Hongjun Wu
Hongjun Wu
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
The hash function JH
H Wu
Submission to NIST (round 3) 6, 2011
212*2011
The stream cipher HC-128
H Wu
New stream cipher designs, 39-47, 2008
1532008
AEGIS: a fast authenticated encryption algorithm
H Wu, B Preneel
International Conference on Selected Areas in Cryptography, 185-201, 2013
882013
A new stream cipher HC-256
H Wu
International Workshop on Fast Software Encryption, 226-244, 2004
762004
ACORN: a lightweight authenticated cipher (v3)
H Wu
Candidate for the CAESAR Competition. See also https://competitions. cr. yp …, 2016
652016
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
602004
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Australasian conference on information security and privacy, 433-438, 2011
582011
The Misuse of RC4 in Microsoft Word and Excel.
H Wu
IACR Cryptol. ePrint Arch. 2005, 7, 2005
512005
Resynchronization Attacks on WG and LEX
H Wu, B Preneel
International Workshop on Fast Software Encryption, 422-432, 2006
472006
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
International Conference on the Theory and Application of Cryptology and …, 2012
46*2012
MAME: A compression function with reduced hardware requirements
H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 148-165, 2007
432007
Differential-linear attacks against the stream cipher Phelix
H Wu, B Preneel
International Workshop on Fast Software Encryption, 87-100, 2007
422007
Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy
H Wu, B Preneel
Advances in Cryptology-EUROCRYPT 2007, 276-290, 2007
402007
SenSec: Sensor security framework for TinyOS
T Li, H Wu, X Wang, F Bao
INSS’05: Proceedings of the Second International Workshop on Networked …, 2005
37*2005
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
S Wu, H Wu, T Huang, M Wang, W Wu
International Conference on the Theory and Application of Cryptology and …, 2013
352013
Improving the biclique cryptanalysis of AES
B Tao, H Wu
Australasian Conference on Information Security and Privacy, 39-56, 2015
322015
The authenticated cipher MORUS (v1)
H Wu, T Huang
CAESAR submission, 2014
322014
Method and apparatus for constructing efficient elliptic curve cryptosystems
D Ye, F Bao, H Deng, H Wu
US Patent App. 10/474,152, 2004
312004
Related-cipher attacks
H Wu
International Conference on Information and Communications Security, 447-455, 2002
292002
Improving the algorithm 2 in multidimensional linear cryptanalysis
PH Nguyen, H Wu, H Wang
Australasian Conference on Information Security and Privacy, 61-74, 2011
242011
The system can't perform the operation now. Try again later.
Articles 1–20