Hongjun Wu
Hongjun Wu
Verified email at
Cited by
Cited by
The hash function JH
H Wu
Submission to NIST (round 3) 6, 2011
The stream cipher HC-128
H Wu
New Stream Cipher Designs: The eSTREAM Finalists, 39-47, 2008
AEGIS: A fast authenticated encryption algorithm
H Wu, B Preneel
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
Multi-authority attribute-based keyword search over encrypted cloud data
Y Miao, RH Deng, X Liu, KKR Choo, H Wu, H Li
IEEE Transactions on Dependable and Secure Computing 18 (4), 1667-1680, 2019
ACORN: a lightweight authenticated cipher (v3)
H Wu
Candidate for the CAESAR Competition 2016, 2016
A new stream cipher HC-256
H Wu
Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi …, 2004
Hybrid keyword-field search with efficient key management for industrial internet of things
Y Miao, X Liu, RH Deng, H Wu, H Li, J Li, D Wu
IEEE Transactions on Industrial Informatics 15 (6), 3206-3217, 2018
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011
Improving the biclique cryptanalysis of AES
B Tao, H Wu
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
Fair and dynamic data sharing framework in cloud-assisted internet of everything
Y Miao, X Liu, KKR Choo, RH Deng, H Wu, H Li
IEEE Internet of Things Journal 6 (4), 7201-7212, 2019
The misuse of RC4 in Microsoft Word and Excel
H Wu
Cryptology ePrint Archive, 2005
The authenticated cipher MORUS (v2)
H Wu, T Huang
CAESAR submission, 2014
Resynchronization Attacks on WG and LEX
H Wu, B Preneel
International Workshop on Fast Software Encryption, 422-432, 2006
Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy
H Wu, B Preneel
Advances in Cryptology-EUROCRYPT 2007, 276-290, 2007
Differential-linear attacks against the stream cipher Phelix
H Wu, B Preneel
International Workshop on Fast Software Encryption, 87-100, 2007
MAME: A compression function with reduced hardware requirements
H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
S Wu, H Wu, T Huang, M Wang, W Wu
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
SenSec: Sensor security framework for TinyOS
T Li, H Wu, X Wang, F Bao
INSS’05: Proceedings of the Second International Workshop on Networked …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20