| Publication | Date of Publication | Type |
|---|
New methods for bounding the length of impossible differentials of SPN block ciphers IEEE Transactions on Information Theory | 2025-01-23 | Paper |
NEV: faster and smaller NTRU encryption using vector decoding | 2024-08-30 | Paper |
Fast blind rotation for bootstrapping FHEs Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
New method for combining Matsui's bounding conditions with sequential encoding method Designs, Codes and Cryptography | 2023-11-07 | Paper |
Security model and modular design of fair authentication key exchange protocols Science China Information Sciences | 2022-10-28 | Paper |
A property-based attestation protocol for TCM Science China Information Sciences | 2022-10-28 | Paper |
On constant-round zero-knowledge proofs of knowledge for NP-relations Science China Information Sciences | 2022-10-28 | Paper |
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V Designs, Codes and Cryptography | 2022-09-22 | Paper |
FAN: a lightweight authenticated cryptographic algorithm | 2021-12-20 | Paper |
Formal analysis of a TTP-free blacklistable anonymous credentials system Information and Communications Security | 2020-07-20 | Paper |
Practical cryptanalysis of Bluetooth encryption with condition masking Journal of Cryptology | 2018-05-28 | Paper |
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme | 2018-04-20 | Paper |
New Results on Periodic Sequences With Large $k$-Error Linear Complexity IEEE Transactions on Information Theory | 2017-08-08 | Paper |
The Weight Enumerator of a Class of Cyclic Codes IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Improved fault analysis on the block cipher SPECK by injecting faults in the same round Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
Boolean functions and their applications in cryptography Advances in Computer Science and Technology | 2016-12-02 | Paper |
Design and formal analysis of TCM key migration protocols | 2016-08-10 | Paper |
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\) Information Security and Cryptology | 2015-12-02 | Paper |
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP Science China Information Sciences | 2015-11-20 | Paper |
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication Lecture Notes in Computer Science | 2015-11-03 | Paper |
Near collision attack on the Grain v1 stream cipher Fast Software Encryption | 2015-09-18 | Paper |
A clustering approach for privacy-preserving in social networks Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Linear cryptanalysis of FASER128/256 and TriviA-ck Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Computing Walsh coefficients from the algebraic normal form of a Boolean function Cryptography and Communications | 2014-10-08 | Paper |
ExBLACR: extending BLACR system Information Security and Privacy | 2014-07-24 | Paper |
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture Journal of Systems Science and Complexity | 2014-01-27 | Paper |
Cube attack on grain Journal of Software | 2013-11-19 | Paper |
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract) Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Round-optimal zero-knowledge proofs of knowledge for NP Science China Information Sciences | 2013-08-20 | Paper |
Improved multi-pass fast correlation attacks with applications Science China Information Sciences | 2013-07-03 | Paper |
Cryptanalysis of helix and phelix revisited Information Security and Privacy | 2013-06-28 | Paper |
Improved key recovery attacks on reduced-round Salsa20 and ChaCha Lecture Notes in Computer Science | 2013-06-04 | Paper |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
(Pseudo) preimage attack on round-reduced Grøstl hash function and others Fast Software Encryption | 2013-01-08 | Paper |
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion Information Security and Cryptology | 2013-01-07 | Paper |
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3 Information Security and Cryptology | 2013-01-07 | Paper |
Combined public-key schemes: the case of ABE and ABS Provable Security | 2012-11-06 | Paper |
Fully secure doubly-spatial encryption under simple assumptions Provable Security | 2012-11-06 | Paper |
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers Applied Cryptography and Network Security | 2012-09-10 | Paper |
Black-box testing based on colorful taint analysis Science China Information Sciences | 2012-08-17 | Paper |
Comments on the SM2 key exchange protocol Cryptology and Network Security | 2012-07-20 | Paper |
Resettable cryptography in constant rounds -- the case of zero knowledge Lecture Notes in Computer Science | 2011-12-02 | Paper |
On guess and determine analysis of Rabbit International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost Provable Security | 2011-09-16 | Paper |
Hyper-Sbox view of AES-like permutations: a generalized distinguisher Information Security and Cryptology | 2011-07-29 | Paper |
Loiss: A Byte-Oriented Stream Cipher Lecture Notes in Computer Science | 2011-06-08 | Paper |
How to characterize side-channel leakages more accurately? Information Security Practice and Experience | 2011-05-19 | Paper |
A byte-based guess and determine attack on SOSEMANUK Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network Information Security and Cryptology | 2010-11-23 | Paper |
Some results on cryptanalysis of SMS4 block cipher International Journal of Applied Cryptography | 2010-09-22 | Paper |
Cryptanalysis of the LANE hash function Selected Areas in Cryptography | 2009-12-09 | Paper |
An Improved Fast Correlation Attack on Stream Ciphers Selected Areas in Cryptography | 2009-11-03 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model Computer Science - Theory and Applications | 2009-08-18 | Paper |
A New Client-to-Client Password-Authenticated Key Agreement Protocol Lecture Notes in Computer Science | 2009-07-23 | Paper |
Security of Truncated MACs Information Security and Cryptology | 2009-04-29 | Paper |
Correlation functions of multioutput \(m\)-valued logical functions and relation between correlation functions and spectra | 2009-03-06 | Paper |
