default search action
Shenghui Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i20]Shenghui Su, Ping Luo:
Time Complexities of Multiple-precision Modular Operations and Related Ratios. IACR Cryptol. ePrint Arch. 2023: 596 (2023) - 2021
- [i19]Shenghui Su, Ping Luo, Shuwang Lv, Maozhi Xu:
A New Lever Function with Adequate Indeterminacy. CoRR abs/2108.13086 (2021) - [i18]Shenghui Su, Jianhua Zheng, Shuwang Lv:
A New Rational Approach to the Square Root of 5. CoRR abs/2108.13110 (2021) - [i17]Shenghui Su, Jianhua Zheng, Shuwang Lv:
Beauty of Cryptography: the Cryptographic Sequences and the Golden Ratio. IACR Cryptol. ePrint Arch. 2021: 1129 (2021)
2010 – 2019
- 2019
- [c21]Shenghui Su, Xuewei Niu, Shuwang Lü:
Design of a Program Identification System for Preventing Malicious Codes. CIS 2019: 429-433 - [c20]Kaige Yang, Shenghui Su:
Secure Email Login Based on Lightweight Asymmetric Identities. ICCNS 2019: 25-29 - [c19]Qingqing Chang, Shenghui Su:
Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping. ICCNS 2019: 34-39 - 2018
- [i16]Shenghui Su, Jianhua Zheng:
The Multiphoton Boson Sampling Machine Doesn't Beat Early Classical Computers for Five-boson Sampling. CoRR abs/1802.02779 (2018) - 2017
- [c18]Shenghui Su, Jianhua Zheng, Shuwang Lü, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang:
Idology and Its Applications in Public Security and Network Security. PAISI 2017: 129-149 - [i15]Shenghui Su, Shuwang Lü:
A Fast Asymmetric Cryptosystem Using Extra Superincreasing Sequences. CoRR abs/1709.01669 (2017) - 2016
- [j4]Shenghui Su, Shuwang Lü, Maozhi Xu, Tao Xie:
A semantically secure public key cryptoscheme using bit-pair shadows. Theor. Comput. Sci. 654: 113-127 (2016) - [j3]Shenghui Su, Tao Xie, Shuwang Lü:
A provably secure non-iterative hash function resisting birthday attack. Theor. Comput. Sci. 654: 128-142 (2016) - [i14]Shenghui Su, Jianhua Zheng, Zhiqiu Huang, Zhoujun Li, Zhenmin Tang, Jian Wang, Shuwang Lü:
Idology and Its Applications in Public Security and Network Security. CoRR abs/1609.05601 (2016) - 2015
- [c17]Shifeng Zhang, Shenghui Su:
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs. CIS 2015: 335-339 - [c16]Shenghui Su, Tao Xie, Shuwang Lü:
A New Non-Merkle-Damgård Structural Hash Function with Provable Security. COCOON 2015: 661-673 - [c15]Shenghui Su, Shuwang Lü, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security. COCOON 2015: 674-686 - [c14]Shenghui Su, Na Li, Shuwang Lü:
Drug Anti-forgery and Tracing System Based on Lightweight Asymmetric Identities. PAISI 2015: 82-90 - 2014
- [c13]Yi Tang, Shenghui Su:
Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm Problem. CIS 2014: 445-449 - [c12]Guodong Sun, Shenghui Su, Maozhi Xu:
Quantum Algorithm for Polynomial Root Finding Problem. CIS 2014: 469-473 - [c11]Yue Dai, Shenghui Su:
A Diploma Anti-forgery System Based on Lightweight Digital Signatures. CIS 2014: 647-651 - [i13]Shenghui Su, Tao Xie, Shuwang Lü:
A New Non-MDS Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. CoRR abs/1408.5999 (2014) - [i12]Shenghui Su, Shuwang Lü, Xiubin Fan, Maozhi Xu:
A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes. CoRR abs/1408.6226 (2014) - [i11]Shenghui Su, Shuwang Lü:
A 128-bit Block Cipher Based on Three Group Arithmetics. IACR Cryptol. ePrint Arch. 2014: 704 (2014) - 2013
- [c10]Tong Li, Shenghui Su:
Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis Reduction. CIS 2013: 454-458 - [c9]Hao Zhu, Shenghui Su:
The Improvement of the Commonly Used Linear Polynomial Selection Methods. CIS 2013: 459-463 - [i10]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Lever Function to a New Codomain with Adequate Indeterminacy. IACR Cryptol. ePrint Arch. 2013: 246 (2013) - [i9]Shenghui Su, Tao Xie, Shuwang Lü:
A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack. IACR Cryptol. ePrint Arch. 2013: 327 (2013) - [i8]Shenghui Su, Maozhi Xu, Shuwang Lü:
A Public Key Cryptoscheme Using the Bit-pair Method. IACR Cryptol. ePrint Arch. 2013: 394 (2013) - 2012
- [j2]Shenghui Su, Shuwang Lü:
A public key cryptosystem based on three new provable problems. Theor. Comput. Sci. 426: 91-117 (2012) - [c8]Hailin Hao, Shenghui Su:
Digital Copyright Protection Scheme Based on JUNA Lightweight Digital Signatures. CIS 2012: 582-586 - 2011
- [j1]Shenghui Su, Shuwang Lü, Xiubin Fan:
Asymptotic granularity reduction and its application. Theor. Comput. Sci. 412(39): 5374-5386 (2011) - [c7]Haibo Wu, Shenghui Su:
Analysis of the Success Rate of the LLL Lattice Basis Reduction. CIS 2011: 644-647 - [c6]Na Zhao, Shenghui Su:
An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU Polynomial. CIS 2011: 891-895 - [i7]Shenghui Su, Shuwang Lü, Xinbin Fan:
Asymptotic Granularity Reduction and Its Application. CoRR abs/1106.0108 (2011) - 2010
- [c5]Jingang Niu, Shenghui Su:
Design Verification of BJUT Library Management System with PVS. CIS 2010: 624-628
2000 – 2009
- 2009
- [c4]Lei Shi, Shenghui Su, Zhengrong Xiang:
Design of a Passport Anti-forgery System Based on Digital Signature Schemes. PAISI 2009: 101-111 - [i6]Shenghui Su, Shuwang Lü:
REESSE1+ . Reward . Proof by Experiment. CoRR abs/0908.0482 (2009) - 2008
- [c3]Shenghui Su, Yongquan Cai, Changxiang Shen:
The Banknote Anti-forgery System Based on Digital Signature Algorithms. ISI Workshops 2008: 44-49 - [c2]Shenghui Su, Jian Li, Lei Shi:
Operation of Super Long Integers in Cryptographic Applications. PDCAT 2008: 363-369 - [i5]Shenghui Su, Zunguo Huang, Jun Hu:
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation. CoRR abs/0801.4817 (2008) - 2007
- [c1]Shenghui Su, Shuwang Lv:
To Solve the High Degree Congruence. CIS 2007: 672-676 - [i4]Shenghui Su, Shuwang Lv:
Refuting the Pseudo Attack on the REESSE1+ Cryptosystem. CoRR abs/0704.0492 (2007) - [i3]Shenghui Su, Shuwang Lü:
The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem. CoRR abs/cs/0702046 (2007) - 2006
- [i2]Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang:
Design and Analysis of a Hash Ring-iterative Structure. IACR Cryptol. ePrint Arch. 2006: 384 (2006) - [i1]Shenghui Su, Shuwang Lü:
The REESSE1+ Public Key Cryptosystem v2.2. IACR Cryptol. ePrint Arch. 2006: 420 (2006)
Coauthor Index
aka: Shuwang Lv
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint