Maozhi Xu

From MaRDI portal
(Redirected from Person:846330)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Adaptive attacks against FESTA without input validation or constant-time implementation2025-02-07Paper
The ECCA Security of Hybrid Encryptions
Information Security Practice and Experience
2022-12-09Paper
The KDM-CCA Security of REACT
Information Security Practice and Experience
2022-12-09Paper
On the linear complexity of feedforward clock-controlled sequence
(available as arXiv preprint)
2022-07-01Paper
A new class of \(p\)-ary regular bent functions
Advances in Mathematics of Communications
2021-05-12Paper
New quadratic bent functions in polynomial forms with coefficients in extension fields
Applicable Algebra in Engineering, Communication and Computing
2019-08-27Paper
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves
Information Processing Letters
2017-11-03Paper
Construction of efficient MDS matrices based on block circulant matrices for lightweight application
Fundamenta Informaticae
2017-07-28Paper
The Weight Distributions of Cyclic Codes and Elliptic Curves
IEEE Transactions on Information Theory
2017-06-08Paper
Network coding signature schemes against related-key attacks in the random oracle model
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
A semantically secure public key cryptoscheme using bit-pair shadows
Theoretical Computer Science
2016-11-24Paper
A note on semi-bent and hyper-bent Boolean functions
Information Security and Cryptology
2015-12-02Paper
The Gallant-Lambert-Vanstone decomposition revisited
Information Security and Cryptology
2015-12-02Paper
Implementing optimized pairings with elliptic nets
Science China Information Sciences
2015-11-20Paper
Some techniques for faster scalar multiplication on GLS curves
Information Processing Letters
2015-11-05Paper
A public key cryptoscheme using bit-pairs with provable semantical security
Lecture Notes in Computer Science
2015-10-29Paper
Cryptography on twisted Edwards curves over local fields
Science China Information Sciences
2015-08-05Paper
Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition
International Journal of Computer Mathematics
2015-06-24Paper
A note on cyclic codes from APN functions
Applicable Algebra in Engineering, Communication and Computing
2014-10-02Paper
Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one
Information and Communications Security
2014-09-29Paper
On algorithmic aspects of the \(\ell\)-torsion of Brauer groups
Quaestiones Mathematicae
2013-11-19Paper
Faster pairing computation on genus 2 hyperelliptic curves
Information Processing Letters
2013-03-28Paper
Pseudorandom Generators Based on Subcovers for Finite Groups
Information Security and Cryptology
2013-01-07Paper
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0
Designs, Codes and Cryptography
2012-04-04Paper
An optimal multiplication algorithm for the \(\eta_T\) pairing over \(F_{3^{6m}}\)2011-09-29Paper
The pairing computation on binary Edwards curves2011-09-29Paper
scientific article; zbMATH DE number 5951445 (Why is no real title available?)2011-09-29Paper
A generalization of Verheul's theorem for some ordinary curves
Information Security and Cryptology
2011-07-29Paper
Hierarchical management scheme by local fields
Acta Mathematica Sinica, English Series
2011-06-24Paper
Approximation calculations on the elliptic curves over unramified extensions of 2-adic number fields2010-02-12Paper
Some lower bounds for the spectral radius of matrices using traces
Linear Algebra and its Applications
2010-02-09Paper
Cryptography on elliptic curves over \(p\) -adic number fields
Science in China. Series F
2008-05-07Paper
A model of hierarchical key assignment scheme
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1560377 (Why is no real title available?)2002-01-20Paper
On<sub>p</sub>-series and the mullineux conjecture
Communications in Algebra
1999-12-20Paper
On properties of the Mullineux map with an application to Schur modules
Mathematical Proceedings of the Cambridge Philosophical Society
1999-11-22Paper
A break of public key cryptosystem PKCY
Science in China. Series E
1998-07-03Paper
On mullineux' conjecture in the representation theory of symmetric groups
Communications in Algebra
1998-06-02Paper
scientific article; zbMATH DE number 713493 (Why is no real title available?)1995-01-19Paper


Research outcomes over time


This page was built for person: Maozhi Xu