dblp.uni-trier.dewww.uni-trier.de

Hongjun Wu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
24EEHirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel: MAME: A Compression Function with Reduced Hardware Requirements. CHES 2007: 148-165
23EEHongjun Wu, Bart Preneel: Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. EUROCRYPT 2007: 276-290
22EEHongjun Wu, Bart Preneel: Differential-Linear Attacks Against the Stream Cipher Phelix. FSE 2007: 87-100
2006
21EEHongjun Wu, Bart Preneel: Cryptanalysis of the Stream Cipher DECIM. FSE 2006: 30-40
20EEHongjun Wu, Bart Preneel: Resynchronization Attacks on WG and LEX. FSE 2006: 422-432
19EEHongjun Wu, Bart Preneel: Cryptanalysis of the Stream Cipher ABC v2. Selected Areas in Cryptography 2006: 56-66
2005
18EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86
17EEBin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang: Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283
2004
16EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309
15EEHongjun Wu: A New Stream Cipher HC-256. FSE 2004: 226-244
14EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400
13EEBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83
2003
12EEHongjun Wu, Feng Bao, Robert H. Deng: An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87
2002
11EEHongjun Wu, Feng Bao: Cryptanalysis of Stream Cipher COS(2, 128) Mode I. ACISP 2002: 154-158
10EEHongjun Wu: Cryptanalysis of Stream Cipher Alpha1. ACISP 2002: 169-175
9EEHongjun Wu: Related-Cipher Attacks. ICICS 2002: 447-455
8 Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3): (2002)
2001
7EEFeng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu: Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205
6EEFeng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164
5EEHongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179
2000
4 Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288
3 Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111
1998
2EEHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132
1EEHongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147

Coauthor Index

1Feng Bao [1] [2] [3] [4] [5] [6] [7] [8] [11] [12] [13] [14] [16] [18]
2Robert H. Deng (Robert Huijie Deng) [1] [2] [3] [4] [5] [6] [7] [8] [12]
3Dengguo Feng [13] [14] [16] [17] [18]
4Peirong Feng [7]
5Willi Geiselmann [6]
6Yan Guo [7]
7Jun Kitahara [24]
8Özgül Küçük [24]
9Katsuyuki Okeya [24]
10Bart Preneel [19] [20] [21] [22] [23] [24]
11Claus-Peter Schnorr [6]
12Rainer Steinwandt [6]
13Hong Wang [17]
14Dai Watanabe [24]
15Dingfeng Ye [3] [4]
16Qin-Zhong Ye [1] [2]
17Hirotaka Yoshida [24]
18Bin Zhang [13] [14] [16] [17] [18]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)