The following pages link to Chuan-Kun Wu (Q345714):
Displaying 50 items.
- Boolean functions and their applications in cryptography (Q345716) (← links)
- An ID-based authenticated dynamic group key agreement with optimal round (Q362177) (← links)
- (Q429739) (redirect page) (← links)
- The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity (Q429740) (← links)
- CMQV+: an authenticated key exchange protocol from CMQV (Q439860) (← links)
- An efficient dynamic authenticated key exchange protocol with selectable identities (Q639064) (← links)
- Efficient construction of permutations of high nonlinearity (Q687925) (← links)
- Set signatures and their applications (Q848269) (← links)
- (Q991764) (redirect page) (← links)
- A new definition of the contrast of visual cryptography scheme (Q991766) (← links)
- The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity (Q1007842) (← links)
- The alignment problem of visual cryptography schemes (Q1009109) (← links)
- Existence of generalized inverse of linear transformations over finite fields (Q1273208) (← links)
- Construction of 2-designs (Q1288294) (← links)
- Construction of cryptographically important Boolean permutations (Q1762561) (← links)
- Correlation immunity and resiliency of symmetric Boolean functions (Q1884952) (← links)
- Construction and enumeration of Boolean functions with maximum algebraic immunity (Q2266998) (← links)
- On the construction of differentially 4-uniform involutions (Q2401973) (← links)
- Security of the redefined Liaw's broadcasting cryptosystem (Q2519506) (← links)
- Some spectral techniques in coding theory (Q2639831) (← links)
- Higher Order Nonlinearity of Niho Functions (Q2805436) (← links)
- Analysis of an authenticated identity-based multicast scheme (Q2854410) (← links)
- Cube Attack on Grain (Q2858426) (← links)
- On the Equivalence of Two Definitions of Visual Cryptography Scheme (Q2894362) (← links)
- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers (Q2907518) (← links)
- Threshold Secret Image Sharing (Q2920983) (← links)
- On $$(k, n)$$ Visual Cryptography Scheme with $$t$$ Essential Parties (Q2948252) (← links)
- Loiss: A Byte-Oriented Stream Cipher (Q3005584) (← links)
- Linear Approximations of Addition Modulo 2n-1 (Q3013094) (← links)
- Some functions with low differential uniformity (Q3017405) (← links)
- A Byte-Based Guess and Determine Attack on SOSEMANUK (Q3058654) (← links)
- ON GUESS AND DETERMINE ANALYSIS OF RABBIT (Q3173471) (← links)
- Cryptanalysis of a New Stream Cipher Structure (Q3406347) (← links)
- Identity based group key agreement in multiple PKG environment (Q3443235) (← links)
- Idetity based group key agreement from bilinear pairing (Q3443280) (← links)
- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function (Q3541940) (← links)
- An Unconditionally Secure Protocol for Multi-Party Set Intersection (Q3612384) (← links)
- (Q3842516) (← links)
- (Q4359590) (← links)
- (Q4373628) (← links)
- (Q4473636) (← links)
- (Q4488566) (← links)
- (Q4495079) (← links)
- Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions (Q4566639) (← links)
- On the independence of Boolean functions (Q4653698) (← links)
- Multi-pixel Encryption Visual Cryptography (Q4899197) (← links)
- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 (Q4899205) (← links)
- Visual Cryptography for Natural Images and Visual Voting (Q4922037) (← links)
- Public key cryptosystems based on boolean permutations and their applications (Q4954029) (← links)
- Dynamic tree-based authenticated group key exchange protocol (Q5046441) (← links)