Spectral characteristics of the best affine approach of multi-output m-valued logical functions Wuhan University Journal of Natural Sciences | 2009-03-06 | Paper |
Fuzzy decision tree based inference techniques for network forensic analysis | 2009-03-06 | Paper |
Global timestamp serialization in multi-level multi-version DBMS | 2009-03-06 | Paper |
scientific article; zbMATH DE number 5525620 (Why is no real title available?) | 2009-03-06 | Paper |
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences IEEE Transactions on Information Theory | 2009-02-24 | Paper |
On Quadratic Bent Functions in Polynomial Forms IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
On the Unprovable Security of 2-Key XCBC Information Security and Privacy | 2008-07-08 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD Lecture Notes in Computer Science | 2008-05-06 | Paper |
New Results on Impossible Differential Cryptanalysis of Reduced AES Lecture Notes in Computer Science | 2008-05-06 | Paper |
New Guess-and-Determine Attack on the Self-Shrinking Generator Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Related-Key Differential-Linear Attacks on Reduced AES-192 Lecture Notes in Computer Science | 2008-04-11 | Paper |
Short Threshold Signature Schemes Without Random Oracles Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Multi-pass Fast Correlation Attack on Stream Ciphers Selected Areas in Cryptography | 2007-11-29 | Paper |
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 Selected Areas in Cryptography | 2007-11-29 | Paper |
Survey of information security Science in China. Series F | 2007-10-12 | Paper |
Modular approach to the design and analysis of password-based security protocols Science in China. Series F | 2007-10-12 | Paper |
Constructing parallel long-message signcryption scheme from trapdoor permutation Science in China. Series F | 2007-08-31 | Paper |
Spectral characteristics of multi-output \(m\)-valued logical functions | 2007-05-11 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Theory and Applications of Models of Computation Lecture Notes in Computer Science | 2007-04-30 | Paper |
An attack on hash function HAVAL-128 Science in China. Series F | 2007-02-20 | Paper |
Linear cryptanalysis of NUSH block cipher Science in China. Series F | 2007-02-20 | Paper |
Cryptanalysis of AW digital signature scheme based on error-correcting codes Science in China. Series F | 2007-02-20 | Paper |
Collision attack on reduced-round Camellia Science in China. Series F | 2007-02-20 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Security analysis of a new stream cipher Science in China. Series F | 2006-10-11 | Paper |
An Arbitrated Quantum Message Signature Scheme Computational and Information Science | 2006-10-10 | Paper |
Pairwise key agreement protocols based on the Weil pairing | 2006-10-10 | Paper |
Analysis and improvement of a security-provable mutually authenticated key agreement | 2006-10-10 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes | 2006-07-12 | Paper |
Ownership proofs of digital works based on secure multiparty computation | 2006-05-19 | Paper |
Cryptanalysis of the TAE mode and its improvement | 2006-05-19 | Paper |
scientific article; zbMATH DE number 2247715 (Why is no real title available?) | 2006-01-16 | Paper |
scientific article; zbMATH DE number 2247718 (Why is no real title available?) | 2006-01-16 | Paper |
scientific article; zbMATH DE number 2247712 (Why is no real title available?) | 2006-01-16 | Paper |
scientific article; zbMATH DE number 2243635 (Why is no real title available?) | 2006-01-05 | Paper |
scientific article; zbMATH DE number 2242701 (Why is no real title available?) | 2006-01-03 | Paper |
scientific article; zbMATH DE number 2242707 (Why is no real title available?) | 2006-01-03 | Paper |
scientific article; zbMATH DE number 2242698 (Why is no real title available?) | 2006-01-03 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Cryptanalysis of some signature schemes with message recovery Applied Mathematics and Computation | 2005-11-14 | Paper |
scientific article; zbMATH DE number 2222203 (Why is no real title available?) | 2005-11-02 | Paper |
scientific article; zbMATH DE number 2222197 (Why is no real title available?) | 2005-11-02 | Paper |
scientific article; zbMATH DE number 2222190 (Why is no real title available?) | 2005-11-02 | Paper |
scientific article; zbMATH DE number 2217663 (Why is no real title available?) | 2005-10-26 | Paper |
scientific article; zbMATH DE number 2204038 (Why is no real title available?) | 2005-09-09 | Paper |
scientific article; zbMATH DE number 2202209 (Why is no real title available?) | 2005-09-05 | Paper |
scientific article; zbMATH DE number 2202215 (Why is no real title available?) | 2005-09-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2166730 (Why is no real title available?) | 2005-05-09 | Paper |
On Lin-Bose problem Linear Algebra and its Applications | 2004-11-18 | Paper |
scientific article; zbMATH DE number 2112427 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2112354 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2112409 (Why is no real title available?) | 2004-10-28 | Paper |
scientific article; zbMATH DE number 2075857 (Why is no real title available?) | 2004-06-18 | Paper |
scientific article; zbMATH DE number 2070573 (Why is no real title available?) | 2004-06-08 | Paper |
scientific article; zbMATH DE number 2042806 (Why is no real title available?) | 2004-02-15 | Paper |
scientific article; zbMATH DE number 2042808 (Why is no real title available?) | 2004-02-15 | Paper |
Study on strand space model theory Journal of Computer Science and Technology | 2003-11-06 | Paper |
Three characterizations of correlation-immune functions over the rings \(Z_N\) Theoretical Computer Science | 2000-08-23 | Paper |
Maximum correlation analysis of nonlinear combining functions Science in China. Series E | 1998-08-20 | Paper |
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\) Chinese Science Bulletin | 1998-06-11 | Paper |
A sufficient and necessary condition of judging the independence of Boolean functions system Chinese Science Bulletin | 1996-09-16 | Paper |
Spectral representation of correspondence of multi-valued logical functions Chinese Science Bulletin | 1995-11-28 | Paper |