2009 | ||
---|---|---|
51 | EE | Xiangyong Zeng, Lei Hu, Wenfeng Jiang, Qin Yue, Xiwang Cao: Weight Distribution of A p-ary Cyclic Code CoRR abs/0901.2391: (2009) |
50 | EE | Guobiao Weng, Lei Hu: Some results on skew Hadamard difference sets. Des. Codes Cryptography 50(1): 93-105 (2009) |
49 | EE | Wenfeng Jiang, Lei Hu, Xiaohu Tang, Xiangyong Zeng: New Optimal Quadriphase Sequences With Larger Linear Span. IEEE Transactions on Information Theory 55(1): 458-470 (2009) |
2008 | ||
48 | EE | Lei Hu, Shuqiang Jiang, Qingming Huang, Wen Gao: People re-detection using Adaboost with sift and color correlogram. ICIP 2008: 1348-1351 |
47 | EE | Min Xu, Chuang Yang, Tianmiao Wang, Yan Hu, Lei Hu, Bing Yu: Embedded Control System of Digital Operating Table. ICIRA (1) 2008: 556-565 |
46 | EE | Lei Hu, Yizhou Wang, Shuqiang Jiang, Qingming Huang, Wen Gao: Human reappearance detection based on on-line learning. ICPR 2008: 1-4 |
45 | EE | Wen Ji, Lei Hu: Square Attack on Reduced-Round Zodiac Cipher. ISPEC 2008: 377-391 |
44 | Lei Hu, Kamran Sartipi: Dynamic Analysis and Design Pattern Detection in Java Programs. SEKE 2008: 842-846 | |
43 | EE | Xiangyong Zeng, Nian Li, Lei Hu: A Class of Nonbinary Codes and Sequence Families. SETA 2008: 81-94 |
42 | EE | Wenfeng Jiang, Lei Hu, Xiaohu Tang, Xiangyong Zeng: New family of binary sequences of period 4(2 n - 1) with low correlation. Appl. Algebra Eng. Commun. Comput. 19(5): 429-439 (2008) |
41 | EE | Lei Hu, Xiangyong Zeng, Nian Li, Wenfeng Jiang: Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation CoRR abs/0801.0857: (2008) |
40 | EE | Xiangyong Zeng, Nian Li, Lei Hu: A Class of Nonbinary Codes and Their Weight Distribution CoRR abs/0802.3430: (2008) |
39 | EE | Rongquan Feng, Lei Hu, Jin Ho Kwak: Authentication codes and bipartite graphs. Eur. J. Comb. 29(6): 1473-1482 (2008) |
38 | EE | Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jin-Peng Huai, Lionel M. Ni, Jian Ma: Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps. IEEE Trans. Parallel Distrib. Syst. 19(10): 1325-1337 (2008) |
37 | EE | Wenfeng Jiang, Lei Hu, Xiangyong Zeng: New Family of Binary Sequences with Low Correlation. IEICE Transactions 91-A(1): 417-421 (2008) |
36 | EE | Xiangyong Zeng, John Q. Liu, Lei Hu, Desmond P. Taylor: On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties. IEICE Transactions 91-A(2): 664-672 (2008) |
35 | EE | Nian Li, Xiangyong Zeng, Lei Hu: Binary Constant Weight Codes Based on Cyclic Difference Sets. IEICE Transactions 91-A(5): 1288-1292 (2008) |
2007 | ||
34 | EE | Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann: Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170 |
33 | EE | Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner: Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115 |
32 | EE | Wen Ji, Lei Hu: New Description of SMS4 by an Embedding overGF(28). INDOCRYPT 2007: 238-251 |
31 | EE | Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao Liu, Lionel M. Ni: Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols. IPDPS 2007: 1-10 |
30 | EE | Xin Jiang, Jintai Ding, Lei Hu: Kipnis-Shamir Attack on HFE Revisited. Inscrypt 2007: 399-411 |
29 | EE | Weijia Wang, Lei Hu, Yong Li: Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Inscrypt 2007: 93-107 |
28 | EE | Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni: Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. PerCom 2007: 13-22 |
27 | EE | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248 |
