![]() | 2009 | |
---|---|---|
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Aimin Yu, Dengguo Feng, Ren Liu: TBDRM: A TPM-Based Secure DRM Architecture. CSE (2) 2009: 671-677 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Yu Qin, Dengguo Feng, Zhen Xu: An Anonymous Property-Based Attestation Protocol from Bilinear Maps. CSE (2) 2009: 732-738 |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Hu, Hao Li, Dengguo Feng: L-UCON: Towards Layered Access Control with UCON. CSE (2) 2009: 823-829 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Deng, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng: Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. CSR 2009: 80-91 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Zhang, Zhengde Zhai, Dengguo Feng: Bring Efficient Connotation Expressible Policies to Trust Management. ICICS 2009: 396-410 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su: Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Correctness of an Approach against Side-Channel Attacks. ISPEC 2009: 336-344 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Xianggen Wang, Dengguo Feng, Purui Su: Reconstructing a Packed DLL Binary for Static Analysis. ISPEC 2009: 71-82 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Jing Xu: A New Client-to-Client Password-Authenticated Key Agreement Protocol. IWCC 2009: 63-76 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Shuang Wu, Dengguo Feng, Wenling Wu: Cryptanalysis of the LANE Hash Function. Selected Areas in Cryptography 2009: 126-140 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Jing Xu, Wen-Tao Zhu, Dengguo Feng: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4): 723-728 (2009) |
2008 | ||
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang: On the Unprovable Security of 2-Key XCBC. ACISP 2008: 230-238 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Purui Su, Lingyun Ying, Dengguo Feng: Exploring Malware Behaviors Based on Environment Constitution. CIS (1) 2008: 320-325 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Hao Hu, Dengguo Feng: BIFI: Architectural Support for Information Flow Integrity Measurement. CSSE (3) 2008: 605-609 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Limin Fan, Yongbin Zhou, Dengguo Feng: A Fast Implementation of Computing the Transparency Order of S-Boxes. ICYCS 2008: 206-211 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaofeng Chen, Dengguo Feng: A New Direct Anonymous Attestation Scheme from Bilinear Maps. ICYCS 2008: 2308-2313 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu: Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ISPEC 2008: 248-262 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu: Security of Truncated MACs. Inscrypt 2008: 96-114 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Dengguo Feng: An Improved Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2008: 214-227 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Chi Chen, Dengguo Feng, Min Zhang, De-sheng Zhang, He-qun Xian: Research on Malicious Transaction Processing Method of Database System. WAIM 2008: 435-440 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences. IEEE Transactions on Information Theory 54(2): 874-883 (2008) |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaofeng Chen, Dengguo Feng: Direct Anonymous Attestation for Next Generation TPM. JCP 3(12): 43-50 (2008) |
2007 | ||
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Gang Yao, Dengguo Feng, Xiaoxi Han: Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ARES 2007: 564-574 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Hua Chen, Dengguo Feng: An Effective Genetic Algorithm for Self-Inverse S-Boxes. CIS 2007: 618-622 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Rui Xue, Dengguo Feng: Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ICICS 2007: 239-253 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Hua Chen, Wenling Wu, Dengguo Feng: Differential Fault Analysis on CLEFIA. ICICS 2007: 284-295 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Wentao Zhang, Wenling Wu, Dengguo Feng: New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng: Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng: SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Chuankun Wu: Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Frontiers of Computer Science in China 1(4): 385-396 (2007) |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiao-Ming Lu, Dengguo Feng: Security Proof of the Original SOK-IBS Scheme. I. J. Network Security 5(2): 176-181 (2007) |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Lei Hu, Dengguo Feng: On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields. IEEE Transactions on Information Theory 53(7): 2598-2605 (2007) |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Dengguo Feng: On Quadratic Bent Functions in Polynomial Forms. IEEE Transactions on Information Theory 53(7): 2610-2615 (2007) |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenling Wu, Wentao Zhang, Dengguo Feng: Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng: Constructing parallel long-message signcryption scheme from trapdoor permutation. Science in China Series F: Information Sciences 50(1): 82-98 (2007) |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang: Survey of information security. Science in China Series F: Information Sciences 50(3): 273-298 (2007) |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Weidong Chen: Modular approach to the design and analysis of password-based security protocols. Science in China Series F: Information Sciences 50(3): 381-398 (2007) |
2006 | ||
