Hummingbird: ultra-lightweight cryptography for resource-constrained devices D Engels, X Fan, G Gong, H Hu, EM Smith Financial Cryptography and Data Security, 3-18, 2010 | 189 | 2010 |
F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection C Miao, Z Tan, Q Chu, H Liu, H Hu, N Yu IEEE Transactions on Information Forensics and Security 18, 1039-1051, 2023 | 81 | 2023 |
A novel evaluation metric for deep learning-based side channel analysis and its extended application to imbalanced data J Zhang, M Zheng, J Nan, H Hu, N Yu IACR Transactions on Cryptographic Hardware and Embedded Systems, 73-96, 2020 | 72 | 2020 |
Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol D Engels, X Fan, G Gong, H Hu, EM Smith Centre for Applied Cryptographic Research (CACR) Technical Reports 29 (01), 2009 | 69 | 2009 |
Fruit-v2: ultra-lightweight stream cipher with shorter internal state VA Ghafari, H Hu, Y Chen Cryptology ePrint Archive, 2016 | 65 | 2016 |
On quadratic bent functions in polynomial forms H Hu, D Feng IEEE transactions on information theory 53 (7), 2610-2615, 2007 | 65 | 2007 |
New constructions of codebooks nearly meeting the Welch bound with equality H Hu, J Wu IEEE Transactions on Information Theory 60 (2), 1348-1355, 2013 | 62 | 2013 |
Fast discrete Fourier spectra attacks on stream ciphers G Gong, S Ronjom, T Helleseth, H Hu IEEE Transactions on Information Theory 57 (8), 5555-5565, 2011 | 59 | 2011 |
Fruit-80: a secure ultra-lightweight stream cipher for constrained environments V Amin Ghafari, H Hu Entropy 20 (3), 180, 2018 | 58 | 2018 |
Practical multi-keyword and boolean search over encrypted e-mail in cloud server P Xu, S Tang, P Xu, Q Wu, H Hu, W Susilo IEEE Transactions on Services Computing 14 (6), 1877-1889, 2019 | 53 | 2019 |
Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions H Hu, G Gong International Journal of Foundations of Computer Science 22 (06), 1317-1329, 2011 | 53 | 2011 |
New sets of zero or low correlation zone sequences via interleaving techniques H Hu, G Gong IEEE transactions on information theory 56 (4), 1702-1713, 2010 | 53 | 2010 |
On the-Adic Complexity and the-Error-Adic Complexity of Periodic Binary Sequences H Hu, D Feng IEEE transactions on information theory 54 (2), 874-883, 2008 | 52* | 2008 |
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers X Fan, H Hu, G Gong, EM Smith, D Engels 2009 International Conference for Internet Technology and Secured …, 2009 | 51 | 2009 |
Comments on “A new method to compute the 2-adic complexity of binary sequences” H Hu IEEE Transactions on Information Theory 60 (9), 5803-5804, 2014 | 49 | 2014 |
Multiple handshakes security of TLS 1.3 candidates X Li, J Xu, Z Zhang, D Feng, H Hu 2016 IEEE Symposium on Security and Privacy (SP), 486-505, 2016 | 47 | 2016 |
Homomorphic encryption-based reversible data hiding for 3D mesh models M Shah, W Zhang, H Hu, H Zhou, T Mahmood Arabian Journal for Science and Engineering 43, 8145-8157, 2018 | 42 | 2018 |
Floating-point multiplication timing attack on deep neural network G Dong, P Wang, P Chen, R Gu, H Hu 2019 IEEE International Conference on Smart Internet of Things (SmartIoT …, 2019 | 36 | 2019 |
On a class of pseudorandom sequences from elliptic curves over finite fields H Hu, L Hu, D Feng IEEE transactions on information theory 53 (7), 2598-2605, 2007 | 31 | 2007 |
Secure nonlocal denoising in outsourced images X Hu, W Zhang, K Li, H Hu, N Yu ACM Transactions on Multimedia Computing, Communications, and Applications …, 2016 | 28 | 2016 |