| Publication | Date of Publication | Type |
|---|
Towards a classification of permutation binomials of the form \(x^i+ax\) over \(\mathbb{F}_{2^n}\) Designs, Codes and Cryptography | 2024-12-11 | Paper |
A classification of permutation binomials of the form $x^i+ax$ over $\mathbb{F}_{2^n}$ for dimensions up to 8 | 2023-12-28 | Paper |
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited Designs, Codes and Cryptography | 2023-04-28 | Paper |
The expectation and variance of the number of solutions of a class of differential system of modular addition SCIENTIA SINICA Mathematica | 2022-03-21 | Paper |
Grain-like structures with minimal and maximal period sequences Designs, Codes and Cryptography | 2021-05-10 | Paper |
On the Derivative Imbalance and Ambiguity of Functions IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Further results on complete permutation monomials over finite fields Finite Fields and their Applications | 2019-06-18 | Paper |
Complete permutation polynomials with the form \((x^{p^m} - x + \delta)^s + a x^{p^m} + b x\) over \(\mathbb{F}_{p^n}\) Finite Fields and their Applications | 2019-06-18 | Paper |
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions Designs, Codes and Cryptography | 2019-06-06 | Paper |
On algebraic immunity of trace inverse functions on finite fields of characteristic two Journal of Systems Science and Complexity | 2019-05-23 | Paper |
Involutory differentially 4-uniform permutations from known constructions Designs, Codes and Cryptography | 2019-01-11 | Paper |
Cryptanalysis of a chaotic stream cipher and its improved scheme International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2018-07-20 | Paper |
The initialization stage analysis of ZUC v1.5 Cryptology and Network Security | 2012-07-20 | Paper |
On guess and determine analysis of Rabbit International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Linear Approximations of Addition Modulo 2n-1 Fast Software Encryption | 2011-07-07 | Paper |
Loiss: A Byte-Oriented Stream Cipher Lecture Notes in Computer Science | 2011-06-08 | Paper |
A byte-based guess and determine attack on SOSEMANUK Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Expected Value of the Linear Complexity of Two-Dimensional Binary Sequences Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
Multi-continued Fraction Algorithm and Generalized B-M Algorithm over F 2 Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
A criterion for periodicity of multi-continued fraction expansion of multi-formal Laurent series Acta Arithmetica | 2007-11-15 | Paper |
Classification and counting on multi-continued fractions and its application to multi-sequences Science in China. Series F | 2007-10-12 | Paper |
Multi-sequences with \(d\)-perfect property Journal of Complexity | 2005-04-21 | Paper |