| Publication | Date of Publication | Type |
|---|
| On construction of resilient functions | 2024-07-11 | Paper |
Dynamic tree-based authenticated group key exchange protocol Science China Information Sciences | 2022-10-28 | Paper |
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions IEEE Transactions on Information Theory | 2018-06-27 | Paper |
On the construction of differentially 4-uniform involutions Finite Fields and their Applications | 2017-09-05 | Paper |
Comments on "Monomial Bent Functions" [Feb 2006 738-743] IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Boolean functions and their applications in cryptography Advances in Computer Science and Technology | 2016-12-02 | Paper |
Higher order nonlinearity of Niho functions Fundamenta Informaticae | 2016-05-11 | Paper |
On \((k,n)\) visual cryptography scheme with\( t\) essential parties Lecture Notes in Computer Science | 2015-09-30 | Paper |
Threshold secret image sharing Information and Communications Security | 2014-09-29 | Paper |
Flexible Visual Cryptography Scheme and Its Application Transactions on Data Hiding and Multimedia Security IX | 2014-05-06 | Paper |
ESSVCS: an enriched secret sharing visual cryptography Transactions on Data Hiding and Multimedia Security IX | 2014-05-06 | Paper |
Cube attack on grain Journal of Software | 2013-11-19 | Paper |
Analysis of an authenticated identity-based multicast scheme IET Communications | 2013-10-18 | Paper |
An ID-based authenticated dynamic group key agreement with optimal round Science China Information Sciences | 2013-08-20 | Paper |
Visual cryptography for natural images and visual voting Information Security and Cryptology | 2013-05-28 | Paper |
Multi-pixel encryption visual cryptography Information Security and Cryptology | 2013-01-07 | Paper |
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3 Information Security and Cryptology | 2013-01-07 | Paper |
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers Applied Cryptography and Network Security | 2012-09-10 | Paper |
CMQV+: an authenticated key exchange protocol from CMQV Science China Information Sciences | 2012-08-17 | Paper |
On the equivalence of two definitions of visual cryptography scheme Information Security Practice and Experience | 2012-06-29 | Paper |
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity Applicable Algebra in Engineering, Communication and Computing | 2012-06-20 | Paper |
On guess and determine analysis of Rabbit International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
An efficient dynamic authenticated key exchange protocol with selectable identities Computers & Mathematics with Applications | 2011-09-18 | Paper |
Some functions with low differential uniformity Wuhan University Journal of Natural Sciences | 2011-07-19 | Paper |
Linear Approximations of Addition Modulo 2n-1 Fast Software Encryption | 2011-07-07 | Paper |
Loiss: A Byte-Oriented Stream Cipher Lecture Notes in Computer Science | 2011-06-08 | Paper |
A byte-based guess and determine attack on SOSEMANUK Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
A new definition of the contrast of visual cryptography scheme Information Processing Letters | 2010-09-07 | Paper |
Set signatures and their applications Science in China. Series F | 2010-03-03 | Paper |
Construction and enumeration of Boolean functions with maximum algebraic immunity Science in China. Series F | 2010-02-26 | Paper |
Cryptanalysis of a new stream cipher structure Journal of Software | 2010-02-12 | Paper |
The alignment problem of visual cryptography schemes Designs, Codes and Cryptography | 2009-03-31 | Paper |
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity Information Sciences | 2009-03-24 | Paper |
An Unconditionally Secure Protocol for Multi-Party Set Intersection Applied Cryptography and Network Security | 2009-03-10 | Paper |
Security of the redefined Liaw's broadcasting cryptosystem Computers & Mathematics with Applications | 2009-01-26 | Paper |
Authenticated Group Key Agreement for Multicast Cryptology and Network Security | 2009-01-09 | Paper |
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Idetity based group key agreement from bilinear pairing Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Identity based group key agreement in multiple PKG environment Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
| scientific article; zbMATH DE number 2242707 (Why is no real title available?) | 2006-01-03 | Paper |
Differential Factoring for Integers The International Series in Engineering and Computer Science | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2217663 (Why is no real title available?) | 2005-10-26 | Paper |
On the independence of Boolean functions International Journal of Computer Mathematics | 2005-03-07 | Paper |
Construction of cryptographically important Boolean permutations Applicable Algebra in Engineering, Communication and Computing | 2005-02-09 | Paper |
Correlation immunity and resiliency of symmetric Boolean functions Theoretical Computer Science | 2004-10-27 | Paper |
| scientific article; zbMATH DE number 2080721 (Why is no real title available?) | 2004-08-04 | Paper |
Construction of 2-designs Applied Mathematics. Series B (English Edition) | 2002-06-25 | Paper |
Public key cryptosystems based on boolean permutations and their applications International Journal of Computer Mathematics | 2000-11-22 | Paper |
| scientific article; zbMATH DE number 1487951 (Why is no real title available?) | 2000-08-10 | Paper |
| scientific article; zbMATH DE number 1471071 (Why is no real title available?) | 2000-07-09 | Paper |
| scientific article; zbMATH DE number 1191206 (Why is no real title available?) | 1999-02-18 | Paper |
Existence of generalized inverse of linear transformations over finite fields Finite Fields and their Applications | 1998-12-06 | Paper |
| scientific article; zbMATH DE number 1107685 (Why is no real title available?) | 1998-05-29 | Paper |
| scientific article; zbMATH DE number 1076147 (Why is no real title available?) | 1997-10-20 | Paper |
Efficient construction of permutations of high nonlinearity Chinese Science Bulletin | 1993-12-20 | Paper |
Some spectral techniques in coding theory Discrete Mathematics | 1991-01-01 | Paper |