2009 | ||
---|---|---|
100 | Aimin Yu, Dengguo Feng, Ren Liu: TBDRM: A TPM-Based Secure DRM Architecture. CSE (2) 2009: 671-677 | |
99 | Yu Qin, Dengguo Feng, Zhen Xu: An Anonymous Property-Based Attestation Protocol from Bilinear Maps. CSE (2) 2009: 732-738 | |
98 | Hao Hu, Hao Li, Dengguo Feng: L-UCON: Towards Layered Access Control with UCON. CSE (2) 2009: 823-829 | |
97 | Yi Deng, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng: Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. CSR 2009: 80-91 | |
96 | Yan Zhang, Zhengde Zhai, Dengguo Feng: Bring Efficient Connotation Expressible Policies to Trust Management. ICICS 2009: 396-410 | |
95 | Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su: Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 | |
94 | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 | |
93 | Xianggen Wang, Dengguo Feng, Purui Su: Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82 | |
92 | Dengguo Feng, Jing Xu: A New Client-to-Client Password-Authenticated Key Agreement Protocol. IWCC 2009: 63-76 | |
91 | Shuang Wu, Dengguo Feng, Wenling Wu: Cryptanalysis of the LANE Hash Function. Selected Areas in Cryptography 2009: 126-140 | |
90 | Jing Xu, Wen-Tao Zhu, Dengguo Feng: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4): 723-728 (2009) | |
2008 | ||
89 | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238 | |
88 | Purui Su, Lingyun Ying, Dengguo Feng: Exploring Malware Behaviors Based on Environment Constitution. CIS (1) 2008: 320-325 | |
87 | Hao Hu, Dengguo Feng: BIFI: Architectural Support for Information Flow Integrity Measurement. CSSE (3) 2008: 605-609 | |
86 | Limin Fan, Yongbin Zhou, Dengguo Feng: A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211 | |
85 | Xiaofeng Chen, Dengguo Feng: A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313 | |
84 | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu: Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ISPEC 2008: 248-262 | |
83 | Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu: Security of Truncated MACs. Inscrypt 2008: 96-114 | |
82 | Bin Zhang, Dengguo Feng: An Improved Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2008: 214-227 | |
81 | Chi Chen, Dengguo Feng, Min Zhang, De-sheng Zhang, He-qun Xian: Research on Malicious Transaction Processing Method of Database System. WAIM 2008: 435-440 | |
80 | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences. IEEE Transactions on Information Theory 54(2): 874-883 (2008) | |
79 | Xiaofeng Chen, Dengguo Feng: Direct Anonymous Attestation for Next Generation TPM. JCP 3(12): 43-50 (2008) | |
2007 | ||
78 | Gang Yao, Dengguo Feng, Xiaoxi Han: Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ARES 2007: 564-574 | |
77 | Hua Chen, Dengguo Feng: An Effective Genetic Algorithm for Self-Inverse S-Boxes. CIS 2007: 618-622 | |
76 | Rui Xue, Dengguo Feng: Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253 | |
75 | Hua Chen, Wenling Wu, Dengguo Feng: Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295 | |
74 | Wentao Zhang, Wenling Wu, Dengguo Feng: New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 | |
73 | Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng: Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 | |
72 | Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng: SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37 | |
71 | Dengguo Feng, Chuankun Wu: Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Frontiers of Computer Science in China 1(4): 385-396 (2007) | |
70 | Xiao-Ming Lu, Dengguo Feng: Security Proof of the Original SOK-IBS Scheme. I. J. Network Security 5(2): 176-181 (2007) | |
69 | Honggang Hu, Lei Hu, Dengguo Feng: On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) | |
68 | Honggang Hu, Dengguo Feng: On Quadratic Bent Functions in Polynomial Forms. IEEE Transactions on Information Theory 53(7): 2610-2615 (2007) | |
67 | Wenling Wu, Wentao Zhang, Dengguo Feng: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) | |
66 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng: Constructing parallel long-message signcryption scheme from trapdoor permutation. Science in China Series F: Information Sciences 50(1): 82-98 (2007) | |
65 | ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang: Survey of information security. Science in China Series F: Information Sciences 50(3): 273-298 (2007) | |
64 | Dengguo Feng, Weidong Chen: Modular approach to the design and analysis of password-based security protocols. Science in China Series F: Information Sciences 50(3): 381-398 (2007) | |
2006 | ||
63 | Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 | |
62 | Fan Zhang, Dengguo Feng: Identity-based PKI Scheme for Machine Readable Travel Document. AINA (2) 2006: 461-465 | |
61 | Dongyao Ji, Dengguo Feng: Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330 | |
60 | Dongyao Ji, Dengguo Feng: Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85 | |
59 | Gang Yao, Dengguo Feng: Proxy Oblivious Transfer Protocol. ARES 2006: 190-197 | |
58 | Bin Zhang, Dengguo Feng: New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68 | |
57 | Xiao Feng Li, Dengguo Feng: Composing Administrative Scope of Delegation Policies based on extended XACML. EDOC 2006: 467-470 | |
56 | Purui Su, Dengguo Feng: The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195 | |
55 | Peng Wang, Dengguo Feng, Wenling Wu: Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286 | |
