Chuankun Wu

From MaRDI portal
(Redirected from Person:345714)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On construction of resilient functions2024-07-11Paper
Dynamic tree-based authenticated group key exchange protocol
Science China Information Sciences
2022-10-28Paper
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
IEEE Transactions on Information Theory
2018-06-27Paper
On the construction of differentially 4-uniform involutions
Finite Fields and their Applications
2017-09-05Paper
Comments on "Monomial Bent Functions" [Feb 2006 738-743]
IEEE Transactions on Information Theory
2017-07-12Paper
Boolean functions and their applications in cryptography
Advances in Computer Science and Technology
2016-12-02Paper
Higher order nonlinearity of Niho functions
Fundamenta Informaticae
2016-05-11Paper
On \((k,n)\) visual cryptography scheme with\( t\) essential parties
Lecture Notes in Computer Science
2015-09-30Paper
Threshold secret image sharing
Information and Communications Security
2014-09-29Paper
Flexible Visual Cryptography Scheme and Its Application
Transactions on Data Hiding and Multimedia Security IX
2014-05-06Paper
ESSVCS: an enriched secret sharing visual cryptography
Transactions on Data Hiding and Multimedia Security IX
2014-05-06Paper
Cube attack on grain
Journal of Software
2013-11-19Paper
Analysis of an authenticated identity-based multicast scheme
IET Communications
2013-10-18Paper
An ID-based authenticated dynamic group key agreement with optimal round
Science China Information Sciences
2013-08-20Paper
Visual cryptography for natural images and visual voting
Information Security and Cryptology
2013-05-28Paper
Multi-pixel encryption visual cryptography
Information Security and Cryptology
2013-01-07Paper
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3
Information Security and Cryptology
2013-01-07Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers
Applied Cryptography and Network Security
2012-09-10Paper
CMQV+: an authenticated key exchange protocol from CMQV
Science China Information Sciences
2012-08-17Paper
On the equivalence of two definitions of visual cryptography scheme
Information Security Practice and Experience
2012-06-29Paper
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity
Applicable Algebra in Engineering, Communication and Computing
2012-06-20Paper
On guess and determine analysis of Rabbit
International Journal of Foundations of Computer Science
2011-10-10Paper
An efficient dynamic authenticated key exchange protocol with selectable identities
Computers & Mathematics with Applications
2011-09-18Paper
Some functions with low differential uniformity
Wuhan University Journal of Natural Sciences
2011-07-19Paper
Linear Approximations of Addition Modulo 2n-1
Fast Software Encryption
2011-07-07Paper
Loiss: A Byte-Oriented Stream Cipher
Lecture Notes in Computer Science
2011-06-08Paper
A byte-based guess and determine attack on SOSEMANUK
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
A new definition of the contrast of visual cryptography scheme
Information Processing Letters
2010-09-07Paper
Set signatures and their applications
Science in China. Series F
2010-03-03Paper
Construction and enumeration of Boolean functions with maximum algebraic immunity
Science in China. Series F
2010-02-26Paper
Cryptanalysis of a new stream cipher structure
Journal of Software
2010-02-12Paper
The alignment problem of visual cryptography schemes
Designs, Codes and Cryptography
2009-03-31Paper
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity
Information Sciences
2009-03-24Paper
An Unconditionally Secure Protocol for Multi-Party Set Intersection
Applied Cryptography and Network Security
2009-03-10Paper
Security of the redefined Liaw's broadcasting cryptosystem
Computers & Mathematics with Applications
2009-01-26Paper
Authenticated Group Key Agreement for Multicast
Cryptology and Network Security
2009-01-09Paper
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Idetity based group key agreement from bilinear pairing
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Identity based group key agreement in multiple PKG environment
Wuhan University Journal of Natural Sciences
2007-06-01Paper
scientific article; zbMATH DE number 2242707 (Why is no real title available?)2006-01-03Paper
Differential Factoring for Integers
The International Series in Engineering and Computer Science
2005-11-02Paper
scientific article; zbMATH DE number 2217663 (Why is no real title available?)2005-10-26Paper
On the independence of Boolean functions
International Journal of Computer Mathematics
2005-03-07Paper
Construction of cryptographically important Boolean permutations
Applicable Algebra in Engineering, Communication and Computing
2005-02-09Paper
Correlation immunity and resiliency of symmetric Boolean functions
Theoretical Computer Science
2004-10-27Paper
scientific article; zbMATH DE number 2080721 (Why is no real title available?)2004-08-04Paper
Construction of 2-designs
Applied Mathematics. Series B (English Edition)
2002-06-25Paper
Public key cryptosystems based on boolean permutations and their applications
International Journal of Computer Mathematics
2000-11-22Paper
scientific article; zbMATH DE number 1487951 (Why is no real title available?)2000-08-10Paper
scientific article; zbMATH DE number 1471071 (Why is no real title available?)2000-07-09Paper
scientific article; zbMATH DE number 1191206 (Why is no real title available?)1999-02-18Paper
Existence of generalized inverse of linear transformations over finite fields
Finite Fields and their Applications
1998-12-06Paper
scientific article; zbMATH DE number 1107685 (Why is no real title available?)1998-05-29Paper
scientific article; zbMATH DE number 1076147 (Why is no real title available?)1997-10-20Paper
Efficient construction of permutations of high nonlinearity
Chinese Science Bulletin
1993-12-20Paper
Some spectral techniques in coding theory
Discrete Mathematics
1991-01-01Paper


Research outcomes over time


This page was built for person: Chuankun Wu