2009 |
20 | EE | Leyou Zhang,
Yupu Hu,
Qing Wu:
New Construction of Short Hierarchical ID-Based Signature in the Standard Model.
Fundam. Inform. 90(1-2): 191-201 (2009) |
2008 |
19 | EE | Leyou Zhang,
Yupu Hu,
Ningbo Mu:
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks.
ICYCS 2008: 1619-1623 |
18 | EE | Ningbo Mu,
Yupu Hu,
Leyou Zhang:
On the Computational Efficiency of XTR+.
Inscrypt 2008: 305-313 |
17 | EE | Zhenhua Liu,
Yupu Hu,
Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model.
ProvSec 2008: 127-140 |
16 | EE | Yupu Hu,
Baocang Wang,
Wencai He:
NTRUSign With a New Perturbation.
IEEE Transactions on Information Theory 54(7): 3216-3221 (2008) |
15 | EE | Fagen Li,
Xiangjun Xin,
Yupu Hu:
ID-based threshold proxy signcryption scheme from bilinear pairings.
IJSN 3(3): 206-215 (2008) |
14 | EE | Yifeng Yin,
Xinshe Li,
Yupu Hu:
Fast S-box security mechanism research based on the polymorphic cipher.
Inf. Sci. 178(6): 1603-1610 (2008) |
2007 |
13 | EE | Fagen Li,
Yupu Hu,
Chuanrong Zhang:
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
ACNS 2007: 373-384 |
12 | EE | Xuanwu Zhou,
Xiaoyuan Yang,
Ping Wei,
Yupu Hu:
BSADF: Blind Signature Based Anonymous Digital Fingerprint.
FSKD (4) 2007: 426-430 |
11 | EE | Xuanwu Zhou,
Xiaoyuan Yang,
Ping Wei,
Yupu Hu:
Dynamic Group Signature with Forward Security and Its Application.
GCC 2007: 473-480 |
10 | EE | Fagen Li,
Yupu Hu:
Security Analysis of the Pomykala-Barabasz Scheme.
Fundam. Inform. 80(4): 453-459 (2007) |
9 | EE | Fagen Li,
Xiangjun Xin,
Yupu Hu:
Key management in ad hoc networks using self-certified public key system.
IJMC 5(1): 94-106 (2007) |
8 | EE | Baocang Wang,
Qianhong Wu,
Yupu Hu:
A knapsack-based probabilistic encryption scheme.
Inf. Sci. 177(19): 3981-3994 (2007) |
2006 |
7 | EE | Fagen Li,
Yupu Hu,
Shuanggen Liu:
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems.
CIS 2006: 406-416 |
6 | EE | Lihua Dong,
Yupu Hu,
Yong Zeng:
Computing the k-Error N-Adic Complexity of a Sequence of Period pn.
SETA 2006: 190-198 |
5 | EE | Yiliang Han,
Xiaoyuan Yang,
Ping Wei,
Yuming Wang,
Yupu Hu:
ECGSC: Elliptic Curve Based Generalized Signcryption.
UIC 2006: 956-965 |
2005 |
4 | EE | Lihua Dong,
Yong Zeng,
Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
CIS (2) 2005: 68-73 |
3 | EE | Fagen Li,
Juntao Gao,
Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings.
CISC 2005: 242-253 |
2004 |
2 | | Yupu Hu,
Guozhen Xiao:
Generalized self-shrinking generator.
IEEE Transactions on Information Theory 50(4): 714-719 (2004) |
2003 |
1 | | Yupu Hu,
Guozhen Xiao:
Resilient functions over finite fields.
IEEE Transactions on Information Theory 49(8): 2040-2046 (2003) |