54 | Honggang Hu, Lei Hu, Dengguo Feng: On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208 | |
53 | Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 | |
52 | Bin Zhang, Dengguo Feng: Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248 | |
51 | Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng: On Non-binary Quantum BCH Codes. TAMC 2006: 675-683 | |
50 | Honggang Hu, Dengguo Feng, Wenling Wu: Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) | |
49 | Hong Wang, Gang Qiu, Dengguo Feng, Guo-Zhen Xiao: Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Transactions 89-A(3): 822-825 (2006) | |
48 | Dengguo Feng, Xiaoyun Wang: Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) | |
47 | Zhongwei Sun, Dengguo Feng, Chuankun Wu: DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. Journal of Computer Research and Development 43(11): 1920-1926 (2006) | |
46 | Bin Zhang, Dengguo Feng: Security analysis of a new stream cipher. Science in China Series F: Information Sciences 49(3): 286-301 (2006) | |
2005 | ||
45 | Dengguo Feng, Dongdai Lin, Moti Yung: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Springer 2005 | |
44 | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119 | |
43 | Zhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210 | |
42 | Zaiqiang Liu, Dengguo Feng: Incremental Fuzzy Decision Tree-Based Network Forensic System. CIS (2) 2005: 995-1002 | |
41 | Peng Wang, Dengguo Feng, Wenling Wu: HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188 | |
40 | Dengguo Feng, Ji Xiang: Experiences on Intrusion Tolerance Distributed Systems. COMPSAC (1) 2005: 270-271 | |
39 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 | |
38 | Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 | |
37 | Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 | |
36 | Wenling Wu, Wentao Zhang, Dengguo Feng: Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 | |
35 | Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang: Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 | |
34 | Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng: A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 | |
33 | Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng: Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988 | |
32 | Hong Wang, Yuqing Zhang, Dengguo Feng: Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310 | |
31 | Peng Wang, Dengguo Feng, Wenling Wu: On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287 | |
30 | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367 | |
29 | Zhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377 | |
28 | Liwu Zhang, Dengguo Feng: Intrusion Tolerant CA Scheme with Cheaters Detection Ability. ISPA Workshops 2005: 378-386 | |
27 | Yan Zhu, Dengguo Feng, Wei Zou: Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83 | |
26 | Yuqing Zhang, Xiuying Liu, Dengguo Feng: An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 | |
25 | Zhenfeng Zhang, Dengguo Feng: Cryptanalysis of some signature schemes with message recovery. Applied Mathematics and Computation 170(1): 103-114 (2005) | |
24 | Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) | |
2004 | ||
23 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 | |
22 | Xin Lü, Dengguo Feng: An Arbitrated Quantum Message Signature Scheme. CIS 2004: 1054-1060 | |
21 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 | |
20 | Hua Chen, Dengguo Feng: An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. ICISC 2004: 352-361 | |
19 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 | |
18 | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217 | |
17 | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231 | |
16 | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. SETA 2004: 185-196 | |
15 | Wenling Wu, Dengguo Feng, Hua Chen: Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266 | |
14 | Jing Xu, Zhenfeng Zhang, Dengguo Feng: A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169 | |
13 | Gang Yao, Dengguo Feng: A New k-Anonymous Message Transmission Protocol. WISA 2004: 388-399 | |
12 | Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li: Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) | |
11 | Rui Xue, Dengguo Feng: New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004) | |
10 | Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li: Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004) | |
2003 | ||
9 | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 | |
8 | Zhen Xu, Dengguo Feng, Lan Li, Hua Chen: UC-RBAC: A Usage Constrained Role-Based Access Control Model. ICICS 2003: 337-347 | |
7 | Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng: Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003) | |
2000 | ||
6 | Wenling Wu, Dengguo Feng, Sihan Qing: Power Analysis of RC6 and Serpent. SEC 2000: 201-209 | |
5 | Wang Mingsheng, Sihan Qing, Dengguo Feng: A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 | |
4 | Shaoquan Jiang, Dengguo Feng, Sihan Qing: Analysis and Design of E-voting Protocol. SEC 2000: 281-290 | |
3 | Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng: The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 | |
1999 | ||
2 | Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing: Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21 | |
1 | Dengguo Feng: Three Characterizations of Correlation-immune Functions over Rings ZN. Theor. Comput. Sci. 226(1-2): 37-43 (1999) |