What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dengguo Feng
Google Scholar
89
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption.
Yu Fu
Yu Tong
Yijing Ning
Tianshi Xu
Meng Li
Jingqiang Lin
Dengguo Feng
2025
conf/ndss
Revisiting EM-based Estimation for Locally Differentially Private Protocols.
Yutong Ye
Tianhao Wang
Min Zhang
Dengguo Feng
2025
journals/tifs
SGBoost<sup>+</sup>: Efficient and Privacy-Preserving Vertical Boosting Trees for Federated Outsourced Training and Inference.
Wei Xu
Hui Zhu
Jiaqi Zhao
Yandong Zheng
Fengwei Wang
Baishun Sun
Songnian Zhang
Dengguo Feng
2025
conf/esorics
Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure.
Jialin Chi
Cheng Hong
Axin Wu
Tianqi Sun
ZheChen Li
Min Zhang
Dengguo Feng
2025
conf/uss
Enhanced Label-Only Membership Inference Attacks with Fewer Queries.
Hao Li
Zheng Li
Siyuan Wu
Yutong Ye
Min Zhang
Dengguo Feng
Yang Zhang
2024
journals/tifs
ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE.
Wei Xu
Hui Zhu
Yandong Zheng
Fengwei Wang
Jiafeng Hua
Dengguo Feng
Hui Li
2024
conf/ccs
SeqMIA: Sequential-Metric Based Membership Inference Attack.
Hao Li
Zheng Li
Siyuan Wu
Chengrui Hu
Yutong Ye
Min Zhang
Dengguo Feng
Yang Zhang
2024
conf/asiacrypt
NTRU-Based Bootstrapping for MK-FHEs Without Using Overstretched Parameters.
Binwu Xiang
Jiang Zhang
Kaixing Wang
Yi Deng
Dengguo Feng
2023
conf/crypto
Fast Blind Rotation for Bootstrapping FHEs.
Binwu Xiang
Jiang Zhang
Yi Deng
Yiran Dai
Dengguo Feng
2023
conf/asiacrypt
NEV: Faster and Smaller NTRU Encryption Using Vector Decoding.
Jiang Zhang
Dengguo Feng
Di Yan
2022
journals/tosc
Practical Attacks on Full-round FRIET.
Senpeng Wang
Dengguo Feng
Bin Hu
Jie Guan
Tairong Shi
2022
journals/tosc
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a.
Zhaocun Zhou
Dengguo Feng
Bin Zhang
2021
conf/ctrsa
FAN: A Lightweight Authenticated Cryptographic Algorithm.
Lin Jiao
Dengguo Feng
Yonglin Hao
Xinxin Gong
Shaoyu Du
2020
journals/istr
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine.
Mimi Ma
Shuqin Fan
Dengguo Feng
2020
journals/istr
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
Mimi Ma
Debiao He
Shuqin Fan
Dengguo Feng
2019
conf/ccs
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Shijun Zhao
Qianying Zhang
Yu Qin
Wei Feng
Dengguo Feng
2018
journals/joc
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking.
Bin Zhang
Chao Xu
Dengguo Feng
2017
conf/uss
Towards Efficient Heap Overflow Discovery.
Xiangkun Jia
Chao Zhang
Purui Su
Yi Yang
Huafeng Huang
Dengguo Feng
2017
conf/icics
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Weijin Wang
Jingbin Liu
Yu Qin
Dengguo Feng
2017
conf/dsn
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Yacong Gu
Kun Sun
Purui Su
Qi Li
Yemian Lu
Lingyun Ying
Dengguo Feng
2017
conf/cans
Secure Code Updates for Smart Embedded Devices Based on PUFs.
Wei Feng
Yu Qin
Shijun Zhao
Ziwen Liu
XiaoBo Chu
Dengguo Feng
2016
conf/ccs
Attacks and Defence on Android Free Floating Windows.
Lingyun Ying
Yao Cheng
Yemian Lu
Yacong Gu
Purui Su
Dengguo Feng
2016
conf/sp
Multiple Handshakes Security of TLS 1.3 Candidates.
Xinyu Li
Jing Xu
Zhenfeng Zhang
Dengguo Feng
Honggang Hu
2016
conf/icisc
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Jingyi Feng
Hua Chen
Si Gao
Limin Fan
Dengguo Feng
2016
conf/icics
Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Weijin Wang
Yu Qin
Bo Yang
Yingjun Zhang
Dengguo Feng
2015
conf/ccs
Formal Analysis of Enhanced Authorization in the TPM 2.0.
Jianxiong Shao
Yu Qin
Dengguo Feng
Weijin Wang
2015
conf/icics
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Rong Wang
Min Zhang
Dengguo Feng
Yanyan Fu
Zhenyu Chen
2015
conf/icics
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
Bo Yang
Yu Qin
Yingjun Zhang
Weijin Wang
Dengguo Feng
2015
conf/acsac
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries.
Minghua Wang
Heng Yin
Abhishek Vasisht Bhaskar
Purui Su
Dengguo Feng
2014
journals/compsec
Evaluating and comparing the quality of access control in different operating systems.
Liang Cheng
Yang Zhang
Zhihui Han
Yi Deng
Xiaoshan Sun
Dengguo Feng
2014
conf/ccs
Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Shijun Zhao
Qianying Zhang
Guangyao Hu
Yu Qin
Dengguo Feng
2014
conf/acisp
ExBLACR: Extending BLACR System.
Weijin Wang
Dengguo Feng
Yu Qin
Jianxiong Shao
Li Xi
XiaoBo Chu
2014
conf/icisc
A Clustering Approach for Privacy-Preserving in Social Networks.
Rong Wang
Min Zhang
Dengguo Feng
Yanyan Fu
2014
conf/icics
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Qianying Zhang
Shijun Zhao
Li Xi
Wei Feng
Dengguo Feng
2013
conf/fse
Near Collision Attack on the Grain v1 Stream Cipher.
Bin Zhang
Zhenqi Li
Dengguo Feng
Dongdai Lin
2013
conf/ccs
Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Yao Cheng
Lingyun Ying
Sibei Jiao
Purui Su
Dengguo Feng
2013
conf/acisp
Cryptanalysis of Helix and Phelix Revisited.
Zhenqing Shi
Bin Zhang
Dengguo Feng
2013
conf/crypto
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract).
Bin Zhang
Chao Xu
Dengguo Feng
2013
conf/icics
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks.
Liang He
Dengguo Feng
Purui Su
Lingyun Ying
Yi Yang
Huafeng Huang
Huipeng Fang
2013
conf/icics
Type-Based Analysis of Protected Storage in the TPM.
Jianxiong Shao
Dengguo Feng
Yu Qin
2013
conf/ctrsa
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
San Ling
Huaxiong Wang
2012
conf/fse
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Shuang Wu
Dengguo Feng
Wenling Wu
Jian Guo
Le Dong
Jian Zou
2012
conf/acns
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Wentao Zhang
Bozhan Su
Wenling Wu
Dengguo Feng
Chuankun Wu
2012
conf/icisc
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha.
Zhenqing Shi
Bin Zhang
Dengguo Feng
Wenling Wu
2012
conf/provsec
Combined Public-Key Schemes: The Case of ABE and ABS.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
2012
conf/provsec
Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Cheng Chen
Zhenfeng Zhang
Dengguo Feng
2012
conf/icics
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography.
Yan Zhang
Dengguo Feng
2012
conf/cans
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Zhenqing Shi
Xiutao Feng
Dengguo Feng
Chuankun Wu
2011
conf/icisc
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks.
Hailong Zhang
Yongbin Zhou
Dengguo Feng
2011
conf/ih
Video Steganography with Perturbed Motion Estimation.
Yun Cao
Xianfeng Zhao
Dengguo Feng
Rennong Sheng
2011
conf/provsec
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Cheng Chen
Zhenfeng Zhang
Dengguo Feng
2011
conf/icics
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Jun Jiang
Xiaoqi Jia
Dengguo Feng
Shengzhi Zhang
Peng Liu
2011
conf/asiacrypt
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Yi Deng
Dengguo Feng
Vipul Goyal
Dongdai Lin
Amit Sahai
Moti Yung
2011
conf/cans
Comments on the SM2 Key Exchange Protocol.
Jing Xu
Dengguo Feng
2011
conf/cans
Towards Attribute Revocation in Key-Policy Attribute Based Encryption.
Pengpian Wang
Dengguo Feng
Liwu Zhang
2010
conf/asiacrypt
A Byte-Based Guess and Determine Attack on SOSEMANUK.
Xiutao Feng
Jun Liu
Zhaocun Zhou
Chuankun Wu
Dengguo Feng
2009
conf/icisc
Practical Rebound Attack on 12-Round Cheetah-256.
Shuang Wu
Dengguo Feng
Wenling Wu
2009
conf/icics
Bring Efficient Connotation Expressible Policies to Trust Management.
