Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chen Hua is active.

Publication


Featured researches published by Chen Hua.


international conference on selected areas in cryptography | 2004

Collision attack and pseudorandomness of reduced-round camellia

Wu Wenling; Feng Dengguo; Chen Hua

Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack 6,7,8 and 9 rounds of Camellia with 128-bit key and 8,9 and 10 rounds of Camellia with 192/256-bit key. The attack on 6-round of 128-bit key Camellia is more efficient than known attacks. The complexities of the attack on 7(8,9,10)-round Camellia without FL /FL−−1 functions are less than that of previous attacks. Furthermore, we prove that the 4-round primitive-wise idealized Camellia is not pseudorandom permutation and the 5-round primitive-wise idealized Camellia is super-pseudorandom permutation for non-adaptive adversaries.


Archive | 2015

Theodolite fixing device on pole tower

Dou Enfu; Zhang Haijun; Zheng Jiangang; Li Yubao; Li Dawei; Wang Shaolin; Chen Fangdong; Zhao Xuesong; Liu Tao; Guo Xinyang; Li Ning; Li Suyu; Lu Yongli; Li Chunli; Zheng Haitao; Chen Hua; Ren Zhenlong; Zi Xiantao; Cui Hailong; Zhao Baocheng; Hou Zilong; Wang Miao; Wang Jianli; Gu Boyin; Qiu Xiaoguang


MATEC Web of Conferences | 2017

Analysis and Aesearch of White Spot on Creepage Discharge in oil-Pressboard Interface

Yu Wenbo; Zhou Xiao-xu; Chen Fangdong; Chen Hua; Shang Donghui; Han Xu


Archive | 2016

High-voltage power equipment partial discharge feature extraction method and apparatus

Zhu Yongli; Jia Yafei; Zhao Xuesong; Chen Hua; Huang Xiaoyin; Zhou Lei; Yu Wenbo; Zheng Jiangang; Guo Xinyang; Li Ning


Archive | 2016

Truly Random Number Generator (TRNG) accumulated jitter estimating method based on annular oscillator

Zhu Shaofeng; Chen Hua; Fan Limin; Gao Si; Feng Jingyi; Cao Weiqiong; Chen Meihui


Archive | 2016

Transmission line monitoring devices's fixing device

Zhao Xuesong; Zhang Haijun; Chen Hua; Huang Xiaoyin; Zhou Lei; Yu Wenbo; Zheng Jiangang; Guo Xinyang; Zi Xiantao; Cui Hailong; Ren Zhenlong; Li Ning


Dianli Xitong Jiqi Zidonghua Xuebao | 2016

2つの送電線の4点進行波故障点標定の方法を提案した。【JST・京大機械翻訳】

Zhu Yongli; Fan Guochen; Zhao Xuesong; Chen Hua; Xiong Xi


Archive | 2015

An apparatus applied to power transmission line maintenance

Hao Xinlei; Cui Hailong; Shi Peng; Yang Jianxin; Li Hongkui; Tang Wei; Hou Zilong; Zhang Haijun; Zhang Xuedong; Yang Wei; Guo Xinyang; Chen Fangdong; Zheng Jiangang; Zi Xiantao; Li Ning; Zhao Xuesong; Chen Hua; Zhou Lei; Liu Chunming; Zhou Zhiwen; Meng Qingshuang; Su Bin


Archive | 2015

SM2 signature algorithm protection method for resisting error attack based on lattice

Cao Weiqiong; Chen Hua; Zheng Xiaoguang; Li Dawei; Luo Peng; Feng Jingyi; Wu Wenling; Han Xucang; Li Guoyou; Gao Shunxian


Archive | 2015

ZUC sequence cipher algorithm mask protection method of which the round output is arithmetic mask

Luo Peng; Li Dawei; Cao Weiqiong; Feng Xiutao; Chen Hua; Li Guoyou

Collaboration


Dive into the Chen Hua's collaboration.

Top Co-Authors

Avatar

Li Ning

Harbin Engineering University

View shared research outputs
Top Co-Authors

Avatar

Luo Peng

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Feng Dengguo

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wu Wenling

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge