


default search action
Shuwang Lü
2020 – today
- 2021
- [i16]Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu:
A New Lever Function with Adequate Indeterminacy. CoRR abs/2108.13086 (2021) - [i15]Shenghui Su, Jianhua Zheng, Shuwang Lv:
A New Rational Approach to the Square Root of 5. CoRR abs/2108.13110 (2021) - [i14]Shenghui Su, Jianhua Zheng, Shuwang Lv:
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio. IACR Cryptol. ePrint Arch. 2021: 1129 (2021)
2010 – 2019
- 2019
- [c17]Shenghui Su, Xuewei Niu, Shuwang Lü:
Design of a Program Identification System for Preventing Malicious Codes. CIS 2019: 429-433 - 2017
- [c16]Shenghui Su, Jianhua Zheng, Shuwang Lü, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang
:
Idology and Its Applications in Public Security and Network Security. PAISI 2017: 129-149 - [i13]Shenghui Su, Shuwang Lü:
A Fast Asymmetric Cryptosystem Using Extra Superincreasing Sequences. CoRR abs/1709.01669 (2017) - 2016
- [j5]Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie:
A semantically secure public key cryptoscheme using bit-pair shadows. Theor. Comput. Sci. 654: 113-127 (2016) - [j4]Shenghui Su, Tao Xie, Shuwang Lü:
A provably secure non-iterative hash function resisting birthday attack. Theor. Comput. Sci. 654: 128-142 (2016) - [i12]Shenghui Su, Jianhua Zheng, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang, Jian Wang, Shuwang Lü:
Idology and Its Applications in Public Security and Network Security. CoRR abs/1609.05601 (2016) - 2015
- [c15]Shenghui Su, Tao Xie, Shuwang Lü:
A New Non-Merkle-Damgård Structural Hash Function with Provable Security. COCOON 2015: 661-673 - [c14]Shenghui Su, Shuwang Lü, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security. COCOON 2015: 674-686 - [c13]Shenghui Su, Na Li, Shuwang Lü:
Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities. PAISI 2015: 82-90 - 2014
- [i11]Shenghui Su, Tao Xie, Shuwang Lü:
A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. CoRR abs/1408.5999 (2014) - [i10]Shenghui Su, Shuwang Lü, Xiubin Fan, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes. CoRR abs/1408.6226 (2014) - [i9]Shenghui Su, Shuwang Lü:
A 128-bit Block Cipher Based on Three Group Arithmetics. IACR Cryptol. ePrint Arch. 2014: 704 (2014) - 2013
- [c12]Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lü:
Public Key Timed-Release Searchable Encryption. EIDWT 2013: 241-248 - [c11]Ke Yuan, Zheli Liu, Chunfu Jia, Jun Yang, Shuwang Lv:
Multi-user Public Key Timed-Release Searchable Encryption. EIDWT 2013: 363-370 - [i8]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Lever Function to a New Codomain with Adequate Indeterminacy. IACR Cryptol. ePrint Arch. 2013: 246 (2013) - [i7]Shenghui Su, Tao Xie, Shuwang Lü:
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. IACR Cryptol. ePrint Arch. 2013: 327 (2013) - [i6]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Public Key Cryptoscheme Using the Bit-pair Method. IACR Cryptol. ePrint Arch. 2013: 394 (2013) - 2012
- [j3]Shenghui Su, Shuwang Lü:
A public key cryptosystem based on three new provable problems. Theor. Comput. Sci. 426: 91-117 (2012) - 2011
- [j2]Shenghui Su, Shuwang Lü, Xiubin Fan:
Asymptotic granularity reduction and its application. Theor. Comput. Sci. 412(39): 5374-5386 (2011) - [i5]Shenghui Su, Shuwang Lü, Xinbin Fan:
Asymptotic Granularity Reduction and Its Application. CoRR abs/1106.0108 (2011)
2000 – 2009
- 2009
- [c10]Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang:
Research on Model of Trust Degrees for PKI. IAS 2009: 647-650 - [i4]Shenghui Su, Shuwang Lü:
REESSE1+ . Reward . Proof by Experiment. CoRR abs/0908.0482 (2009) - 2008
- [c9]Qi Liu, Yin Zhang, Cheng Chen, Shuwang Lv:
Construction and Counting Orthomorphism Based on Transversal. CIS (2) 2008: 369-373 - [c8]Leyi Shi, Chunfu Jia, Shuwang Lü:
Full Service Hopping for Proactive Cyber-Defense. ICNSC 2008: 1337-1342 - 2007
- [c7]Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher. ACISP 2007: 158-170 - [c6]Shenghui Su, Shuwang Lv:
To Solve the High Degree Congruence. CIS 2007: 672-676 - [c5]Leyi Shi, Chunfu Jia, Shuwang Lü, Zhenhua Liu:
Port and Address Hopping for Active Cyber-Defense. PAISI 2007: 295-300 - [i3]Shenghui Su, Shuwang Lv:
Refuting the Pseudo Attack on the REESSE1+ Cryptosystem. CoRR abs/0704.0492 (2007) - [i2]Shenghui Su, Shuwang Lü:
The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem. CoRR abs/cs/0702046 (2007) - 2006
- [c4]Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen:
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. EUC Workshops 2006: 342-351 - [i1]Shenghui Su, Shuwang Lü:
The REESSE1+ Public Key Cryptosystem v2.2. IACR Cryptol. ePrint Arch. 2006: 420 (2006) - 2005
- [j1]Yujing Guan, Shuwang Lü, Yuan Yan Tang:
Characterization of compactly supported refinable splines whose shifts form a Riesz basis. J. Approx. Theory 133(2): 245-250 (2005) - 2003
- [c3]Yan Wang, Shuwang Lü, Zhenhua Liu:
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. ICICS 2003: 260-268 - 2002
- [c2]Yan Wang, Shuwang Lü, Zhenhua Liu:
A new asymmetric fingerprinting framework based on secret sharing. Communications and Multimedia Security 2002: 29-40 - 2001
- [c1]Jie-lü Xu, Hanliang Xu, Yan Wang, Shuwang Lü:
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions. ICICS 2001: 214-220

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint