Follow
Honggang Hu
Honggang Hu
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
D Engels, X Fan, G Gong, H Hu, EM Smith
Financial Cryptography and Data Security, 3-18, 2010
1882010
Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol
D Engels, X Fan, G Gong, H Hu, EM Smith
Centre for Applied Cryptographic Research (CACR) Technical Reports 29 (01), 2009
692009
On quadratic bent functions in polynomial forms
H Hu, D Feng
IEEE transactions on information theory 53 (7), 2610-2615, 2007
682007
A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data
J Zhang, M Zheng, J Nan, H Hu, N Yu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 73-96, 2020
652020
New constructions of codebooks nearly meeting the Welch bound with equality
H Hu, J Wu
IEEE Transactions on Information Theory 60 (2), 1348-1355, 2013
612013
Fruit-v2: ultra-lightweight stream cipher with shorter internal state
VA Ghafari, H Hu, Y Chen
Cryptology ePrint Archive, 2016
592016
Fast discrete Fourier spectra attacks on stream ciphers
G Gong, S Ronjom, T Helleseth, H Hu
IEEE Transactions on Information Theory 57 (8), 5555-5565, 2011
592011
New sets of zero or low correlation zone sequences via interleaving techniques
H Hu, G Gong
IEEE transactions on information theory 56 (4), 1702-1713, 2010
532010
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers
X Fan, H Hu, G Gong, EM Smith, D Engels
2009 International Conference for Internet Technology and Secured …, 2009
512009
On the-Adic Complexity and the-Error-Adic Complexity of Periodic Binary Sequences
H Hu, D Feng
IEEE transactions on information theory 54 (2), 874-883, 2008
51*2008
Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions
H Hu, G Gong
International Journal of Foundations of Computer Science 22 (06), 1317-1329, 2011
502011
Fruit-80: a secure ultra-lightweight stream cipher for constrained environments
V Amin Ghafari, H Hu
Entropy 20 (3), 180, 2018
492018
Practical multi-keyword and boolean search over encrypted e-mail in cloud server
P Xu, S Tang, P Xu, Q Wu, H Hu, W Susilo
IEEE Transactions on Services Computing 14 (6), 1877-1889, 2019
482019
Comments on “A new method to compute the 2-adic complexity of binary sequences”
H Hu
IEEE Transactions on Information Theory 60 (9), 5803-5804, 2014
482014
Multiple handshakes security of TLS 1.3 candidates
X Li, J Xu, Z Zhang, D Feng, H Hu
2016 IEEE Symposium on Security and Privacy (SP), 486-505, 2016
462016
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection
C Miao, Z Tan, Q Chu, H Liu, H Hu, N Yu
IEEE Transactions on Information Forensics and Security 18, 1039-1051, 2023
342023
Homomorphic encryption-based reversible data hiding for 3D mesh models
M Shah, W Zhang, H Hu, H Zhou, T Mahmood
Arabian Journal for Science and Engineering 43, 8145-8157, 2018
332018
On a class of pseudorandom sequences from elliptic curves over finite fields
H Hu, L Hu, D Feng
IEEE transactions on information theory 53 (7), 2598-2605, 2007
302007
Floating-point multiplication timing attack on deep neural network
G Dong, P Wang, P Chen, R Gu, H Hu
2019 IEEE International Conference on Smart Internet of Things (SmartIoT …, 2019
292019
Secure nonlocal denoising in outsourced images
X Hu, W Zhang, K Li, H Hu, N Yu
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20