2009 |
86 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng,
Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
ISPEC 2009: 324-335 |
85 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks.
ISPEC 2009: 336-344 |
84 | EE | Xianggen Wang,
Dengguo Feng,
Purui Su:
Reconstructing a Packed DLL Binary for Static Analysis.
ISPEC 2009: 71-82 |
2008 |
83 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu,
Liting Zhang:
On the Unprovable Security of 2-Key XCBC.
ACISP 2008: 230-238 |
82 | EE | Hao Hu,
Dengguo Feng:
BIFI: Architectural Support for Information Flow Integrity Measurement.
CSSE (3) 2008: 605-609 |
81 | EE | Limin Fan,
Yongbin Zhou,
Dengguo Feng:
A Fast Implementation of Computing the Transparency Order of S-Boxes.
ICYCS 2008: 206-211 |
80 | EE | Xiaofeng Chen,
Dengguo Feng:
A New Direct Anonymous Attestation Scheme from Bilinear Maps.
ICYCS 2008: 2308-2313 |
79 | EE | Xingang Wang,
Dengguo Feng,
Zhen Xu,
Honggang Hu:
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
ISPEC 2008: 248-262 |
78 | EE | Peng Wang,
Dengguo Feng,
Changlu Lin,
Wenling Wu:
Security of Truncated MACs.
Inscrypt 2008: 96-114 |
77 | EE | Honggang Hu,
Dengguo Feng:
On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.
IEEE Transactions on Information Theory 54(2): 874-883 (2008) |
76 | EE | Xiaofeng Chen,
Dengguo Feng:
Direct Anonymous Attestation for Next Generation TPM.
JCP 3(12): 43-50 (2008) |
2007 |
75 | EE | Gang Yao,
Dengguo Feng,
Xiaoxi Han:
Improved Client-to-Client Password-Authenticated Key Exchange Protocol.
ARES 2007: 564-574 |
74 | EE | Rui Xue,
Dengguo Feng:
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
ICICS 2007: 239-253 |
73 | EE | Hua Chen,
Wenling Wu,
Dengguo Feng:
Differential Fault Analysis on CLEFIA.
ICICS 2007: 284-295 |
72 | EE | Wentao Zhang,
Wenling Wu,
Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES.
ICISC 2007: 239-250 |
71 | EE | Wentao Zhang,
Lei Zhang,
Wenling Wu,
Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192.
INDOCRYPT 2007: 73-85 |
70 | EE | Kai Chen,
Purui Su,
Yingjun Zhang,
Dengguo Feng:
SEPCOM: customizable zero copy model.
VALUETOOLS 2007: 37 |
69 | EE | Dengguo Feng,
Chuankun Wu:
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS.
Frontiers of Computer Science in China 1(4): 385-396 (2007) |
68 | EE | Honggang Hu,
Lei Hu,
Dengguo Feng:
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) |
67 | EE | Honggang Hu,
Dengguo Feng:
On Quadratic Bent Functions in Polynomial Forms.
IEEE Transactions on Information Theory 53(7): 2610-2615 (2007) |
66 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia.
J. Comput. Sci. Technol. 22(3): 449-456 (2007) |
65 | EE | ZhenYu Hu,
Dongdai Lin,
Wenling Wu,
Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation.
Science in China Series F: Information Sciences 50(1): 82-98 (2007) |
64 | EE | ChangXiang Shen,
HuangGuo Zhang,
Dengguo Feng,
ZhenFu Cao,
JiWu Huang:
Survey of information security.
Science in China Series F: Information Sciences 50(3): 273-298 (2007) |
63 | EE | Dengguo Feng,
Weidong Chen:
Modular approach to the design and analysis of password-based security protocols.
Science in China Series F: Information Sciences 50(3): 381-398 (2007) |
2006 |
62 | EE | Zhenfeng Zhang,
Duncan S. Wong,
Jing Xu,
Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction.
ACNS 2006: 293-308 |
61 | EE | Fan Zhang,
Dengguo Feng:
Identity-based PKI Scheme for Machine Readable Travel Document.
AINA (2) 2006: 461-465 |
60 | | Dongyao Ji,
Dengguo Feng:
Efficient Anonymous Electronic Metering Scheme.
AMT 2006: 327-330 |
59 | | Dongyao Ji,
Dengguo Feng:
Fault-tolerate Multiparty Electronic Contract Signing Protocol.
AMT 2006: 79-85 |
58 | EE | Gang Yao,
Dengguo Feng:
Proxy Oblivious Transfer Protocol.
ARES 2006: 190-197 |
57 | EE | Bin Zhang,
Dengguo Feng:
New Guess-and-Determine Attack on the Self-Shrinking Generator.
ASIACRYPT 2006: 54-68 |
56 | EE | Purui Su,
Dengguo Feng:
The Design of an Artificial Immune System.
ICN/ICONS/MCL 2006: 195 |
55 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
INDOCRYPT 2006: 280-286 |
54 | EE | Honggang Hu,
Lei Hu,
Dengguo Feng:
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
SETA 2006: 199-208 |
53 | EE | Wentao Zhang,
Wenling Wu,
Lei Zhang,
Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Selected Areas in Cryptography 2006: 15-27 |
52 | EE | Bin Zhang,
Dengguo Feng:
Multi-pass Fast Correlation Attack on Stream Ciphers.
Selected Areas in Cryptography 2006: 234-248 |
51 | EE | Zhi Ma,
Xin Lu,
Keqin Feng,
Dengguo Feng:
On Non-binary Quantum BCH Codes.
TAMC 2006: 675-683 |
50 | EE | Honggang Hu,
Dengguo Feng,
Wenling Wu:
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/.
IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) |
49 | EE | Hong Wang,
Gang Qiu,
Dengguo Feng,
Guo-Zhen Xiao:
Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes.
IEICE Transactions 89-A(3): 822-825 (2006) |
48 | EE | Dengguo Feng,
Xiaoyun Wang:
Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol. 21(5): 740-755 (2006) |
47 | EE | Zhongwei Sun,
Dengguo Feng,
Chuankun Wu:
DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory.
Journal of Computer Research and Development 43(11): 1920-1926 (2006) |
46 | EE | Bin Zhang,
Dengguo Feng:
Security analysis of a new stream cipher.
Science in China Series F: Information Sciences 49(3): 286-301 (2006) |
2005 |
45 | | Dengguo Feng,
Dongdai Lin,
Moti Yung:
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Springer 2005 |
44 | EE | Jing Xu,
Zhenfeng Zhang,
Dengguo Feng:
ID-Based Aggregate Signatures from Bilinear Pairings.
CANS 2005: 110-119 |
43 | EE | Zhenfeng Zhang,
Jing Xu,
Dengguo Feng:
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
CANS 2005: 200-210 |
42 | EE | Zaiqiang Liu,
Dengguo Feng:
Incremental Fuzzy Decision Tree-Based Network Forensic System.
CIS (2) 2005: 995-1002 |
41 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode.
CISC 2005: 175-188 |
40 | EE | Dengguo Feng,
Ji Xiang:
Experiences on Intrusion Tolerance Distributed Systems.
COMPSAC (1) 2005: 270-271 |
39 | EE | Bin Zhang,
Hongjun Wu,
Dengguo Feng,
Feng Bao:
A Fast Correlation Attack on the Shrinking Generator.
CT-RSA 2005: 72-86 |
38 | EE | Xiaoyun Wang,
Xuejia Lai,
Dengguo Feng,
Hui Chen,
Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
EUROCRYPT 2005: 1-18 |
37 | EE | Zhenfeng Zhang,
Dengguo Feng,
Jing Xu,
Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security.
ICICS 2005: 14-26 |
36 | EE | Wenling Wu,
Wentao Zhang,
Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher.
ICISC 2005: 229-241 |
35 | EE | Bin Zhang,
Hongjun Wu,
Dengguo Feng,
Hong Wang:
Weaknesses of COSvd (2, 128) Stream Cipher.
ICISC 2005: 270-283 |
34 | EE | Haipeng Qu,
Purui Su,
Dongdai Lin,
Dengguo Feng:
A Packet Marking Scheme for IP Traceback.
ICN (2) 2005: 964-971 |
33 | EE | Purui Su,
Dequan Li,
Haipeng Qu,
Dengguo Feng:
Detecting the Deviations of Privileged Process Execution.
ICN (2) 2005: 980-988 |
32 | EE | Hong Wang,
Yuqing Zhang,
Dengguo Feng:
Short Threshold Signature Schemes Without Random Oracles.
INDOCRYPT 2005: 297-310 |
31 | EE | Peng Wang,
Dengguo Feng,
Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE.
ISC 2005: 274-287 |
30 | EE | Jing Xu,
Zhenfeng Zhang,
Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings.
ISPA Workshops 2005: 359-367 |
29 | EE | Zhenfeng Zhang,
Dengguo Feng:
Efficient Fair Certified E-Mail Delivery Based on RSA.
ISPA Workshops 2005: 368-377 |
28 | EE | Liwu Zhang,
Dengguo Feng:
Intrusion Tolerant CA Scheme with Cheaters Detection Ability.
