Search Results - "LONGJIANG QU"
-
1
New Results About the Boomerang Uniformity of Permutation Polynomials
Published in IEEE transactions on information theory (01-11-2019)“…In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: boomerang connectivity table (BCT for short) for evaluating…”
Get full text
Journal Article -
2
A New Approach to Constructing Quadratic Pseudo-Planar Functions Over
Published in IEEE transactions on information theory (01-11-2016)“…Planar functions over finite fields give rise to finite projective planes. They were also used in the constructions of DES-like iterated ciphers,…”
Get full text
Journal Article -
3
New classes of permutation binomials and permutation trinomials over finite fields
Published in Finite fields and their applications (01-01-2017)“…Permutation polynomials over finite fields play important roles in finite fields theory. They also have wide applications in many areas of science and…”
Get full text
Journal Article -
4
Cryptographically strong permutations from the butterfly structure
Published in Designs, codes, and cryptography (01-04-2021)“…Boomerang connectivity table is a new tool to characterize the vulnerability of cryptographic functions against boomerang attacks. Consequently, a…”
Get full text
Journal Article -
5
Constructing Symmetric Boolean Functions With Maximum Algebraic Immunity
Published in IEEE transactions on information theory (01-05-2009)“…Symmetric Boolean functions with even variables 2k and maximum algebraic immunity AI (f) = k have been constructed in Braeken's thesis (2006). In this paper,…”
Get full text
Journal Article -
6
A New Method to Compute the 2-Adic Complexity of Binary Sequences
Published in IEEE transactions on information theory (01-04-2014)“…In this paper, a new method is presented to compute the 2-adic complexity of pseudo-random sequences. With this method, the 2-adic complexities of all the…”
Get full text
Journal Article -
7
On two conjectures about the intersection distribution
Published in Journal of algebraic combinatorics (2022)“…Recently, Li and Pott proposed a new concept of intersection distribution concerning the interaction between the graph { ( x , f ( x ) ) | x ∈ F q } of f and…”
Get full text
Journal Article -
8
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix
Published in Theoretical computer science (05-06-2022)“…In this paper, the properties of symbol transformations of cyclic Hadamard matrices are studied. An infinite class of (n−1)-variable 2-resilient rotation…”
Get full text
Journal Article -
9
A New Random Sampling Method and Its Application in Improving Progressive BKZ Algorithm
Published in Journal of systems science and complexity (01-10-2024)“…Random sampling algorithm was proposed firstly by Schnorr in 2003 to find short lattice vectors, as an alternative to enumeration. The follow-up developments…”
Get full text
Journal Article -
10
Constructing Differentially 4-Uniform Permutations Over F22k via the Switching Method
Published in IEEE transactions on information theory (2013)Get full text
Journal Article -
11
On the Construction of Boolean Functions With Optimal Algebraic Immunity
Published in IEEE transactions on information theory (01-03-2008)“…In this correspondence, we introduce a method to construct Boolean functions in any number of variables, with optimal algebraic immunity. Remarkably, all…”
Get full text
Journal Article -
12
Differential and boomerang spectrums of some power permutations
Published in Cryptography and communications (01-03-2022)“…The differential (resp. boomerang) spectrum is an important parameter to estimate the resistance of cryptographic functions against some variants of…”
Get full text
Journal Article -
13
Minimal linear codes from weakly regular bent functions
Published in Cryptography and communications (01-03-2022)“…Minimal linear codes have received much attention in the past decades due to their important applications in secret sharing schemes and secure two-party…”
Get full text
Journal Article -
14
New constructions of involutions over finite fields
Published in Cryptography and communications (01-03-2020)“…Involutions over finite fields are permutations whose compositional inverses are themselves. Involutions especially over F q with q is even have been used in…”
Get full text
Journal Article -
15
A new algorithm on the minimal rational fraction representation of feedback with carry shift registers
Published in Designs, codes, and cryptography (01-03-2020)“…In 1994, Klapper and Goresky (Proceedings of the 1993 Cambridge Security Workshop, Lecture Notes in Computer Science, vol 809, Cambridge, pp 174–178, 1994 )…”
Get full text
Journal Article -
16
More permutations and involutions for constructing bent functions
Published in Cryptography and communications (01-05-2021)“…Bent functions are extremal combinatorial objects with several applications, such as coding theory, maximum length sequences, cryptography, the theory of…”
Get full text
Journal Article -
17
Vulnerable Public Keys in NTRU Cryptosystem
Published in Chinese annals of mathematics. Serie B (01-09-2020)“…In this paper the authors give an efficient bounded distance decoding (BDD for short) algorithm for NTRU lattices under some conditions about the modulus…”
Get full text
Journal Article -
18
A New Automatic Tool Searching for Impossible Differential of NIST Candidate ACE
Published in Mathematics (Basel) (01-09-2020)“…The ACE algorithm is a candidate of the Lightweight Cryptography standardization process started by the National Institute of Standards and Technology (NIST)…”
Get full text
Journal Article -
19
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions
Published in IEEE transactions on information theory (01-01-2009)“…In this paper, the weight distributions of two classes of linear codes based on all known explicit perfect nonlinear functions from Fqm to itself are…”
Get full text
Journal Article -
20
Compositional inverses of permutation polynomials of the form xrh(xs) over finite fields
Published in Cryptography and communications (15-03-2019)“…The study of computing compositional inverses of permutation polynomials over finite fields efficiently is motivated by an open problem proposed by G. L…”
Get full text
Journal Article