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Fan Zhang, Dengguo Feng: Identity-based PKI Scheme for Machine Readable Travel Document. AINA (2) 2006: 461-465 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongyao Ji, Dengguo Feng: Efficient Anonymous Electronic Metering Scheme. AMT 2006: 327-330 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Dongyao Ji, Dengguo Feng: Fault-tolerate Multiparty Electronic Contract Signing Protocol. AMT 2006: 79-85 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Gang Yao, Dengguo Feng: Proxy Oblivious Transfer Protocol. ARES 2006: 190-197 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Dengguo Feng: New Guess-and-Determine Attack on the Self-Shrinking Generator. ASIACRYPT 2006: 54-68 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiao Feng Li, Dengguo Feng: Composing Administrative Scope of Delegation Policies based on extended XACML. EDOC 2006: 467-470 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Purui Su, Dengguo Feng: The Design of an Artificial Immune System. ICN/ICONS/MCL 2006: 195 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Wenling Wu: Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. INDOCRYPT 2006: 280-286 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Lei Hu, Dengguo Feng: On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences. SETA 2006: 199-208 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Dengguo Feng: Multi-pass Fast Correlation Attack on Stream Ciphers. Selected Areas in Cryptography 2006: 234-248 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng: On Non-binary Quantum BCH Codes. TAMC 2006: 675-683 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Dengguo Feng, Wenling Wu: Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/. IEEE Transactions on Information Theory 52(5): 2260-2265 (2006) |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Hong Wang, Gang Qiu, Dengguo Feng, Guo-Zhen Xiao: Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Transactions 89-A(3): 822-825 (2006) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Xiaoyun Wang: Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhongwei Sun, Dengguo Feng, Chuankun Wu: DWT-Domain Blind Watermark Detection Based on Weak Signal Detection Theory. Journal of Computer Research and Development 43(11): 1920-1926 (2006) |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Dengguo Feng: Security analysis of a new stream cipher. Science in China Series F: Information Sciences 49(3): 286-301 (2006) |
2005 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Dongdai Lin, Moti Yung: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Springer 2005 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Zaiqiang Liu, Dengguo Feng: Incremental Fuzzy Decision Tree-Based Network Forensic System. CIS (2) 2005: 995-1002 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Wenling Wu: HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng, Ji Xiang: Experiences on Intrusion Tolerance Distributed Systems. COMPSAC (1) 2005: 270-271 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenling Wu, Wentao Zhang, Dengguo Feng: Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang: Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Haipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng: A Packet Marking Scheme for IP Traceback. ICN (2) 2005: 964-971 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Purui Su, Dequan Li, Haipeng Qu, Dengguo Feng: Detecting the Deviations of Privileged Process Execution. ICN (2) 2005: 980-988 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Hong Wang, Yuqing Zhang, Dengguo Feng: Short Threshold Signature Schemes Without Random Oracles. INDOCRYPT 2005: 297-310 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Peng Wang, Dengguo Feng, Wenling Wu: On the Security of Tweakable Modes of Operation: TBC and TAE. ISC 2005: 274-287 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Liwu Zhang, Dengguo Feng: Intrusion Tolerant CA Scheme with Cheaters Detection Ability. ISPA Workshops 2005: 378-386 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Yan Zhu, Dengguo Feng, Wei Zou: Collusion Secure Convolutional Spread Spectrum Fingerprinting. IWDW 2005: 67-83 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuqing Zhang, Xiuying Liu, Dengguo Feng: An approach to the formal verification of the three-principal security protocols. Security and Management 2005: 163-169 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenfeng Zhang, Dengguo Feng: Cryptanalysis of some signature schemes with message recovery. Applied Mathematics and Computation 170(1): 103-114 (2005) |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005) |
2004 | ||
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Xin Lü, Dengguo Feng: An Arbitrated Quantum Message Signature Scheme. CIS 2004: 1054-1060 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Hua Chen, Dengguo Feng: An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. ICISC 2004: 352-361 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: A Generalized Method for Constructing and Proving Zero-Knowledge Watermark Proof Systems. IWDW 2004: 204-217 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Xianfeng Zhao, Yingxia Dai, Dengguo Feng: Towards the Public but Noninvertible Watermarking. IWDW 2004: 218-231 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Honggang Hu, Dengguo Feng: On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences. SETA 2004: 185-196 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenling Wu, Dengguo Feng, Hua Chen: Collision Attack and Pseudorandomness of Reduced-Round Camellia. Selected Areas in Cryptography 2004: 252-266 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Jing Xu, Zhenfeng Zhang, Dengguo Feng: A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Gang Yao, Dengguo Feng: A New k-Anonymous Message Transmission Protocol. WISA 2004: 388-399 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li: Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Rui Xue, Dengguo Feng: New Semantic Model for Authentication Protocols in ASMs. J. Comput. Sci. Technol. 19(4): 555-563 (2004) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li: Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004) |
2003 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhen Xu, Dengguo Feng, Lan Li, Hua Chen: UC-RBAC: A Usage Constrained Role-Based Access Control Model. ICICS 2003: 337-347 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Qingguang Ji, Sihan Qing, Yongbin Zhou, Dengguo Feng: Study on Strand Space Model Theory. J. Comput. Sci. Technol. 18(5): 553-570 (2003) |
2000 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenling Wu, Dengguo Feng, Sihan Qing: Power Analysis of RC6 and Serpent. SEC 2000: 201-209 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Wang Mingsheng, Sihan Qing, Dengguo Feng: A Simple Algorithm for Computing Several Sequences Synthesis. SEC 2000: 211-220 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Shaoquan Jiang, Dengguo Feng, Sihan Qing: Analysis and Design of E-voting Protocol. SEC 2000: 281-290 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianchun Jiang, Weifeng Chen, Sihan Qing, Dengguo Feng: The Defense Framework for Large-scale Computer Network System. SEC 2000: 69-78 |
1999 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing: Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Dengguo Feng: Three Characterizations of Correlation-immune Functions over Rings ZN. Theor. Comput. Sci. 226(1-2): 37-43 (1999) |