ISPA Workshops 2005: 378-386 |
27 | EE | Yan Zhu,
Dengguo Feng,
Wei Zou:
Collusion Secure Convolutional Spread Spectrum Fingerprinting.
IWDW 2005: 67-83 |
26 | | Yuqing Zhang,
Xiuying Liu,
Dengguo Feng:
An approach to the formal verification of the three-principal security protocols.
Security and Management 2005: 163-169 |
25 | EE | Zhenfeng Zhang,
Dengguo Feng:
Cryptanalysis of some signature schemes with message recovery.
Applied Mathematics and Computation 170(1): 103-114 (2005) |
24 | EE | Yunlei Zhao,
Jesper Buus Nielsen,
Robert H. Deng,
Dengguo Feng:
Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) |
2004 |
23 | EE | Bin Zhang,
Hongjun Wu,
Dengguo Feng,
Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
ACNS 2004: 303-309 |
22 | EE | Xin Lü,
Dengguo Feng:
An Arbitrated Quantum Message Signature Scheme.
CIS 2004: 1054-1060 |
21 | EE | Bin Zhang,
Hongjun Wu,
Dengguo Feng,
Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator.
ICICS 2004: 388-400 |
20 | EE | Hua Chen,
Dengguo Feng:
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
ICISC 2004: 352-361 |
19 | EE | Bin Zhang,
Hongjun Wu,
Dengguo Feng,
Feng Bao:
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.
INDOCRYPT 2004: 73-83 |
18 | EE | Xianfeng Zhao,
Yingxia Dai,
Dengguo Feng:
A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems.
IWDW 2004: 204-217 |
17 | EE | Xianfeng Zhao,
Yingxia Dai,
Dengguo Feng:
Towards the Public but Noninvertible Watermarking.
IWDW 2004: 218-231 |
16 | EE | Honggang Hu,
Dengguo Feng:
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences.
SETA 2004: 185-196 |
15 | EE | Wenling Wu,
Dengguo Feng,
Hua Chen:
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Selected Areas in Cryptography 2004: 252-266 |
14 | EE | Jing Xu,
Zhenfeng Zhang,
Dengguo Feng:
A Ring Signature Scheme Using Bilinear Pairings.
WISA 2004: 160-169 |
13 | EE | Gang Yao,
Dengguo Feng:
A New k-Anonymous Message Transmission Protocol.
WISA 2004: 388-399 |
12 | EE | Hong-Da Li,
Dongyao Ji,
Dengguo Feng,
Bao Li:
Oblivious Polynomial Evaluation.
J. Comput. Sci. Technol. 19(4): 550-554 (2004) |
11 | EE | Rui Xue,
Dengguo Feng:
New Semantic Model for Authentication Protocols in ASMs.
J. Comput. Sci. Technol. 19(4): 555-563 (2004) |
10 | EE | Hong-Da Li,
Xiong Yang,
Dengguo Feng,
Bao Li:
Distributed Oblivious Function Evaluation and Its Applications.
J. Comput. Sci. Technol. 19(6): 942-947 (2004) |
2003 |
9 | EE | Gang Yao,
Kui Ren,
Feng Bao,
Robert H. Deng,
Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
ACNS 2003: 343-356 |
8 | EE | Zhen Xu,
Dengguo Feng,
Lan Li,
Hua Chen:
UC-RBAC: A Usage Constrained Role-Based Access Control Model.
ICICS 2003: 337-347 |
7 | EE | Qingguang Ji,
Sihan Qing,
Yongbin Zhou,
Dengguo Feng:
Study on Strand Space Model Theory.
J. Comput. Sci. Technol. 18(5): 553-570 (2003) |
2000 |
6 | | Wenling Wu,
Dengguo Feng,
Sihan Qing:
Power Analysis of RC6 and Serpent.
SEC 2000: 201-209 |
5 | | Wang Mingsheng,
Sihan Qing,
Dengguo Feng:
A Simple Algorithm for Computing Several Sequences Synthesis.
SEC 2000: 211-220 |
4 | | Shaoquan Jiang,
Dengguo Feng,
Sihan Qing:
Analysis and Design of E-voting Protocol.
SEC 2000: 281-290 |
3 | | Jianchun Jiang,
Weifeng Chen,
Sihan Qing,
Dengguo Feng:
The Defense Framework for Large-scale Computer Network System.
SEC 2000: 69-78 |
1999 |
2 | | Wenling Wu,
Bao Li,
Dengguo Feng,
Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms.
ICICS 1999: 13-21 |
1 | EE | Dengguo Feng:
Three Characterizations of Correlation-immune Functions over Rings ZN.
Theor. Comput. Sci. 226(1-2): 37-43 (1999) |