2005 |
12 | EE | Jiqiang Lv,
Yongfei Han:
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards.
ACISP 2005: 195-206 |
2003 |
11 | | Jianying Zhou,
Moti Yung,
Yongfei Han:
Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings
Springer 2003 |
1999 |
10 | | Yongfei Han,
Peng-Chor Leong,
Peng-Chong Tan,
Jiang Zhang:
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field.
ASIACRYPT 1999: 75-85 |
1998 |
9 | EE | Xun Yi,
Kwok-Yan Lam,
Yongfei Han:
Differential Cryptanalysis of a Block Cipher.
ACISP 1998: 58-67 |
1997 |
8 | | Yongfei Han,
Tatsuaki Okamoto,
Sihan Qing:
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings
Springer 1997 |
7 | | Feng Bao,
Robert H. Deng,
Yongfei Han,
Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
ACISP 1997: 261-270 |
6 | EE | Robert H. Deng,
Yongfei Han,
Albert B. Jeng,
Teow-Hin Ngair:
A New On-Line Cash Check Scheme.
ACM Conference on Computer and Communications Security 1997: 111-116 |
5 | | Feng Bao,
Robert H. Deng,
Yongfei Han,
Albert B. Jeng,
A. Desai Narasimhalu,
Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Security Protocols Workshop 1997: 115-124 |
1996 |
4 | | Yongfei Han:
Investigation of non-repudiation protocols.
ACISP 1996: 38-47 |
3 | | Dieter Gollmann,
Yongfei Han,
Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation.
Des. Codes Cryptography 7(1-2): 135-151 (1996) |
2 | EE | Yongfei Han,
David J. Evans:
On Systolic Algorithms and Neural Nets for Inference.
Parallel Algorithms Appl. 8(2): 169-175 (1996) |
1995 |
1 | | Yongfei Han,
Dieter Gollmann,
Chris J. Mitchell:
Minimal Weight k-SR Representations.
IMA Conf. 1995: 34-43 |