Takip et
Jingwei HU
Jingwei HU
Diğer adlar胡经纬
Postdoctoral Research Fellow, Nanyang Technological University
ntu.edu.sg üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Fast and Generic Inversion Architectures Over GF(2m) Using Modified Itoh–Tsujii Algorithms
J Hu, W Guo, J Wei, RCC Cheung
IEEE Transactions on Circuits and Systems II: Express Briefs 62 (4), 367-371, 2015
422015
Optimized polynomial multiplier over commutative rings on FPGAs: A case study on BIKE
J Hu, W Wang, RCC Cheung, H Wang
2019 International Conference on Field-Programmable Technology (ICFPT), 231-234, 2019
262019
Area-time efficient computation of niederreiter encryption on qc-mdpc codes for embedded hardware
J Hu, RCC Cheung
IEEE Transactions on Computers 66 (8), 1313-1325, 2017
252017
Lightweight key encapsulation using LDPC codes on FPGAs
J Hu, M Baldi, P Santini, N Zeng, S Ling, H Wang
IEEE Transactions on Computers 69 (3), 327-341, 2019
182019
Fully homomorphic encryption-based protocols for enhanced private set intersection functionalities
J Hu, J Chen, W Dai, H Wang
Cryptology ePrint Archive, 2023
82023
Compact constant weight coding engines for the code-based cryptography
J Hu, RCC Cheung, T Güneysu
IEEE Transactions on Circuits and Systems II: Express Briefs 64 (9), 1092-1096, 2017
82017
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
J Hu, RCC Cheung
82016
Toward practical code-based signature: Implementing fast and compact QC-LDGM signature scheme on embedded hardware
J Hu, RCC Cheung
IEEE Transactions on Circuits and Systems I: Regular Papers 64 (8), 2086-2097, 2017
72017
A novel architecture for fast RSA key generation based on RNS
J Hu, W Guo, J Wei, Y Chang, D Sun
2011 Fourth International Symposium on Parallel Architectures, Algorithms …, 2011
72011
Enabling threshold functionality for private set intersection protocols in cloud computing
J Hu, Y Zhao, BHM Tan, KMM Aung, H Wang
IEEE Transactions on Information Forensics and Security, 2024
42024
Compact code-based signature for reconfigurable devices with side channel resilience
J Hu, Y Liu, RCC Cheung, S Bhasin, S Ling, H Wang
IEEE Transactions on Circuits and Systems I: Regular Papers 67 (7), 2305-2316, 2020
32020
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO
J Hu, W Wang, K Gaj, L Wang, H Wang
IEEE Transactions on Computers 72 (7), 2094-2110, 2022
22022
Two new module-code-based KEMs with rank metric
LP Wang, J Hu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
22019
Efficient Unbalanced Quorum PSI from Homomorphic Encryption
X Yang, L Cai, Y Wang, K Yin, L Sun, J Hu
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
12024
Universal Gaussian elimination hardware for cryptographic purposes
J Hu, W Wang, K Gaj, D Chen, H Wang
Journal of Cryptographic Engineering 14 (2), 383-397, 2024
12024
Number-theoretic transform architecture for fully homomorphic encryption from hypercube topology
J Hu, Y Fang, W Dai
Cryptology ePrint Archive, 2024
12024
Check for updates Two New Module-Code-Based KEMS with Rank Metric
LP Wang, J Hu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
2019
A scalable RNS Montgomery multiplier over F2m
J Hu, W Guo, J Wei, RCC Cheung
IEICE Electronics Express 10 (23), 20130704-20130704, 2013
2013
A TTA-like Processor for Fast RSA Key Generation Using RNS.
W Guo, J Hu, J Wei
J. Comput. 8 (1), 33-40, 2013
2013
Efficient Threshold Private Set Intersection via BFV Fully Homomorphic Encryptions
J Hu, W Dai
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20