Follow
Hongjun Wu
Hongjun Wu
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
The hash function JH
H Wu
Submission to NIST (round 3) 6, 2011
237*2011
The stream cipher HC-128
H Wu
New Stream Cipher Designs: The eSTREAM Finalists, 39-47, 2008
1822008
AEGIS: A fast authenticated encryption algorithm
H Wu, B Preneel
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
1292014
ACORN: a lightweight authenticated cipher (v3)
H Wu
Candidate for the CAESAR Competition, 2016
962016
A new stream cipher HC-256
H Wu
Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi …, 2004
912004
Efficient and secure encryption schemes for JPEG2000
H Wu, D Ma
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
672004
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling
Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011
642011
Multi-authority attribute-based keyword search over encrypted cloud data
Y Miao, RH Deng, X Liu, KKR Choo, H Wu, H Li
IEEE Transactions on Dependable and Secure Computing 18 (4), 1667-1680, 2019
622019
Differential attacks against stream cipher ZUC
H Wu, T Huang, PH Nguyen, H Wang, S Ling
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
61*2012
The misuse of RC4 in Microsoft Word and Excel
H Wu
Cryptology ePrint Archive, 2005
582005
Improving the biclique cryptanalysis of AES
B Tao, H Wu
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
522015
Hybrid keyword-field search with efficient key management for industrial internet of things
Y Miao, X Liu, RH Deng, H Wu, H Li, J Li, D Wu
IEEE Transactions on Industrial Informatics 15 (6), 3206-3217, 2018
482018
Resynchronization Attacks on WG and LEX
H Wu, B Preneel
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006
472006
Fair and dynamic data sharing framework in cloud-assisted internet of everything
Y Miao, X Liu, KKR Choo, RH Deng, H Wu, H Li
IEEE Internet of Things Journal 6 (4), 7201-7212, 2019
462019
MAME: A compression function with reduced hardware requirements
H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel
Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007
452007
Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy
H Wu, B Preneel
Advances in Cryptology-EUROCRYPT 2007, 276-290, 2007
442007
Differential-linear attacks against the stream cipher Phelix
H Wu, B Preneel
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
422007
SenSec: Sensor security framework for TinyOS
T Li, H Wu, X Wang, F Bao
INSS’05: Proceedings of the Second International Workshop on Networked …, 2005
42*2005
Leaked-state-forgery attack against the authenticated encryption algorithm ALE
S Wu, H Wu, T Huang, M Wang, W Wu
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
392013
The authenticated cipher MORUS (v2)
H Wu, T Huang
CAESAR submission, 2014
382014
The system can't perform the operation now. Try again later.
Articles 1–20