Chuan-Kun Wu

From MaRDI portal
Person:345714

Available identifiers

zbMath Open wu.chuankunMaRDI QIDQ345714

List of research outcomes

PublicationDate of PublicationType
Dynamic tree-based authenticated group key exchange protocol2022-10-28Paper
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions2018-06-27Paper
On the construction of differentially 4-uniform involutions2017-09-05Paper
Comments on "Monomial Bent Functions" [Feb 2006 738-743]2017-07-12Paper
Boolean functions and their applications in cryptography2016-12-02Paper
Higher Order Nonlinearity of Niho Functions2016-05-11Paper
On $$(k, n)$$ Visual Cryptography Scheme with $$t$$ Essential Parties2015-09-30Paper
Threshold Secret Image Sharing2014-09-29Paper
ESSVCS: An Enriched Secret Sharing Visual Cryptography2014-05-06Paper
Flexible Visual Cryptography Scheme and Its Application2014-05-06Paper
Cube Attack on Grain2013-11-19Paper
Analysis of an authenticated identity-based multicast scheme2013-10-18Paper
An ID-based authenticated dynamic group key agreement with optimal round2013-08-20Paper
Visual Cryptography for Natural Images and Visual Voting2013-05-28Paper
Multi-pixel Encryption Visual Cryptography2013-01-07Paper
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v32013-01-07Paper
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers2012-09-10Paper
CMQV+: an authenticated key exchange protocol from CMQV2012-08-17Paper
On the Equivalence of Two Definitions of Visual Cryptography Scheme2012-06-29Paper
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity2012-06-20Paper
ON GUESS AND DETERMINE ANALYSIS OF RABBIT2011-10-10Paper
An efficient dynamic authenticated key exchange protocol with selectable identities2011-09-18Paper
Some functions with low differential uniformity2011-07-19Paper
Linear Approximations of Addition Modulo 2n-12011-07-07Paper
Loiss: A Byte-Oriented Stream Cipher2011-06-08Paper
A Byte-Based Guess and Determine Attack on SOSEMANUK2010-12-07Paper
A new definition of the contrast of visual cryptography scheme2010-09-07Paper
Set signatures and their applications2010-03-03Paper
Construction and enumeration of Boolean functions with maximum algebraic immunity2010-02-26Paper
Cryptanalysis of a New Stream Cipher Structure2010-02-12Paper
The alignment problem of visual cryptography schemes2009-03-31Paper
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity2009-03-24Paper
An Unconditionally Secure Protocol for Multi-Party Set Intersection2009-03-10Paper
Security of the redefined Liaw's broadcasting cryptosystem2009-01-26Paper
Authenticated Group Key Agreement for Multicast2009-01-09Paper
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function2008-11-27Paper
Identity based group key agreement in multiple PKG environment2007-06-01Paper
Idetity based group key agreement from bilinear pairing2007-06-01Paper
https://portal.mardi4nfdi.de/entity/Q57145352006-01-03Paper
Differential Factoring for Integers2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56994322005-10-26Paper
On the independence of Boolean functions2005-03-07Paper
Construction of cryptographically important Boolean permutations2005-02-09Paper
Correlation immunity and resiliency of symmetric Boolean functions2004-10-27Paper
https://portal.mardi4nfdi.de/entity/Q44736362004-08-04Paper
Construction of 2-designs2002-06-25Paper
Public key cryptosystems based on boolean permutations and their applications2000-11-22Paper
https://portal.mardi4nfdi.de/entity/Q44950792000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44885662000-07-09Paper
https://portal.mardi4nfdi.de/entity/Q38425161999-02-18Paper
Existence of generalized inverse of linear transformations over finite fields1998-12-06Paper
https://portal.mardi4nfdi.de/entity/Q43736281998-05-29Paper
https://portal.mardi4nfdi.de/entity/Q43595901997-10-20Paper
Efficient construction of permutations of high nonlinearity1993-12-20Paper
Some spectral techniques in coding theory1991-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Chuan-Kun Wu