Chuankun Wu

From MaRDI portal
Person:345714

Available identifiers

zbMath Open wu.chuankunMaRDI QIDQ345714

List of research outcomes





PublicationDate of PublicationType
On construction of resilient functions2024-07-11Paper
Dynamic tree-based authenticated group key exchange protocol2022-10-28Paper
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions2018-06-27Paper
On the construction of differentially 4-uniform involutions2017-09-05Paper
Comments on "Monomial Bent Functions" [Feb 2006 738-743]2017-07-12Paper
Boolean functions and their applications in cryptography2016-12-02Paper
Higher order nonlinearity of Niho functions2016-05-11Paper
On \((k,n)\) visual cryptography scheme with\( t\) essential parties2015-09-30Paper
Threshold secret image sharing2014-09-29Paper
Flexible Visual Cryptography Scheme and Its Application2014-05-06Paper
ESSVCS: an enriched secret sharing visual cryptography2014-05-06Paper
Cube attack on grain2013-11-19Paper
Analysis of an authenticated identity-based multicast scheme2013-10-18Paper
An ID-based authenticated dynamic group key agreement with optimal round2013-08-20Paper
Visual cryptography for natural images and visual voting2013-05-28Paper
Multi-pixel encryption visual cryptography2013-01-07Paper
On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v32013-01-07Paper
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers2012-09-10Paper
CMQV+: an authenticated key exchange protocol from CMQV2012-08-17Paper
On the equivalence of two definitions of visual cryptography scheme2012-06-29Paper
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity2012-06-20Paper
On guess and determine analysis of Rabbit2011-10-10Paper
An efficient dynamic authenticated key exchange protocol with selectable identities2011-09-18Paper
Some functions with low differential uniformity2011-07-19Paper
Linear Approximations of Addition Modulo 2n-12011-07-07Paper
Loiss: A Byte-Oriented Stream Cipher2011-06-08Paper
A byte-based guess and determine attack on SOSEMANUK2010-12-07Paper
A new definition of the contrast of visual cryptography scheme2010-09-07Paper
Set signatures and their applications2010-03-03Paper
Construction and enumeration of Boolean functions with maximum algebraic immunity2010-02-26Paper
Cryptanalysis of a new stream cipher structure2010-02-12Paper
The alignment problem of visual cryptography schemes2009-03-31Paper
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity2009-03-24Paper
An Unconditionally Secure Protocol for Multi-Party Set Intersection2009-03-10Paper
Security of the redefined Liaw's broadcasting cryptosystem2009-01-26Paper
Authenticated Group Key Agreement for Multicast2009-01-09Paper
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function2008-11-27Paper
Idetity based group key agreement from bilinear pairing2007-06-01Paper
Identity based group key agreement in multiple PKG environment2007-06-01Paper
https://portal.mardi4nfdi.de/entity/Q57145352006-01-03Paper
Differential Factoring for Integers2005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56994322005-10-26Paper
On the independence of Boolean functions2005-03-07Paper
Construction of cryptographically important Boolean permutations2005-02-09Paper
Correlation immunity and resiliency of symmetric Boolean functions2004-10-27Paper
https://portal.mardi4nfdi.de/entity/Q44736362004-08-04Paper
Construction of 2-designs2002-06-25Paper
Public key cryptosystems based on boolean permutations and their applications2000-11-22Paper
https://portal.mardi4nfdi.de/entity/Q44950792000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44885662000-07-09Paper
https://portal.mardi4nfdi.de/entity/Q38425161999-02-18Paper
Existence of generalized inverse of linear transformations over finite fields1998-12-06Paper
https://portal.mardi4nfdi.de/entity/Q43736281998-05-29Paper
https://portal.mardi4nfdi.de/entity/Q43595901997-10-20Paper
Efficient construction of permutations of high nonlinearity1993-12-20Paper
Some spectral techniques in coding theory1991-01-01Paper

Research outcomes over time

This page was built for person: Chuankun Wu