| Publication | Date of Publication | Type |
|---|
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs Designs, Codes and Cryptography | 2024-12-11 | Paper |
A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair | 2024-10-16 | Paper |
On prefer-one sequences Designs, Codes and Cryptography | 2024-10-14 | Paper |
Algebraic-differential attacks on a family of arithmetization-oriented symmetric ciphers Journal of Systems Science and Complexity | 2024-08-29 | Paper |
Proofs of conjectures on extremal weight de Bruijn sequences IEEE Transactions on Information Theory | 2024-07-18 | Paper |
The equivalence between Galois and Fibonacci NFSRs Theoretical Computer Science | 2024-06-04 | Paper |
A multi-group signature scheme from lattices | 2024-04-19 | Paper |
Cube Cryptanalysis of Round-Reduced ACORN | 2024-03-14 | Paper |
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences IEEE Transactions on Information Theory | 2024-03-14 | Paper |
Moving a step of ChaCha in syncopated rhythm Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Higher-order masking scheme for Trivium hardware implementation Information Security and Cryptology | 2023-08-21 | Paper |
Amortizing division and exponentiation Information Security and Cryptology | 2023-08-21 | Paper |
Generalized boomerang connectivity table and improved cryptanalysis of GIFT Information Security and Cryptology | 2023-08-21 | Paper |
Cryptanalysis of Ciminion Information Security and Cryptology | 2023-08-21 | Paper |
Conditional Cube Searching and Applications on Trivium-Variant Ciphers Developments in Language Theory | 2023-06-30 | Paper |
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP Developments in Language Theory | 2023-06-30 | Paper |
Properties of the cycles that contain all vectors of weight \(\le k\) Designs, Codes and Cryptography | 2023-01-18 | Paper |
Two new families of quantum synchronizable codes Quantum Information Processing | 2022-12-23 | Paper |
Bayesian mechanism for rational secret sharing scheme Science China Information Sciences | 2022-10-28 | Paper |
A two-round honest-verifier zero-knowledge protocol Science China Information Sciences | 2022-10-28 | Paper |
Generic constructions of revocable identity-based encryption Information Security and Cryptology | 2022-10-14 | Paper |
Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT | 2022-07-01 | Paper |
Isomorphism and equivalence of Galois nonlinear feedback shift registers | 2022-07-01 | Paper |
Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\) | 2022-07-01 | Paper |
Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey | 2022-06-08 | Paper |
Differential-linear cryptanalysis from an algebraic perspective | 2022-04-22 | Paper |
Determining deep hole trees of generalized Reed-Solomon codes and an application SCIENTIA SINICA Mathematica | 2022-03-21 | Paper |
The Adjacency Graphs of FSRs With Affine Characteristic Functions IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees IEEE Transactions on Information Theory | 2022-02-17 | Paper |
On the \(k\)-error linear complexities of De Bruijn sequences | 2021-12-08 | Paper |
On Galois NFSRs equivalent to Fibonacci ones | 2021-12-08 | Paper |
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems Applied Mathematics and Computation | 2021-11-11 | Paper |
Analyzing Boolean functions via solving parametric polynomial systems Journal of Systems Science and Complexity | 2021-04-08 | Paper |
Hierarchical group signatures with verifier-local revocation | 2021-01-18 | Paper |
On the efficiency of solving Boolean polynomial systems with the characteristic set method Journal of Symbolic Computation | 2020-11-13 | Paper |
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks Information Sciences | 2020-07-16 | Paper |
Longest subsequences shared by two de Bruijn sequences Designs, Codes and Cryptography | 2020-07-15 | Paper |
A new upper bound on the order of affine sub-families of NFSRs Journal of Systems Science and Complexity | 2020-05-13 | Paper |
Refined analysis to the extended tower number field sieve Theoretical Computer Science | 2020-03-12 | Paper |
Composition of Boolean functions: an application to the secondary constructions of bent functions Discrete Mathematics | 2020-01-22 | Paper |
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers | 2019-10-31 | Paper |
A note on rotation symmetric S-boxes Journal of Systems Science and Complexity | 2019-10-22 | Paper |
Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains | 2019-10-14 | Paper |
A new construction of zero-difference balanced functions and two applications Designs, Codes and Cryptography | 2019-09-12 | Paper |
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach IEEE Transactions on Information Theory | 2019-07-19 | Paper |
Further results on complete permutation monomials over finite fields Finite Fields and their Applications | 2019-06-18 | Paper |
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions Designs, Codes and Cryptography | 2019-06-06 | Paper |
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity Designs, Codes and Cryptography | 2019-05-17 | Paper |
Multi-identity IBFHE and multi-attribute ABFHE in the standard model | 2019-03-29 | Paper |
Speeding up the GVW algorithm via a substituting method Journal of Systems Science and Complexity | 2019-03-06 | Paper |
The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity | 2018-12-07 | Paper |
Fault attacks on stream cipher Scream | 2018-12-07 | Paper |
Estimating differential-linear distinguishers and applications to CTC2 | 2018-12-07 | Paper |
Combined cache timing attacks and template attacks on stream cipher MUGI | 2018-12-07 | Paper |
The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight | 2018-10-26 | Paper |
On the division property of \textsc{Simon}48 and \textsc{Simon}64 | 2018-10-24 | Paper |
Symbolic-like computation and conditional differential cryptanalysis of QUARK | 2018-10-24 | Paper |
Anonymous identity-based encryption with identity recovery | 2018-09-26 | Paper |
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure IEEE Transactions on Information Theory | 2018-09-19 | Paper |
Lower and Upper Bounds on the Density of Irreducible NFSRs IEEE Transactions on Information Theory | 2018-09-14 | Paper |
scientific article; zbMATH DE number 6900646 (Why is no real title available?) | 2018-07-09 | Paper |
Correlation cube attacks: from weak-key distinguisher to key recovery | 2018-07-09 | Paper |
Improved key generation algorithm for Gentry's fully homomorphic encryption scheme | 2018-06-15 | Paper |
Refinement of the four-dimensional GLV method on elliptic curves | 2018-04-26 | Paper |
A game-based framework towards cyber-attacks on state estimation in ICSS | 2018-04-20 | Paper |
Cryptanalysis of Acorn in nonce-reuse setting | 2018-04-20 | Paper |
A class of three-weight and five-weight linear codes Discrete Applied Mathematics | 2018-04-10 | Paper |
Complete weight enumerators of a class of three-weight linear codes Journal of Applied Mathematics and Computing | 2017-11-10 | Paper |
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions IEEE Transactions on Information Theory | 2017-07-12 | Paper |
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited Theoretical Computer Science | 2017-05-11 | Paper |
Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher Information Security and Cryptology | 2017-05-05 | Paper |
Cyber-attacks on remote state estimation in industrial control system: a game-based framework Information Security and Cryptology | 2017-05-05 | Paper |
Generalized Hamming Weights of Irreducible Cyclic Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications Cryptography and Communications | 2017-03-27 | Paper |
On affine sub-families of Grain-like structures Designs, Codes and Cryptography | 2017-02-17 | Paper |
The adjacency graphs of some feedback shift registers Designs, Codes and Cryptography | 2017-02-17 | Paper |
A kind of three-weight linear codes Cryptography and Communications | 2017-02-09 | Paper |
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Complete weight enumerators of two classes of linear codes Discrete Mathematics | 2016-12-22 | Paper |
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra Journal of Systems Science and Complexity | 2016-10-20 | Paper |
Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\) Finite Fields and their Applications | 2016-10-10 | Paper |
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour Designs, Codes and Cryptography | 2016-08-31 | Paper |
An improvement over the GVW algorithm for inhomogeneous polynomial systems Finite Fields and their Applications | 2016-07-29 | Paper |
Generalized cyclotomic numbers of order two and their applications Cryptography and Communications | 2016-07-01 | Paper |
Solving linear equations modulo unknown divisors: revisited Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers Journal of Complexity | 2016-06-03 | Paper |
Towards optimal bounds for implicit factorization problem Lecture Notes in Computer Science | 2016-05-19 | Paper |
Further results on the nonlinearity of maximum-length NFSR feedbacks Cryptography and Communications | 2016-04-11 | Paper |
Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\) Cryptography and Communications | 2016-04-11 | Paper |
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Generic constructions of integrated PKE and PEKS Designs, Codes and Cryptography | 2016-02-19 | Paper |
Quantum bit commitment with application in quantum zero-knowledge proof (extended abstract) Algorithms and Computation | 2016-01-11 | Paper |
A new method for solving polynomial systems with noise over \(\mathbb{F}_2\) and its applications in cold boot key recovery Selected Areas in Cryptography | 2015-12-04 | Paper |
Environment-bound SAML assertions: a fresh approach to enhance the security of SAML assertions Information Security and Cryptology | 2015-12-02 | Paper |
Omega pairing on hyperelliptic curves Information Security and Cryptology | 2015-12-02 | Paper |
Speeding up the search algorithm for the best differential and best linear trails Information Security and Cryptology | 2015-11-25 | Paper |
Improved domain extender for the ideal cipher Cryptography and Communications | 2015-11-19 | Paper |
Near collision attack on the Grain v1 stream cipher Fast Software Encryption | 2015-09-18 | Paper |
Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\) Journal of Complexity | 2015-08-24 | Paper |
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation Theory of Cryptography | 2015-07-06 | Paper |
On constructing complete permutation polynomials over finite fields of even characteristic Discrete Applied Mathematics | 2015-04-28 | Paper |
A new linearization method for nonlinear feedback shift registers Journal of Computer and System Sciences | 2015-02-20 | Paper |
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks Discrete Applied Mathematics | 2014-09-12 | Paper |
Analysis of optimum pairing products at high security levels Lecture Notes in Computer Science | 2014-08-20 | Paper |
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents Applied Cryptography and Network Security | 2014-07-07 | Paper |
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme Science China. Mathematics | 2014-03-05 | Paper |
Complete permutation polynomials induced from complete permutations of subfields | 2013-12-19 | Paper |
A method for counting the number of polynomial equivalence classes Journal of Mathematical Cryptology | 2013-09-04 | Paper |
New constructions of quaternary bent functions | 2013-09-01 | Paper |
On enumeration of polynomial equivalence classes Science China. Mathematics | 2013-08-05 | Paper |
Improved bounds for the implicit factorization problem Advances in Mathematics of Communications | 2013-07-31 | Paper |
Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits Information Security and Privacy | 2013-06-28 | Paper |
Construction of resilient and nonlinear Boolean functions with almost perfect immunity to algebraic and fast algebraic attacks Information Security and Cryptology | 2013-05-28 | Paper |
Fast evaluation of T-functions via time-memory trade-offs Information Security and Cryptology | 2013-05-28 | Paper |
An improved twisted Ate pairing over KSS curves with \(k = 18\) Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
On efficient pairings on elliptic curves over extension fields Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Stronger Security Model for Public-Key Encryption with Equality Test Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Perfect algebraic immune functions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Fast Tate pairing computation on twisted Jacobi intersections curves Information Security and Cryptology | 2013-01-07 | Paper |
Vladimir Sergeevich Anashin \(p\)-Adic Numbers, Ultrametric Analysis, and Applications | 2012-11-13 | Paper |
Anonymous Identity-Based Hash Proof System and Its Applications Provable Security | 2012-11-06 | Paper |
Identity-based extractable hash proofs and their applications Applied Cryptography and Network Security | 2012-09-10 | Paper |
Linear weaknesses in \(T\)-functions Lecture Notes in Computer Science | 2012-09-07 | Paper |
The initialization stage analysis of ZUC v1.5 Cryptology and Network Security | 2012-07-20 | Paper |
Ergodic theory over \(\mathbb F_2 T\) Finite Fields and their Applications | 2012-05-07 | Paper |
On enumeration of polynomial equivalence classes and their application to MPKC Finite Fields and their Applications | 2012-03-22 | Paper |
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2 Cryptography and Coding | 2011-12-16 | Paper |
Resettable cryptography in constant rounds -- the case of zero knowledge Lecture Notes in Computer Science | 2011-12-02 | Paper |
On the nonexistence of bent functions International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Results on the immunity of Boolean functions against probabilistic algebraic attacks Information Security and Privacy | 2011-07-07 | Paper |
Attacking Bivium and Trivium with the characteristic set method Lecture Notes in Computer Science | 2011-06-29 | Paper |
On designated-weight Boolean functions with highest algebraic immunity Science China. Mathematics | 2011-02-25 | Paper |
An interesting member ID-based group signature | 2011-01-03 | Paper |
Refinement of Miller's algorithm over Edwards curves Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model Computer Science - Theory and Applications | 2009-08-18 | Paper |
Fuzzy decision tree based inference techniques for network forensic analysis | 2009-03-06 | Paper |
scientific article; zbMATH DE number 5525643 (Why is no real title available?) | 2009-03-06 | Paper |
Unlinkable Randomizable Signature and Its Application in Group Signature Information Security and Cryptology | 2009-02-10 | Paper |
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption Information Security and Cryptology | 2009-02-10 | Paper |
OPMAC: One-Key Poly1305 MAC Information Security and Cryptology | 2009-01-15 | Paper |
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps Cryptology and Network Security | 2009-01-09 | Paper |
Novel \(\Omega\)-protocols for NP Science in China. Series F | 2008-03-31 | Paper |
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Constructing parallel long-message signcryption scheme from trapdoor permutation Science in China. Series F | 2007-08-31 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
The internet accessible mathematical computation framework Science in China. Series F | 2007-02-20 | Paper |
Security analysis of a signature scheme with message recovery | 2006-12-11 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Protocol security analysis based on an ideal | 2006-01-23 | Paper |
Computational Science - ICCS 2004 Lecture Notes in Computer Science | 2005-12-23 | Paper |
scientific article; zbMATH DE number 2165698 (Why is no real title available?) | 2005-05-06 | Paper |
scientific article; zbMATH DE number 1860752 (Why is no real title available?) | 2003-06-01 | Paper |
scientific article; zbMATH DE number 1795742 (Why is no real title available?) | 2003-02-10 | Paper |
scientific article; zbMATH DE number 1860743 (Why is no real title available?) | 2003-01-28 | Paper |
Another attempt for parallel computation of characteristic sets | 2002-11-04 | Paper |
An approach towards the implementation of characteristic set method Systems Science and Mathematical Sciences | 2002-07-28 | Paper |
A class of generalized cyclic codes Acta Mathematicae Applicatae Sinica. English Series | 2002-04-21 | Paper |
scientific article; zbMATH DE number 1380842 (Why is no real title available?) | 1999-12-20 | Paper |
scientific article; zbMATH DE number 1380882 (Why is no real title available?) | 1999-12-20 | Paper |
scientific article; zbMATH DE number 1263332 (Why is no real title available?) | 1999-03-16 | Paper |
Well-behaved basis and LR arrays Acta Mathematicae Applicatae Sinica. English Series | 1996-07-08 | Paper |
Structure and properties of linear recurring m-arrays IEEE Transactions on Information Theory | 1994-10-03 | Paper |
scientific article; zbMATH DE number 500488 (Why is no real title available?) | 1994-09-26 | Paper |
The equivalence classes of LR arrays Discrete Applied Mathematics | 1994-01-27 | Paper |
scientific article; zbMATH DE number 270250 (Why is no real title available?) | 1993-09-02 | Paper |
scientific article; zbMATH DE number 123902 (Why is no real title available?) | 1993-02-18 | Paper |
Linear Recurring m-Arrays Lecture Notes in Computer Science | 1988-01-01 | Paper |