Yan Zhang
Zhengde Zhai
Dengguo Feng
2009
conf/sacrypt
Cryptanalysis of the LANE Hash Function.
Shuang Wu
Dengguo Feng
Wenling Wu
2008
conf/acisp
On the Unprovable Security of 2-Key XCBC.
Peng Wang
Dengguo Feng
Wenling Wu
Liting Zhang
2008
conf/sacrypt
An Improved Fast Correlation Attack on Stream Ciphers.
Bin Zhang
Dengguo Feng
2007
conf/icisc
New Results on Impossible Differential Cryptanalysis of Reduced AES.
Wentao Zhang
Wenling Wu
Dengguo Feng
2007
conf/icics
Differential Fault Analysis on CLEFIA.
Hua Chen
Wenling Wu
Dengguo Feng
2007
conf/icics
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions.
Rui Xue
Dengguo Feng
2006
conf/acns
Certificateless Public-Key Signature: Security Model and Efficient Construction.
Zhenfeng Zhang
Duncan S. Wong
Jing Xu
Dengguo Feng
2006
conf/asiacrypt
New Guess-and-Determine Attack on the Self-Shrinking Generator.
Bin Zhang
Dengguo Feng
2006
conf/sacrypt
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.
Wentao Zhang
Wenling Wu
Lei Zhang
Dengguo Feng
2006
conf/sacrypt
Multi-pass Fast Correlation Attack on Stream Ciphers.
Bin Zhang
Dengguo Feng
2005
conf/icisc
Weaknesses of COSvd (2, 128) Stream Cipher.
Bin Zhang
Hongjun Wu
Dengguo Feng
Hong Wang
2005
conf/icisc
Integral Cryptanalysis of Reduced FOX Block Cipher.
Wenling Wu
Wentao Zhang
Dengguo Feng
2005
conf/icics
Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Zhenfeng Zhang
Dengguo Feng
Jing Xu
Yongbin Zhou
2005
conf/ctrsa
A Fast Correlation Attack on the Shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2005
conf/eurocrypt
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Xiaoyun Wang
Xuejia Lai
Dengguo Feng
Hui Chen
Xiuyuan Yu
2005
conf/cans
ID-Based Aggregate Signatures from Bilinear Pairings.
Jing Xu
Zhenfeng Zhang
Dengguo Feng
2005
conf/cans
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery.
Zhenfeng Zhang
Jing Xu
Dengguo Feng
2004
conf/acns
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/icisc
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes.
Hua Chen
Dengguo Feng
2004
conf/wisa
A Ring Signature Scheme Using Bilinear Pairings.
Jing Xu
Zhenfeng Zhang
Dengguo Feng
2004
conf/wisa
A New k-Anonymous Message Transmission Protocol.
Gang Yao
Dengguo Feng
2004
conf/icics
Security Analysis of the Generalized Self-shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/sacrypt
Collision Attack and Pseudorandomness of Reduced-Round Camellia.
Wenling Wu
Dengguo Feng
Hua Chen
2003
conf/ccs
ARECA: a highly attack resilient certification authority.
Jiwu Jing
Peng Liu
Dengguo Feng
Ji Xiang
Neng Gao
Jingqiang Lin
2003
conf/acns
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Gang Yao
Kui Ren
Feng Bao
Robert H. Deng
Dengguo Feng
2003
conf/icics
UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Zhen Xu
Dengguo Feng
Lan Li
Hua Chen
2000
conf/sec
A Simple Algorithm for Computing Several Sequences Synthesis.
Mingsheng Wang
Sihan Qing
Dengguo Feng
2000
conf/sec
Power Analysis of RC6 and Serpent.
Wenling Wu
Dengguo Feng
Sihan Qing
2000
conf/sec
Analysis and Design of E-voting Protocol.
Shaoquan Jiang
Dengguo Feng
Sihan Qing
2000
conf/sec
The Defense Framework for Large-scale Computer Network System.
Jianchun Jiang
Weifeng Chen
Sihan Qing
Dengguo Feng
1999
conf/icics
Cryptanalysis of some AES Candidate Algorithms.
Wenling Wu
Bao Li
Dengguo Feng
Sihan Qing
Coauthors
Abhishek Vasisht Bhaskar
(1)
Amit Sahai
(1)
Axin Wu
(1)
Baishun Sun
(1)
Bao Li
(1)
Bin Hu
(1)
Bin Zhang
(13)
Binwu Xiang
(2)
Bo Yang
(2)
Bozhan Su
(1)
Chao Xu
(2)
Chao Zhang
(1)
Cheng Chen
(4)
Cheng Hong
(1)
Chengrui Hu
(1)
Chuankun Wu
(3)
Debiao He
(1)
Dengguo Feng
(89)
Di Yan
(1)
Dongdai Lin
(2)
Duncan S. Wong
(1)
Feng Bao
(4)
Fengwei Wang
(2)
Gang Yao
(2)
Guangyao Hu
(1)
Hailong Zhang
(1)
Hao Li
(1)
Hao Li
(1)
Heng Yin
(1)
Hong Wang
(1)
Honggang Hu
(1)
Hongjun Wu
(4)
Hoon Wei Lim
(2)
Hua Chen
(5)
Huafeng Huang
(2)
Huaxiong Wang
(1)
Hui Chen
(1)
Hui Li
(1)
Hui Zhu
(2)
Huipeng Fang
(1)
Ji Xiang
(1)
Jiafeng Hua
(1)
Jialin Chi
(1)
Jian Guo
(1)
Jian Zou
(1)
Jianchun Jiang
(1)
Jiang Zhang
(3)
Jianxiong Shao
(3)
Jiaqi Zhao
(1)
Jie Chen
(2)
Jie Guan
(1)
Jing Xu
(7)
Jingbin Liu
(1)
Jingqiang Lin
(2)
Jingyi Feng
(1)
Jiwu Jing
(1)
Jun Jiang
(1)
Jun Liu
(1)
Kaixing Wang
(1)
Kui Ren
(1)
Kun Sun
(1)
Lan Li
(1)
Le Dong
(1)
Lei Zhang
(1)
Li Xi
(2)
Liang Cheng
(1)
Liang He
(1)
Limin Fan
(1)
Lin Jiao
(1)
Lingyun Ying
(4)
Liting Zhang
(1)
Liwu Zhang
(1)
Meng Li
(1)
Mimi Ma
(2)
Min Zhang
(6)
Minghua Wang
(1)
Mingsheng Wang
(1)
Moti Yung
(1)
Neng Gao
(1)
Peng Liu
(2)
Peng Wang
(1)
Pengpian Wang
(1)
Purui Su
(6)
Qi Li
(1)
Qianying Zhang
(3)
Rennong Sheng
(1)
Robert H. Deng
(1)
Rong Wang
(2)
Rui Xue
(1)
San Ling
(1)
Senpeng Wang
(1)
Shaoquan Jiang
(1)
Shaoyu Du
(1)
Shengzhi Zhang
(1)
Shijun Zhao
(4)
Shuang Wu
(3)
Shuqin Fan
(2)
Si Gao
(1)
Sibei Jiao
(1)
Sihan Qing
(5)
Siyuan Wu
(2)
Songnian Zhang
(1)
Tairong Shi
(1)
Tianhao Wang
(1)
Tianqi Sun
(1)
Tianshi Xu
(1)
Vipul Goyal
(1)
Wei Feng
(3)
Wei Xu
(2)
Weifeng Chen
(1)
Weijin Wang
(5)
Wenling Wu
(13)
Wentao Zhang
(4)
Xianfeng Zhao
(1)
Xiangkun Jia
(1)
XiaoBo Chu
(2)
Xiaoqi Jia
(1)
Xiaoshan Sun
(1)
Xiaoyun Wang
(1)
Xinxin Gong
(1)
Xinyu Li
(1)
Xiutao Feng
(2)
Xiuyuan Yu
(1)
Xuejia Lai
(1)
Yacong Gu
(2)
Yan Zhang
(2)
Yandong Zheng
(2)
Yang Zhang
(2)
Yang Zhang
(1)
Yanyan Fu
(2)
Yao Cheng
(2)
Yemian Lu
(2)
Yi Deng
(4)
Yi Yang
(2)
Yijing Ning
(1)
Yingjun Zhang
(2)
Yiran Dai
(1)
Yongbin Zhou
(2)
Yonglin Hao
(1)
Yu Fu
(1)
Yu Qin
(9)
Yu Tong
(1)
Yun Cao
(1)
Yutong Ye
(3)
Zhaocun Zhou
(2)
ZheChen Li
(1)
Zhen Xu
(1)
Zhenfeng Zhang
(10)
Zheng Li
(2)
Zhengde Zhai
(1)
Zhenqi Li
(1)
Zhenqing Shi
(3)
Zhenyu Chen
(1)
Zhihui Han
(1)
Ziwen Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to