default search action
Chunhua Su
- > Home > Persons > Chunhua Su
Publications
- 2022
- [j71]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - 2019
- [j43]Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. Comput. Secur. 80: 14-24 (2019) - [j35]Jiageng Chen, Chunhua Su, Zheng Yan:
AI-Driven Cyber Security Analytics and Privacy Protection. Secur. Commun. Networks 2019: 1859143:1-1859143:2 (2019) - 2018
- [j23]Jiageng Chen, Chunhua Su, Kuo-Hui Yeh, Moti Yung:
Special Issue on Advanced Persistent Threat. Future Gener. Comput. Syst. 79: 243-246 (2018) - 2017
- [j17]Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Variable message encryption through blockcipher compression function. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j14]Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. J. Inf. Secur. Appl. 34: 205-206 (2017) - [j12]Jiageng Chen, Jesen Teh, Zhe Liu, Chunhua Su, Azman Samsudin, Yang Xiang:
Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks. IEEE Trans. Computers 66(10): 1763-1777 (2017) - [c29]Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han:
Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). ISPEC 2017: 566-575 - 2016
- [c23]Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - [c20]Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94 - [e1]Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung:
Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings. Lecture Notes in Computer Science 9955, Springer 2016, ISBN 978-3-319-46297-4 [contents] - 2015
- [c16]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Inscrypt 2015: 108-124 - [c15]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh:
Improved Differential Characteristic Searching Methods. CSCloud 2015: 500-508 - [c13]Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao:
A New Statistical Approach for Integral Attack. NSS 2015: 345-356 - [c12]Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su:
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 17-24 - 2014
- [c10]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. ISPEC 2014: 373-387 - [c9]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. NSS 2014: 184-197 - [c8]Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ProvSec 2014: 103-116 - [i1]Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm. IACR Cryptol. ePrint Arch. 2014: 272 (2014)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint