| Publication | Date of Publication | Type |
|---|
| On the optimization of Pippenger's bucket method with precomputation | 2024-10-02 | Paper |
Constructions of complementary sequence sets and complete complementary codes by ideal two-level autocorrelation sequences and permutation polynomials IEEE Transactions on Information Theory | 2024-07-18 | Paper |
The Welch-Gong stream cipher -- evolutionary path Cryptography and Communications | 2024-05-22 | Paper |
FFCSA - finite field constructions, search, and algorithms ACM Communications in Computer Algebra | 2024-05-13 | Paper |
Several secondary methods for constructing bent-negabent functions Designs, Codes and Cryptography | 2023-03-17 | Paper |
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model Lecture Notes in Computer Science | 2022-10-13 | Paper |
On ideal \(t\)-tuple distribution of orthogonal functions in filtering de Bruijn generators Advances in Mathematics of Communications | 2022-07-26 | Paper |
New Constructions of Complementary Sequence Pairs Over 4 q -QAM IEEE Transactions on Information Theory | 2022-05-30 | Paper |
| Correlation power analysis and higher-order masking implementation of WAGE | 2022-03-25 | Paper |
New Construction of Complementary Sequence (or Array) Sets and Complete Complementary Codes IEEE Transactions on Information Theory | 2021-07-23 | Paper |
Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences IEEE Transactions on Computers | 2020-12-14 | Paper |
The Fourier spectral characterization for the correlation-immune functions over \(\mathbb{F}_p \) Cryptography and Communications | 2020-09-30 | Paper |
On algebraic immunity of trace inverse functions on finite fields of characteristic two Journal of Systems Science and Complexity | 2019-05-23 | Paper |
Error analysis of weak poly-LWE instances Cryptography and Communications | 2019-05-15 | Paper |
Hardware Optimizations and Analysis for the WG-16 Cipher with Tower Field Arithmetic IEEE Transactions on Computers | 2019-03-07 | Paper |
| Rapid hardware design for cryptographic modules with filtering structures over small finite fields | 2019-02-15 | Paper |
Secure simultaneous bit extraction from Koblitz curves Designs, Codes and Cryptography | 2019-01-11 | Paper |
Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations IEEE Transactions on Computers | 2018-09-20 | Paper |
| scientific article; zbMATH DE number 6900637 (Why is no real title available?) | 2018-07-09 | Paper |
| scientific article; zbMATH DE number 6900652 (Why is no real title available?) | 2018-07-09 | Paper |
| sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives | 2018-04-26 | Paper |
| MILP-based cube attack on the reduced-round WG-5 lightweight stream cipher | 2018-04-20 | Paper |
On ideal \(t\)-tuple distribution of filtering de Bruijn sequence generators Cryptography and Communications | 2018-03-09 | Paper |
| The \textsf{Simeck} family of lightweight block ciphers | 2018-02-14 | Paper |
Efficient Composited de Bruijn Sequence Generators IEEE Transactions on Computers | 2017-11-10 | Paper |
Algebraic Immunity of S-Boxes Based on Power Mappings: Analysis and Construction IEEE Transactions on Information Theory | 2017-08-08 | Paper |
New Results on Periodic Sequences With Large $k$-Error Linear Complexity IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Multiplicative Characters, the Weil Bound, and Polyphase Sequence Families With Low Correlation IEEE Transactions on Information Theory | 2017-07-27 | Paper |
New Construction of $M$-Ary Sequence Families With Low Correlation From the Structure of Sidelnikov Sequences IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Trace Representation and Linear Complexity of Binary $e$th Power Residue Sequences of Period $p$ IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Near-Complementary Sequences With Low PMEPR for Peak Power Control in Multicarrier Communications IEEE Transactions on Information Theory | 2017-07-27 | Paper |
New Sets of Zero or Low Correlation Zone Sequences via Interleaving Techniques IEEE Transactions on Information Theory | 2017-07-27 | Paper |
New Constructions of Binary Sequences With Optimal Autocorrelation Value/Magnitude IEEE Transactions on Information Theory | 2017-07-27 | Paper |
On the Dual of Certain Ternary Weakly Regular Bent Functions IEEE Transactions on Information Theory | 2017-07-12 | Paper |
A Three-Valued Walsh Transform From Decimations of Helleseth–Gong Sequences IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Fast Discrete Fourier Spectra Attacks on Stream Ciphers IEEE Transactions on Information Theory | 2017-07-12 | Paper |
New Sequences Design From Weil Representation With Low Two-Dimensional Correlation in Both Time and Phase Shifts IEEE Transactions on Information Theory | 2017-07-12 | Paper |
New Polyphase Sequence Families With Low Correlation Derived From the Weil Bound of Exponential Sums IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Secure and Efficient LCMQ Entity Authentication Protocol IEEE Transactions on Information Theory | 2017-06-08 | Paper |
On the multi-output filtering model and its applications Codes, Cryptology and Information Security | 2017-06-01 | Paper |
The Proof of Lin’s Conjecture via the Decimation-Hadamard Transform IEEE Transactions on Information Theory | 2017-05-16 | Paper |
scientific article; zbMATH DE number 6716371 (Why is no real title available?) IEEE Transactions on Computers | 2017-05-16 | Paper |
On the PMEPR of Binary Golay Sequences of Length $2^{n}$ IEEE Transactions on Information Theory | 2017-05-16 | Paper |
New Families of Optimal Frequency-Hopping Sequences of Composite Lengths IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences IEEE Transactions on Computers | 2017-05-16 | Paper |
New almost perfect, odd perfect, and perfect sequences from difference balanced functions with \(d\)-form property Advances in Mathematics of Communications | 2017-03-09 | Paper |
On the existence of aperiodic complementary hexagonal lattice arrays Contemporary Developments in Finite Fields and Applications | 2016-11-08 | Paper |
On \(\omega\)-cyclic-conjugated-perfect quaternary GDJ sequences Advances in Mathematics of Communications | 2016-10-12 | Paper |
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions Cryptography and Communications | 2016-04-19 | Paper |
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs Designs, Codes and Cryptography | 2016-03-09 | Paper |
More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\) Designs, Codes and Cryptography | 2016-02-19 | Paper |
A unified method for finding impossible differentials of block cipher structures Information Sciences | 2016-01-14 | Paper |
Cryptographically Strong de Bruijn Sequences with Large Periods Selected Areas in Cryptography | 2015-12-04 | Paper |
Sequences with good correlation property based on depth and interleaving techniques Designs, Codes and Cryptography | 2015-09-30 | Paper |
A simple construction of almost perfect quinary ASK and QAM sequences Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
Generating good span \(n\) sequences using orthogonal functions in nonlinear feedback shift registers Open Problems in Mathematics and Computational Science | 2015-06-22 | Paper |
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 Cryptography and Communications | 2014-10-08 | Paper |
| Character sums and polyphase sequence families with low correlation, discrete Fourier transform (DFT), and ambiguity | 2014-08-07 | Paper |
Optimal parameters for the WG stream cipher family Cryptography and Communications | 2014-06-20 | Paper |
Resilience to distinguishing attacks on WG-7 cipher and their generalizations Cryptography and Communications | 2013-11-14 | Paper |
Correlation of binary sequence families derived from the multiplicative characters of finite fields Advances in Mathematics of Communications | 2013-11-14 | Paper |
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions Advances in Mathematics of Communications | 2013-05-06 | Paper |
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions Information Processing Letters | 2013-04-04 | Paper |
On the security of Hummingbird-2 against side channel cube attacks Research in Cryptology | 2012-10-16 | Paper |
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences Lecture Notes in Computer Science | 2012-09-07 | Paper |
Odd Perfect Sequences and Sets of Spreading Sequences with Zero or Low Odd Periodic Correlation Zone Lecture Notes in Computer Science | 2012-09-07 | Paper |
BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements RFID. Security and Privacy | 2012-08-20 | Paper |
Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Accelerating signature-based broadcast authentication for wireless sensor networks Ad Hoc Networks | 2011-02-25 | Paper |
New Constructions of Complete Non-cyclic Hadamard Matrices, Related Function Families and LCZ Sequences Sequences and Their Applications – SETA 2010 | 2010-09-08 | Paper |
A generalized construction of OFDM \(M\)-QAM sequences with low peak-to-average power ratio Advances in Mathematics of Communications | 2010-03-08 | Paper |
A note on the diagonalization of the discrete Fourier transform Applied and Computational Harmonic Analysis | 2009-12-15 | Paper |
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates Selected Areas in Cryptography | 2009-11-03 | Paper |
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences Lecture Notes in Computer Science | 2009-07-23 | Paper |
A trace representation of binary Jacobi sequences Discrete Mathematics | 2009-06-17 | Paper |
Upper Bounds on Algebraic Immunity of Boolean Power Functions Fast Software Encryption | 2009-04-02 | Paper |
Hyperbent Functions, Kloosterman Sums, and Dickson Polynomials IEEE Transactions on Information Theory | 2009-02-24 | Paper |
New Binary Sequences With Optimal Autocorrelation Magnitude IEEE Transactions on Information Theory | 2009-02-24 | Paper |
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences and Their Applications - SETA 2008 | 2009-02-10 | Paper |
A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order Sequences and Their Applications - SETA 2008 | 2009-02-10 | Paper |
Constructions of quadratic bent functions in polynomial forms IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A new binary sequence family with low correlation and large size IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The Status of Costas Arrays IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Note on Low-Correlation Zone Signal Sets IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity Applicable Algebra in Engineering, Communication and Computing | 2008-08-21 | Paper |
A Survey of Recent Attacks on the Filter Generator Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations Selected Areas in Cryptography | 2008-03-25 | Paper |
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP) Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
WG: a family of stream ciphers with designed randomness properties Information Sciences | 2008-03-12 | Paper |
On Attacks on Filtering Generators Using Linear Subspace Structures Lecture Notes in Computer Science | 2008-03-07 | Paper |
The Perfect Binary Sequence of Period 4 for Low Periodic and Aperiodic Autocorrelations Lecture Notes in Computer Science | 2008-03-07 | Paper |
Randomness and Representation of Span n Sequences Lecture Notes in Computer Science | 2008-03-07 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Two-tuple balance of non-binary sequences with ideal two-level autocorrelation Discrete Applied Mathematics | 2007-01-09 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
On some probabilistic approximations for AES-like S-boxes Discrete Mathematics | 2006-09-14 | Paper |
A new characterization of semi-bent and bent functions on finite fields Designs, Codes and Cryptography | 2006-05-29 | Paper |
On linear complexity of sequences over \(\text{GF}(2^n)\) Theoretical Computer Science | 2006-03-24 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
| scientific article; zbMATH DE number 2238187 (Why is no real title available?) | 2005-12-14 | Paper |
Randomness and Discrepancy Transforms The International Series in Engineering and Computer Science | 2005-11-02 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
The decimation-Hadamard transform of two-level autocorrelation sequences IEEE Transactions on Information Theory | 2005-05-11 | Paper |
New nonbinary sequences with ideal two-level autocorrelation IEEE Transactions on Information Theory | 2005-05-11 | Paper |
Cryptographic properties of the Welch-Gong transformation sequence generators IEEE Transactions on Information Theory | 2005-05-11 | Paper |
New designs for signal sets with low cross correlation, balance property, and large linear span: GF(p) case IEEE Transactions on Information Theory | 2005-05-11 | Paper |
| scientific article; zbMATH DE number 2085212 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2085194 (Why is no real title available?) | 2004-08-09 | Paper |
