Follow
Jingwei HU
Jingwei HU
Other names胡经纬
Postdoctoral Research Fellow, Nanyang Technological University
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
Fast and Generic Inversion Architectures Over GF(2m) Using Modified Itoh–Tsujii Algorithms
J Hu, W Guo, J Wei, RCC Cheung
IEEE Transactions on Circuits and Systems II: Express Briefs 62 (4), 367-371, 2015
412015
Area-time efficient computation of niederreiter encryption on qc-mdpc codes for embedded hardware
J Hu, RCC Cheung
IEEE Transactions on Computers 66 (8), 1313-1325, 2017
252017
Optimized polynomial multiplier over commutative rings on FPGAs: A case study on BIKE
J Hu, W Wang, RCC Cheung, H Wang
2019 International Conference on Field-Programmable Technology (ICFPT), 231-234, 2019
242019
Lightweight key encapsulation using LDPC codes on FPGAs
J Hu, M Baldi, P Santini, N Zeng, S Ling, H Wang
IEEE Transactions on Computers 69 (3), 327-341, 2019
182019
Fully homomorphic encryption-based protocols for enhanced private set intersection functionalities
J Hu, J Chen, W Dai, H Wang
Cryptology ePrint Archive, 2023
82023
Compact constant weight coding engines for the code-based cryptography
J Hu, RCC Cheung, T Güneysu
IEEE Transactions on Circuits and Systems II: Express Briefs 64 (9), 1092-1096, 2017
82017
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
J Hu, RCC Cheung
82016
Toward practical code-based signature: Implementing fast and compact QC-LDGM signature scheme on embedded hardware
J Hu, RCC Cheung
IEEE Transactions on Circuits and Systems I: Regular Papers 64 (8), 2086-2097, 2017
72017
A novel architecture for fast RSA key generation based on RNS
J Hu, W Guo, J Wei, Y Chang, D Sun
2011 Fourth International Symposium on Parallel Architectures, Algorithms …, 2011
72011
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
J Hu, Y Zhao, BHM Tan, KMM Aung, H Wang
IEEE Transactions on Information Forensics and Security, 2024
42024
Compact code-based signature for reconfigurable devices with side channel resilience
J Hu, Y Liu, RCC Cheung, S Bhasin, S Ling, H Wang
IEEE Transactions on Circuits and Systems I: Regular Papers 67 (7), 2305-2316, 2020
32020
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO
J Hu, W Wang, K Gaj, L Wang, H Wang
IEEE Transactions on Computers 72 (7), 2094-2110, 2022
22022
Two New Module-Code-Based KEMs with Rank Metric
LP Wang, J Hu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
22019
Efficient Unbalanced Quorum PSI from Homomorphic Encryption
X Yang, L Cai, Y Wang, K Yin, L Sun, J Hu
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
12024
Universal Gaussian elimination hardware for cryptographic purposes
J Hu, W Wang, K Gaj, D Chen, H Wang
Journal of Cryptographic Engineering, 1-15, 2024
12024
Number-Theoretic Transform Architecture for Fully Homomorphic Encryption from Hypercube Topology
J Hu, Y Fang, W Dai
Cryptology ePrint Archive, 2024
12024
Check for updates Two New Module-Code-Based KEMS with Rank Metric
LP Wang, J Hu
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
2019
A scalable RNS Montgomery multiplier over F2m
J Hu, W Guo, J Wei, RCC Cheung
IEICE Electronics Express 10 (23), 20130704-20130704, 2013
2013
A TTA-like Processor for Fast RSA Key Generation Using RNS.
W Guo, J Hu, J Wei
J. Comput. 8 (1), 33-40, 2013
2013
Efficient Threshold Private Set Intersection via BFV Fully Homomorphic Encryptions
J Hu, W Dai
The system can't perform the operation now. Try again later.
Articles 1–20