Fast and Generic Inversion Architectures Over GF(2m) Using Modified Itoh–Tsujii Algorithms J Hu, W Guo, J Wei, RCC Cheung IEEE Transactions on Circuits and Systems II: Express Briefs 62 (4), 367-371, 2015 | 41 | 2015 |
Area-time efficient computation of niederreiter encryption on qc-mdpc codes for embedded hardware J Hu, RCC Cheung IEEE Transactions on Computers 66 (8), 1313-1325, 2017 | 22 | 2017 |
Optimized polynomial multiplier over commutative rings on FPGAs: A case study on BIKE J Hu, W Wang, RCC Cheung, H Wang 2019 International Conference on Field-Programmable Technology (ICFPT), 231-234, 2019 | 20 | 2019 |
Lightweight key encapsulation using LDPC codes on FPGAs J Hu, M Baldi, P Santini, N Zeng, S Ling, H Wang IEEE Transactions on Computers 69 (3), 327-341, 2019 | 16 | 2019 |
Compact constant weight coding engines for the code-based cryptography J Hu, RCC Cheung, T Güneysu IEEE Transactions on Circuits and Systems II: Express Briefs 64 (9), 1092-1096, 2017 | 7 | 2017 |
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem J Hu, RCC Cheung | 7 | 2016 |
Toward practical code-based signature: Implementing fast and compact QC-LDGM signature scheme on embedded hardware J Hu, RCC Cheung IEEE Transactions on Circuits and Systems I: Regular Papers 64 (8), 2086-2097, 2017 | 6 | 2017 |
A novel architecture for fast RSA key generation based on RNS J Hu, W Guo, J Wei, Y Chang, D Sun 2011 Fourth International Symposium on Parallel Architectures, Algorithms …, 2011 | 6 | 2011 |
Fully homomorphic encryption-based protocols for enhanced private set intersection functionalities J Hu, J Chen, W Dai, H Wang Cryptology ePrint Archive, 2023 | 2 | 2023 |
Two New Module-Code-Based KEMs with Rank Metric LP Wang, J Hu Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 2 | 2019 |
Universal Gaussian elimination hardware for cryptographic purposes J Hu, W Wang, K Gaj, D Chen, H Wang Journal of Cryptographic Engineering, 1-15, 2024 | 1 | 2024 |
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology J Hu, Y Fang, W Dai Cryptology ePrint Archive, 2024 | 1 | 2024 |
Compact code-based signature for reconfigurable devices with side channel resilience J Hu, Y Liu, RCC Cheung, S Bhasin, S Ling, H Wang IEEE Transactions on Circuits and Systems I: Regular Papers 67 (7), 2305-2316, 2020 | 1 | 2020 |
Efficient Unbalanced Quorum PSI from Homomorphic Encryption X Yang, L Cai, Y Wang, K Yin, L Sun, J Hu Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing J Hu, Y Zhao, BHM Tan, KMM Aung, H Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO J Hu, W Wang, K Gaj, L Wang, H Wang IEEE Transactions on Computers 72 (7), 2094-2110, 2022 | | 2022 |
Check for updates Two New Module-Code-Based KEMS with Rank Metric LP Wang, J Hu Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | | 2019 |
A scalable RNS Montgomery multiplier over F2m J Hu, W Guo, J Wei, RCC Cheung IEICE Electronics Express 10 (23), 20130704-20130704, 2013 | | 2013 |
A TTA-like Processor for Fast RSA Key Generation Using RNS. W Guo, J Hu, J Wei J. Comput. 8 (1), 33-40, 2013 | | 2013 |