Notes on \(q\)-ary interleaved sequences Chinese Science Bulletin | 2004-05-18 | Paper |
| scientific article; zbMATH DE number 2043347 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1972837 (Why is no real title available?) | 2004-02-08 | Paper |
| scientific article; zbMATH DE number 1943095 (Why is no real title available?) | 2004-01-08 | Paper |
| scientific article; zbMATH DE number 1943100 (Why is no real title available?) | 2004-01-08 | Paper |
| scientific article; zbMATH DE number 1943094 (Why is no real title available?) | 2003-12-17 | Paper |
| scientific article; zbMATH DE number 1980973 (Why is no real title available?) | 2003-09-15 | Paper |
Generating all linear orthomorphisms without repetition Discrete Mathematics | 2003-06-09 | Paper |
| scientific article; zbMATH DE number 1857528 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1594293 (Why is no real title available?) | 2003-03-12 | Paper |
| scientific article; zbMATH DE number 1808211 (Why is no real title available?) | 2002-12-03 | Paper |
Generating Large Instances of the Gong-Harn Cryptosystem Cryptography and Coding | 2002-11-25 | Paper |
| scientific article; zbMATH DE number 1759265 (Why is no real title available?) | 2002-11-24 | Paper |
| scientific article; zbMATH DE number 1808247 (Why is no real title available?) | 2002-09-26 | Paper |
On interleaved sequences over finite fields Discrete Mathematics | 2002-08-29 | Paper |
Decompositions of cascaded GMW functions Science in China. Series A | 2002-08-15 | Paper |
A conjecture on binary sequences with the "trinomial property" IEEE Transactions on Information Theory | 2002-08-04 | Paper |
| scientific article; zbMATH DE number 1740037 (Why is no real title available?) | 2002-05-14 | Paper |
| scientific article; zbMATH DE number 1740047 (Why is no real title available?) | 2002-05-14 | Paper |
| scientific article; zbMATH DE number 1689009 (Why is no real title available?) | 2002-01-09 | Paper |
| scientific article; zbMATH DE number 1972838 (Why is no real title available?) | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1972840 (Why is no real title available?) | 2002-01-01 | Paper |
| New families of ideal 2-level autocorrelation ternary sequences from second order DHT | 2001-10-15 | Paper |
| scientific article; zbMATH DE number 1091393 (Why is no real title available?) | 2001-03-04 | Paper |
Enumeration and criteria for cyclically shift-distinct GMW sequences IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Public-key cryptosystems based on cubic finite field extensions IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Transform domain analysis of DES IEEE Transactions on Information Theory | 2000-09-07 | Paper |
On a conjectured ideal autocorrelation sequence and a related triple-error correcting cyclic code IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Hadamard transforms of three-term sequences IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Theory and applications of q-ary interleaved sequences IEEE Transactions on Information Theory | 2000-08-28 | Paper |
Cyclic inequivalence of cascaded GMW-sequences Discrete Mathematics | 2000-08-03 | Paper |
| scientific article; zbMATH DE number 1440879 (Why is no real title available?) | 2000-05-08 | Paper |
Periodic binary sequences with the "trinomial property" IEEE Transactions on Information Theory | 1999-11-21 | Paper |
Binary sequences with two-level autocorrelation IEEE Transactions on Information Theory | 1999-11-21 | Paper |
A new class of nonlinear PN sequences over GF(q/sup n/) IEEE Transactions on Information Theory | 1998-12-13 | Paper |
Binary pseudorandom sequences of period 2/sup n/-1 with ideal autocorrelation IEEE Transactions on Information Theory | 1998-08-02 | Paper |
| scientific article; zbMATH DE number 1024499 (Why is no real title available?) | 1997-06-22 | Paper |
Q-ary cascaded GMW sequences IEEE Transactions on Information Theory | 1997-01-06 | Paper |
| scientific article; zbMATH DE number 566339 (Why is no real title available?) | 1994-05-10 | Paper |
| scientific article; zbMATH DE number 566338 (Why is no real title available?) | 1994-05-10 | Paper |
| scientific article; zbMATH DE number 503192 (Why is no real title available?) | 1994-02-17 | Paper |
| scientific article; zbMATH DE number 3764879 (Why is no real title available?) | 1982-01-01 | Paper |