| Publication | Date of Publication | Type |
|---|
| Adaptive attacks against FESTA without input validation or constant-time implementation | 2025-02-07 | Paper |
The ECCA Security of Hybrid Encryptions Information Security Practice and Experience | 2022-12-09 | Paper |
The KDM-CCA Security of REACT Information Security Practice and Experience | 2022-12-09 | Paper |
On the linear complexity of feedforward clock-controlled sequence (available as arXiv preprint) | 2022-07-01 | Paper |
A new class of \(p\)-ary regular bent functions Advances in Mathematics of Communications | 2021-05-12 | Paper |
New quadratic bent functions in polynomial forms with coefficients in extension fields Applicable Algebra in Engineering, Communication and Computing | 2019-08-27 | Paper |
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves Information Processing Letters | 2017-11-03 | Paper |
Construction of efficient MDS matrices based on block circulant matrices for lightweight application Fundamenta Informaticae | 2017-07-28 | Paper |
The Weight Distributions of Cyclic Codes and Elliptic Curves IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Network coding signature schemes against related-key attacks in the random oracle model Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
A semantically secure public key cryptoscheme using bit-pair shadows Theoretical Computer Science | 2016-11-24 | Paper |
A note on semi-bent and hyper-bent Boolean functions Information Security and Cryptology | 2015-12-02 | Paper |
The Gallant-Lambert-Vanstone decomposition revisited Information Security and Cryptology | 2015-12-02 | Paper |
Implementing optimized pairings with elliptic nets Science China Information Sciences | 2015-11-20 | Paper |
Some techniques for faster scalar multiplication on GLS curves Information Processing Letters | 2015-11-05 | Paper |
A public key cryptoscheme using bit-pairs with provable semantical security Lecture Notes in Computer Science | 2015-10-29 | Paper |
Cryptography on twisted Edwards curves over local fields Science China Information Sciences | 2015-08-05 | Paper |
Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition International Journal of Computer Mathematics | 2015-06-24 | Paper |
A note on cyclic codes from APN functions Applicable Algebra in Engineering, Communication and Computing | 2014-10-02 | Paper |
Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one Information and Communications Security | 2014-09-29 | Paper |
On algorithmic aspects of the \(\ell\)-torsion of Brauer groups Quaestiones Mathematicae | 2013-11-19 | Paper |
Faster pairing computation on genus 2 hyperelliptic curves Information Processing Letters | 2013-03-28 | Paper |
Pseudorandom Generators Based on Subcovers for Finite Groups Information Security and Cryptology | 2013-01-07 | Paper |
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0 Designs, Codes and Cryptography | 2012-04-04 | Paper |
| An optimal multiplication algorithm for the \(\eta_T\) pairing over \(F_{3^{6m}}\) | 2011-09-29 | Paper |
| The pairing computation on binary Edwards curves | 2011-09-29 | Paper |
| scientific article; zbMATH DE number 5951445 (Why is no real title available?) | 2011-09-29 | Paper |
A generalization of Verheul's theorem for some ordinary curves Information Security and Cryptology | 2011-07-29 | Paper |
Hierarchical management scheme by local fields Acta Mathematica Sinica, English Series | 2011-06-24 | Paper |
| Approximation calculations on the elliptic curves over unramified extensions of 2-adic number fields | 2010-02-12 | Paper |
Some lower bounds for the spectral radius of matrices using traces Linear Algebra and its Applications | 2010-02-09 | Paper |
Cryptography on elliptic curves over \(p\) -adic number fields Science in China. Series F | 2008-05-07 | Paper |
A model of hierarchical key assignment scheme Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 1560377 (Why is no real title available?) | 2002-01-20 | Paper |
On<sub>p</sub>-series and the mullineux conjecture Communications in Algebra | 1999-12-20 | Paper |
On properties of the Mullineux map with an application to Schur modules Mathematical Proceedings of the Cambridge Philosophical Society | 1999-11-22 | Paper |
A break of public key cryptosystem PKCY Science in China. Series E | 1998-07-03 | Paper |
On mullineux' conjecture in the representation theory of symmetric groups Communications in Algebra | 1998-06-02 | Paper |
| scientific article; zbMATH DE number 713493 (Why is no real title available?) | 1995-01-19 | Paper |