default search action
Hongjun Wu 0001
Person information
- affiliation: University of Texas at San Antonio, San Antonio, TX, USA
Other persons with the same name
- Hongjun Wu — disambiguation page
- Hongjun Wu 0002 — Beijing Union University, Beijing, China
- Hongjun Wu 0003 — Sun Yat-sen University, Guangzhou, China
- Hongjun Wu 0004 — Tiangong University, Tianjin, China
- Hongjun Wu 0005 — Cornell University, Ithaca, NY, USA
- Hongjun Wu 0006 — Peking University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Yinbin Miao, Robert H. Deng, Ximeng Liu, Kim-Kwang Raymond Choo, Hongjun Wu, Hongwei Li:
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 18(4): 1667-1680 (2021)
2010 – 2019
- 2019
- [j6]Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Hongjun Wu, Hongwei Li:
Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything. IEEE Internet Things J. 6(4): 7201-7212 (2019) - [j5]Chenyu Wang, Bihuan Chen, Yang Liu, Hongjun Wu:
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense. IEEE Trans. Inf. Forensics Secur. 14(3): 693-708 (2019) - [j4]Yinbin Miao, Ximeng Liu, Robert H. Deng, Hongjun Wu, Hongwei Li, Jiguo Li, Dapeng Wu:
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things. IEEE Trans. Ind. Informatics 15(6): 3206-3217 (2019) - 2018
- [j3]Jongsung Kim, Hongjun Wu, Raphael C.-W. Phan:
Cryptography and Future Security. Discret. Appl. Math. 241: 1 (2018) - [j2]Tao Huang, Hongjun Wu:
Distinguishing Attack on NORX Permutation. IACR Trans. Symmetric Cryptol. 2018(1): 57-73 (2018) - [c32]Chenyu Wang, Tao Huang, Hongjun Wu:
On the Weakness of Constant Blinding PRNG in Flash Player. ICICS 2018: 107-123 - 2017
- [c31]Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of Simpira v2. ACISP (1) 2017: 384-401 - [c30]Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Improved Differential Cryptanalysis on Generalized Feistel Schemes. INDOCRYPT 2017: 302-324 - [i7]Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Improved Differential Cryptanalysis on Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2017: 1194 (2017) - 2015
- [c29]Biaoshuai Tao, Hongjun Wu:
Improving the Biclique Cryptanalysis of AES. ACISP 2015: 39-56 - [c28]Jing Wang, Hongjun Wu:
URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications. CNS 2015: 697-698 - [c27]Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. FSE 2015: 243-263 - [c26]Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. SAC 2015: 510-526 - [i6]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. IACR Cryptol. ePrint Arch. 2015: 159 (2015) - [i5]Tao Huang, Ivan Tjuawinata, Hongjun Wu:
Differential-Linear Cryptanalysis of ICEPOLE. IACR Cryptol. ePrint Arch. 2015: 160 (2015) - [i4]Ivan Tjuawinata, Tao Huang, Hongjun Wu:
Cryptanalysis of the Authenticated Encryption Algorithm COFFE. IACR Cryptol. ePrint Arch. 2015: 783 (2015) - 2013
- [c25]Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE. ASIACRYPT (1) 2013: 377-404 - [c24]Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. Selected Areas in Cryptography 2013: 185-201 - [i3]Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. IACR Cryptol. ePrint Arch. 2013: 695 (2013) - 2012
- [c23]Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling:
Differential Attacks against Stream Cipher ZUC. ASIACRYPT 2012: 262-277 - 2011
- [c22]Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang:
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. ACISP 2011: 61-74 - [c21]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ACISP 2011: 433-438 - [i2]Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. IACR Cryptol. ePrint Arch. 2011: 201 (2011)
2000 – 2009
- 2008
- [p1]Hongjun Wu:
The Stream Cipher HC-128. The eSTREAM Finalists 2008: 39-47 - 2007
- [c20]Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel:
MAME: A Compression Function with Reduced Hardware Requirements. CHES 2007: 148-165 - [c19]Hongjun Wu, Bart Preneel:
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. EUROCRYPT 2007: 276-290 - [c18]Hongjun Wu, Bart Preneel:
Differential-Linear Attacks Against the Stream Cipher Phelix. FSE 2007: 87-100 - 2006
- [c17]Hongjun Wu, Bart Preneel:
Cryptanalysis of the Stream Cipher DECIM. FSE 2006: 30-40 - [c16]Hongjun Wu, Bart Preneel:
Resynchronization Attacks on WG and LEX. FSE 2006: 422-432 - [c15]Hongjun Wu, Bart Preneel:
Cryptanalysis of the Stream Cipher ABC v2. Selected Areas in Cryptography 2006: 56-66 - 2005
- [c14]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 - [c13]Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang:
Weaknesses of COSvd (2, 128) Stream Cipher. ICISC 2005: 270-283 - 2004
- [c12]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 - [c11]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 - [c10]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 - 2003
- [c9]Hongjun Wu, Feng Bao, Robert H. Deng:
An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 - 2002
- [j1]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3) (2002) - [c8]Hongjun Wu, Feng Bao:
Cryptanalysis of Stream Cipher COS(2, 128) Mode I. ACISP 2002: 154-158 - [i1]Hongjun Wu, Feng Bao:
Cryptanalysis of Stream Cipher COS (2, 128) Mode I. IACR Cryptol. ePrint Arch. 2002: 5 (2002) - 2001
- [c7]Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 - [c6]Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu:
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 - [c5]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 - 2000
- [c4]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 - [c3]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288
1990 – 1999
- 1998
- [c2]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 - [c1]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint