuying Liu, Dengguo Feng: An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169
25EEZhenfeng Zhang, Dengguo Feng: Cryptanalysis of some signature schemes with message recovery. Applied Mathematics and Computation 170(1): 103-114 (2005)
24EEYunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005)
2004
23EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309
22EEXin Lü, Dengguo Feng: An Arbitrated Quantum Message Signature Scheme. CIS 2004: 1054-1060
21EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400
20EEHua Chen, Dengguo Feng: An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. ICISC 2004: 352-361
19EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83
18EEXianfeng Zhao, Yingxia Dai, Dengguo Feng: A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217
17EEXianfeng Zhao, Yingxia Dai, Dengguo Feng: Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231
16EEHonggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. SETA 2004: 185-196
15EEWenling Wu, Dengguo Feng, Hua Chen: Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266
14EEJing Xu, Zhenfeng Zhang, Dengguo Feng: A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169
13EEGang Yao, Dengguo Feng: A New k-Anonymous Message Transmission Protocol. WISA 2004: 388-399
12EEHong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li: Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004)
11EERui Xue, Dengguo Feng: New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004)
10EEHong-Da Li, Xiong Yang, Dengguo Feng, Bao Li: Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004)
2003
9EEGang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356
8EEZhen Xu, Dengguo Feng, Lan Li, Hua Chen: UC-RBAC: A Usage Constrained Role-Based Access Control Model. ICICS 2003: 337-347
7EEQingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng: Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003)
2000
6 Wenling Wu, Dengguo Feng, Sihan Qing: Power Analysis of RC6 and Serpent. SEC 2000: 201-209
5 Wang Mingsheng, Sihan Qing, Dengguo Feng: A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220
4 Shaoquan Jiang, Dengguo Feng, Sihan Qing: Analysis and Design of E-voting Protocol. SEC 2000: 281-290
3 Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng: The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78
1999
2 Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing: Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21
1EEDengguo Feng: Three Characterizations of Correlation-immune Functions over Rings ZN. Theor. Comput. Sci. 226(1-2): 37-43 (1999)

Coauthor Index

1Feng Bao [9] [19] [21] [23] [39]
2ZhenFu Cao [64]
3Hua Chen [8] [15] [20] [73]
4Hui Chen [38]
5Kai Chen [70]
6Weidong Chen [63]
7Weifeng Chen [3]
8Xiaofeng Chen [76] [80]
9Yingxia Dai [17] [18]
10Robert H. Deng (Robert Huijie Deng) [9] [24]
11Limin Fan [81]
12Keqin Feng [51]
13Xiaoxi Han [75]
14Hao Hu [82]
15Honggang Hu [16] [50] [54] [67] [68] [77] [79]
16Lei Hu [54] [68]
17ZhenYu Hu [65]
18JiWu Huang [64]
19Dongyao Ji [12] [59] [60]
20Qingguang Ji [7]
21Jianchun Jiang [3]
22Shaoquan Jiang [4]
23Xuejia Lai [38]
24Bao Li [2] [10] [12]
25Dequan Li [33]
26Hong-Da Li [10] [12]
27Lan Li [8]
28Changlu Lin [78]
29Dongdai Lin [34] [45] [65]
30Xiuying Liu [26]
31Zaiqiang Liu [42]
32Xin Lü [22]
33Xin Lu [51]
34Zhi Ma [51]
35Wang Mingsheng [5]
36Jesper Buus Nielsen [24]
37Sihan Qing [2] [3] [4] [5] [6] [7]
38Gang Qiu [49]
39Haipeng Qu [33] [34]
40Kui Ren [9]
41ChangXiang Shen [64]
42Bozhan Su [86]
43Purui Su [33] [34] [56] [70] [84]
44Zhongwei Sun [47]
45Hong Wang [32] [35] [49]
46Peng Wang [31] [41] [55] [78] [83] [85]
47Xianggen Wang [84]
48Xiaoyun Wang [38] [48]
49Xingang Wang [79]
50Duncan S. Wong [62]
51Chuankun Wu [47] [69]
52Hongjun Wu [19] [21] [23] [35] [39]
53Wenling Wu [2] [6] [15] [31] [36] [41] [50] [53] [55] [65] [66] [71] [72] [73] [78] [83] [85] [86]
54Ji Xiang [40]
55Guo-Zhen Xiao [49]
56Jing Xu [14] [30] [37] [43] [44] [62]
57Zhen Xu [8] [79]
58Rui Xue [11] [74]
59Xiong Yang [10]
60Gang Yao [9] [13] [58] [75]
61Xiuyuan Yu [38]
62Moti Yung (Mordechai M. Yung) [45]
63Bin Zhang [19] [21] [23] [35] [39] [46] [52] [57]
64Fan Zhang [61]
65HuangGuo Zhang [64]
66Lei Zhang [53] [71]
67Liting Zhang [83] [85]
68Liwu Zhang [28]
69Wentao Zhang [36] [53] [66] [71] [72] [86]
70Yingjun Zhang [70]
71Yuqing Zhang [26] [32]
72Zhenfeng Zhang [14] [25] [29] [30] [37] [43] [44] [62]
73Xianfeng Zhao [17] [18]
74Yunlei Zhao [24]
75Yongbin Zhou [7] [37] [81]
76Yan Zhu [27]
77Wei Zou [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)