26 | EE | Xiaohu Tang, Tor Helleseth, Lei Hu, Wenfeng Jiang: A New Family of Gold-Like Sequences. SSC 2007: 62-69 |
25 | Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu: Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572 | |
24 | EE | Xiangyong Zeng, John Q. Liu, Lei Hu: Generalized Kasami Sequences: The Large Set. IEEE Transactions on Information Theory 53(7): 2587-2598 (2007) |
23 | EE | Honggang Hu, Lei Hu, Dengguo Feng: On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) |
22 | EE | Yining Liu, Lei Hu, Heguo Liu: Using an efficient hash chain and delaying function to improve an e-lottery scheme. Int. J. Comput. Math. 84(7): 967-970 (2007) |
2006 | ||
21 | EE | Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding: Breaking a New Instance of TTM Cryptosystems. ACNS 2006: 210-225 |
20 | EE | Weijia Wang, Lei Hu: Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. INDOCRYPT 2006: 118-132 |
19 | EE | Tianmiao Wang, Jun Wei, Da Liu, Lei Hu, Wenyong Liu: An Internet Robot Assistant Tele-neurosurgery System Case. IROS 2006: 2845-2849 |
18 | EE | Honggang Hu, Lei Hu, Dengguo Feng: On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208 |
17 | EE | Lei Hu, Xiangyong Zeng: Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions. SETA 2006: 402-416 |
16 | Li Lu, Lei Hu: Pairing-Based Multi-Recipient Public Key Encryption. Security and Management 2006: 159-165 | |
15 | EE | Xiangyong Zeng, Lei Hu, Wenfeng Jiang: A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span. IEICE Transactions 89-A(7): 2029-2035 (2006) |
14 | EE | Nigang Sun, Lei Hu: Expansion and linear complexity of the coordinate sequences over Galois rings. J. Complexity 22(3): 382-395 (2006) |
2005 | ||
13 | EE | Jinsong Han, Yunhao Liu, Li Lu, Lei Hu, Abhishek P. Patil: A Random Walk Based Anonymous Peer-to-Peer Protocol Design. ICCNMC 2005: 143-152 |
12 | EE | Jinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu: Provide Privacy for Mobile P2P Systems. ICDCS Workshops 2005: 829-834 |
11 | EE | Xiangyong Zeng, Lei Hu, Qingchong Liu: A Novel Method for Constructing Almost Perfect Polyphase Sequences. WCC 2005: 346-353 |
10 | EE | Xiangyong Zeng, Lei Hu, Qingchong Liu: A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span CoRR abs/cs/0508114: (2005) |
9 | EE | Xiangyong Zeng, Lei Hu, Qingchong Liu: New Sequence Sets with Zero-Correlation Zone CoRR abs/cs/0508115: (2005) |
8 | EE | Xiangyong Zeng, Qingchong Liu, Lei Hu: Generalized Kasami Sequences: The Large Set CoRR abs/cs/0511046: (2005) |
7 | EE | Xiangyong Zeng, Lei Hu: Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions. IEICE Transactions 88-A(1): 305-310 (2005) |
6 | EE | Xiangyong Zeng, Lei Hu: Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions. IEICE Transactions 88-A(1): 59-66 (2005) |
5 | EE | Lei Hu, Jun-Wu Dong, Dingyi Pei: Implementation of Cryptosystems Based on Tate Pairing. J. Comput. Sci. Technol. 20(2): 264-269 (2005) |
2004 | ||
4 | EE | Lei Hu, Dingyi Pei: Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. Discrete Mathematics 278(1-3): 139-149 (2004) |
2001 | ||
3 | Tianmiao Wang, Da Liu, Lei Hu, Hongbo Lv, Zingang Wang, Zesheng Tang: A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality. MIAR 2001: 103- | |
1998 | ||
2 | EE | Lei Hu, Ian Gorton: Performance Oriented Design Using HL. HICSS (3) 1998: 167-176 |
1 | Mulan Liu, Lei Hu: Properties of Gröbner Bases and Applications to Doubly Periodic Arrays. J. Symb. Comput. 26(3): 301-314 (1998) |