default search action
Yongfei Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j4]Chuli Hu, Qingfeng Guan, Nengcheng Chen, Jia Li, Xiang Zhong, Yongfei Han:
An Observation Capability Metadata Model for EO Sensor Discovery in Sensor Web Enablement Environments. Remote. Sens. 6(11): 10546-10570 (2014)
2000 – 2009
- 2005
- [c9]Jiqiang Lv, Yongfei Han:
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. ACISP 2005: 195-206 - 2003
- [e2]Jianying Zhou, Moti Yung, Yongfei Han:
Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. Lecture Notes in Computer Science 2846, Springer 2003, ISBN 3-540-20208-0 [contents]
1990 – 1999
- 1999
- [c8]Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang:
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. ASIACRYPT 1999: 75-85 - 1998
- [c7]Xun Yi, Kwok-Yan Lam, Yongfei Han:
Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67 - 1997
- [j3]Yongfei Han, Chris J. Mitchell, Dieter Gollmann:
A fast modular exponentiation for rsa on systolic arrays. Int. J. Comput. Math. 63(3-4): 215-226 (1997) - [c6]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 - [c5]Robert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair:
A New On-Line Cash Check Scheme. CCS 1997: 111-116 - [c4]Xun Yi, Kwork-Yan Lam, Yongfei Han:
Design, Analysis and Implementation of a New Hash Function Based on Block Cipher. SAFECOMP 1997: 148-157 - [c3]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, Arcot Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124 - [e1]Yongfei Han, Tatsuaki Okamoto, Sihan Qing:
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings. Lecture Notes in Computer Science 1334, Springer 1997, ISBN 3-540-63696-X [contents] - 1996
- [j2]Dieter Gollmann, Yongfei Han, Chris J. Mitchell:
Redundant Integer Representations and Fast Exponentiation. Des. Codes Cryptogr. 7(1-2): 135-151 (1996) - [j1]Yongfei Han, David J. Evans:
On Systolic Algorithms and Neural Nets for Inference. Parallel Algorithms Appl. 8(2): 169-175 (1996) - [c2]Yongfei Han:
Investigation of non-repudiation protocols. ACISP 1996: 38-47 - 1995
- [c1]Yongfei Han, Dieter Gollmann, Chris J. Mitchell:
Minimal Weight k-SR Representations. IMACC 1995: 34-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint