The hash function JH H Wu Submission to NIST (round 3) 6, 2011 | 258* | 2011 |
The stream cipher HC-128 H Wu New Stream Cipher Designs: The eSTREAM Finalists, 39-47, 2008 | 196 | 2008 |
AEGIS: A fast authenticated encryption algorithm H Wu, B Preneel Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014 | 166 | 2014 |
Multi-authority attribute-based keyword search over encrypted cloud data Y Miao, RH Deng, X Liu, KKR Choo, H Wu, H Li IEEE Transactions on Dependable and Secure Computing 18 (4), 1667-1680, 2019 | 124 | 2019 |
ACORN: a lightweight authenticated cipher (v3) H Wu Candidate for the CAESAR Competition 2016, 2016 | 118 | 2016 |
A new stream cipher HC-256 H Wu Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi …, 2004 | 105 | 2004 |
Improving the biclique cryptanalysis of AES B Tao, H Wu Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 72 | 2015 |
Hybrid keyword-field search with efficient key management for industrial internet of things Y Miao, X Liu, RH Deng, H Wu, H Li, J Li, D Wu IEEE Transactions on Industrial Informatics 15 (6), 3206-3217, 2018 | 69 | 2018 |
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) L Wei, C Rechberger, J Guo, H Wu, H Wang, S Ling Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011 | 68 | 2011 |
Differential attacks against stream cipher ZUC H Wu, T Huang, PH Nguyen, H Wang, S Ling International Conference on the Theory and Application of Cryptology and …, 2012 | 67* | 2012 |
Efficient and secure encryption schemes for JPEG2000 H Wu, D Ma 2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004 | 67 | 2004 |
Fair and dynamic data sharing framework in cloud-assisted internet of everything Y Miao, X Liu, KKR Choo, RH Deng, H Wu, H Li IEEE Internet of Things Journal 6 (4), 7201-7212, 2019 | 63 | 2019 |
The misuse of RC4 in Microsoft Word and Excel H Wu Cryptology ePrint Archive, 2005 | 60 | 2005 |
The authenticated cipher MORUS (v2) H Wu, T Huang CAESAR submission, 2014 | 53 | 2014 |
Differential cryptanalysis of the stream ciphers Py, Py6 and Pypy H Wu, B Preneel Advances in Cryptology-EUROCRYPT 2007, 276-290, 2007 | 52 | 2007 |
Resynchronization Attacks on WG and LEX H Wu, B Preneel International Workshop on Fast Software Encryption, 422-432, 2006 | 48 | 2006 |
Differential-linear attacks against the stream cipher Phelix H Wu, B Preneel International Workshop on Fast Software Encryption, 87-100, 2007 | 46 | 2007 |
MAME: A compression function with reduced hardware requirements H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007 | 46 | 2007 |
TinyJAMBU: A family of lightweight authenticated encryption algorithms H Wu, T Huang Submission to the NIST Lightweight Cryptography Standardization Process …, 2019 | 44 | 2019 |
SenSec: Sensor security framework for TinyOS T Li, H Wu, X Wang, F Bao INSS’05: Proceedings of the Second International Workshop on Networked …, 2005 | 44* | 2005 |