2009 |
51 | EE | Xiangyong Zeng,
Lei Hu,
Wenfeng Jiang,
Qin Yue,
Xiwang Cao:
Weight Distribution of A p-ary Cyclic Code
CoRR abs/0901.2391: (2009) |
50 | EE | Guobiao Weng,
Lei Hu:
Some results on skew Hadamard difference sets.
Des. Codes Cryptography 50(1): 93-105 (2009) |
49 | EE | Wenfeng Jiang,
Lei Hu,
Xiaohu Tang,
Xiangyong Zeng:
New Optimal Quadriphase Sequences With Larger Linear Span.
IEEE Transactions on Information Theory 55(1): 458-470 (2009) |
2008 |
48 | EE | Lei Hu,
Shuqiang Jiang,
Qingming Huang,
Wen Gao:
People re-detection using Adaboost with sift and color correlogram.
ICIP 2008: 1348-1351 |
47 | EE | Min Xu,
Chuang Yang,
Tianmiao Wang,
Yan Hu,
Lei Hu,
Bing Yu:
Embedded Control System of Digital Operating Table.
ICIRA (1) 2008: 556-565 |
46 | EE | Lei Hu,
Yizhou Wang,
Shuqiang Jiang,
Qingming Huang,
Wen Gao:
Human reappearance detection based on on-line learning.
ICPR 2008: 1-4 |
45 | EE | Wen Ji,
Lei Hu:
Square Attack on Reduced-Round Zodiac Cipher.
ISPEC 2008: 377-391 |
44 | | Lei Hu,
Kamran Sartipi:
Dynamic Analysis and Design Pattern Detection in Java Programs.
SEKE 2008: 842-846 |
43 | EE | Xiangyong Zeng,
Nian Li,
Lei Hu:
A Class of Nonbinary Codes and Sequence Families.
SETA 2008: 81-94 |
42 | EE | Wenfeng Jiang,
Lei Hu,
Xiaohu Tang,
Xiangyong Zeng:
New family of binary sequences of period 4(2 n - 1) with low correlation.
Appl. Algebra Eng. Commun. Comput. 19(5): 429-439 (2008) |
41 | EE | Lei Hu,
Xiangyong Zeng,
Nian Li,
Wenfeng Jiang:
Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation
CoRR abs/0801.0857: (2008) |
40 | EE | Xiangyong Zeng,
Nian Li,
Lei Hu:
A Class of Nonbinary Codes and Their Weight Distribution
CoRR abs/0802.3430: (2008) |
39 | EE | Rongquan Feng,
Lei Hu,
Jin Ho Kwak:
Authentication codes and bipartite graphs.
Eur. J. Comb. 29(6): 1473-1482 (2008) |
38 | EE | Li Lu,
Jinsong Han,
Yunhao Liu,
Lei Hu,
Jin-Peng Huai,
Lionel M. Ni,
Jian Ma:
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distrib. Syst. 19(10): 1325-1337 (2008) |
37 | EE | Wenfeng Jiang,
Lei Hu,
Xiangyong Zeng:
New Family of Binary Sequences with Low Correlation.
IEICE Transactions 91-A(1): 417-421 (2008) |
36 | EE | Xiangyong Zeng,
John Q. Liu,
Lei Hu,
Desmond P. Taylor:
On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties.
IEICE Transactions 91-A(2): 664-672 (2008) |
35 | EE | Nian Li,
Xiangyong Zeng,
Lei Hu:
Binary Constant Weight Codes Based on Cyclic Difference Sets.
IEICE Transactions 91-A(5): 1288-1292 (2008) |
2007 |
34 | EE | Fen Liu,
Wen Ji,
Lei Hu,
Jintai Ding,
Shuwang Lv,
Andrei Pyshkin,
Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher.
ACISP 2007: 158-170 |
33 | EE | Xuyun Nie,
Lei Hu,
Jintai Ding,
Jianyu Li,
John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
ACNS 2007: 104-115 |
32 | EE | Wen Ji,
Lei Hu:
New Description of SMS4 by an Embedding overGF(28).
INDOCRYPT 2007: 238-251 |
31 | EE | Li Lu,
Jinsong Han,
Lei Hu,
Jinpeng Huai,
Yunhao Liu,
Lionel M. Ni:
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
IPDPS 2007: 1-10 |
30 | EE | Xin Jiang,
Jintai Ding,
Lei Hu:
Kipnis-Shamir Attack on HFE Revisited.
Inscrypt 2007: 399-411 |
29 | EE | Weijia Wang,
Lei Hu,
Yong Li:
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Inscrypt 2007: 93-107 |
28 | EE | Li Lu,
Jinsong Han,
Lei Hu,
Yunhao Liu,
Lionel M. Ni:
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
PerCom 2007: 13-22 |
27 | EE | Jintai Ding,
Lei Hu,
Xuyun Nie,
Jianyu Li,
John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
Public Key Cryptography 2007: 233-248 |
26 | EE | Xiaohu Tang,
Tor Helleseth,
Lei Hu,
Wenfeng Jiang:
A New Family of Gold-Like Sequences.
SSC 2007: 62-69 |
25 | | Lifeng Guo,
Guilin Wang,
Duncan S. Wong,
Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme.
Security and Management 2007: 566-572 |
24 | EE | Xiangyong Zeng,
John Q. Liu,
Lei Hu:
Generalized Kasami Sequences: The Large Set.
IEEE Transactions on Information Theory 53(7): 2587-2598 (2007) |
23 | EE | Honggang Hu,
Lei Hu,
Dengguo Feng:
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) |
22 | EE | Yining Liu,
Lei Hu,
Heguo Liu:
Using an efficient hash chain and delaying function to improve an e-lottery scheme.
Int. J. Comput. Math. 84(7): 967-970 (2007) |
2006 |
21 | EE | Xuyun Nie,
Lei Hu,
Jianyu Li,
Crystal Updegrove,
Jintai Ding:
Breaking a New Instance of TTM Cryptosystems.
ACNS 2006: 210-225 |
20 | EE | Weijia Wang,
Lei Hu:
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
INDOCRYPT 2006: 118-132 |
19 | EE | Tianmiao Wang,
Jun Wei,
Da Liu,
Lei Hu,
Wenyong Liu:
An Internet Robot Assistant Tele-neurosurgery System Case.
IROS 2006: 2845-2849 |
18 | EE | Honggang Hu,
Lei Hu,
Dengguo Feng:
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
SETA 2006: 199-208 |
17 | EE | Lei Hu,
Xiangyong Zeng:
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
SETA 2006: 402-416 |
16 | | Li Lu,
Lei Hu:
Pairing-Based Multi-Recipient Public Key Encryption.
Security and Management 2006: 159-165 |
15 | EE | Xiangyong Zeng,
Lei Hu,
Wenfeng Jiang:
A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span.
IEICE Transactions 89-A(7): 2029-2035 (2006) |
14 | EE | Nigang Sun,
Lei Hu:
Expansion and linear complexity of the coordinate sequences over Galois rings.
J. Complexity 22(3): 382-395 (2006) |
2005 |
13 | EE | Jinsong Han,
Yunhao Liu,
Li Lu,
Lei Hu,
Abhishek P. Patil:
A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
ICCNMC 2005: 143-152 |
12 | EE | Jinsong Han,
Yanmin Zhu,
Yunhao Liu,
Jianfeng Cai,
Lei Hu:
Provide Privacy for Mobile P2P Systems.
ICDCS Workshops 2005: 829-834 |
11 | EE | Xiangyong Zeng,
Lei Hu,
Qingchong Liu:
A Novel Method for Constructing Almost Perfect Polyphase Sequences.
WCC 2005: 346-353 |
10 | EE | Xiangyong Zeng,
Lei Hu,
Qingchong Liu:
A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span
CoRR abs/cs/0508114: (2005) |
9 | EE | Xiangyong Zeng,
Lei Hu,
Qingchong Liu:
New Sequence Sets with Zero-Correlation Zone
CoRR abs/cs/0508115: (2005) |
8 | EE | Xiangyong Zeng,
Qingchong Liu,
Lei Hu:
Generalized Kasami Sequences: The Large Set
CoRR abs/cs/0511046: (2005) |
7 | EE | Xiangyong Zeng,
Lei Hu:
Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.
IEICE Transactions 88-A(1): 305-310 (2005) |
6 | EE | Xiangyong Zeng,
Lei Hu:
Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.
IEICE Transactions 88-A(1): 59-66 (2005) |
5 | EE | Lei Hu,
Jun-Wu Dong,
Dingyi Pei:
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol. 20(2): 264-269 (2005) |
2004 |
4 | EE | Lei Hu,
Dingyi Pei:
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discrete Mathematics 278(1-3): 139-149 (2004) |
2001 |
3 | | Tianmiao Wang,
Da Liu,
Lei Hu,
Hongbo Lv,
Zingang Wang,
Zesheng Tang:
A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.
MIAR 2001: 103- |
1998 |
2 | EE | Lei Hu,
Ian Gorton:
Performance Oriented Design Using HL.
HICSS (3) 1998: 167-176 |
1 | | Mulan Liu,
Lei Hu:
Properties of Gröbner Bases and Applications to Doubly Periodic Arrays.
J. Symb. Comput. 26(3): 301-314 (1998) |