Chao Li
Orcid: 0000-0001-7467-7573Affiliations:
- National University of Defense Technology, Changsha, China
According to our database1,
Chao Li
authored at least 131 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Improved (Related-Key) Differential-Based Neural Distinguishers for SIMON and SIMECK Block Ciphers.
Comput. J., February, 2024
Constructions of 2-resilient rotation symmetric Boolean functions with odd number of variables.
Theor. Comput. Sci., 2024
J. Inf. Secur. Appl., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
2023
Quaternion Wavelet Transform and a Feedforward Neural Network-Aided Intelligent Distributed Optical Fiber Sensing System.
Sensors, April, 2023
IEEE Trans. Inf. Theory, March, 2023
IET Inf. Secur., 2023
Finite Fields Their Appl., 2023
2022
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix.
Theor. Comput. Sci., 2022
IET Inf. Secur., 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.
IACR Cryptol. ePrint Arch., 2022
Improved Neural Distinguishers with (Related-key) Differentials: Applications in SIMON and SIMECK.
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
On equivalence between two known families of APN polynomial functions and APN power functions.
Cryptogr. Commun., 2022
Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
2021
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Finite Fields Their Appl., 2021
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.
Discret. Appl. Math., 2021
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.
Adv. Math. Commun., 2021
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
2020
A New Construction of (<i>m</i>+<i>k</i>, <i>m</i>)-Functions with Low Differential Uniformity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Finite Fields Their Appl., 2020
Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.
Adv. Math. Commun., 2020
2019
IEEE Trans. Inf. Theory, 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
CoRR, 2019
Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.
Adv. Math. Commun., 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018
Sci. China Inf. Sci., 2018
Permutation polynomials of the form cx + Tr<sub>q<sup>l</sup>/q</sub>(x<sup>a</sup>) and permutation trinomials over finite fields with even characteristic.
Cryptogr. Commun., 2018
New constructions of systematic authentication codes from three classes of cyclic codes.
Adv. Math. Commun., 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017
2016
Constructions of <i>p</i>-variable 1-resilient rotation symmetric functions over <i>GF(p)</i>.
Secur. Commun. Networks, 2016
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
A new method to investigate the CCZ-equivalence between functions with low differential uniformity.
Finite Fields Their Appl., 2016
More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.
Sci. China Inf. Sci., 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015
Finite Fields Their Appl., 2015
2014
IEEE Trans. Inf. Theory, 2014
Inf. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Sci. China Inf. Sci., 2014
Appl. Algebra Eng. Commun. Comput., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Inf. Theory, 2013
Math. Comput. Model., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n.
Finite Fields Their Appl., 2013
CoRR, 2013
Comput. Math. Appl., 2013
Sci. China Inf. Sci., 2013
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Math. Comput. Model., 2012
Int. J. Found. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
2011
J. Inf. Sci. Eng., 2011
IET Inf. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011
Proceedings of the 2011 World Congress on Internet Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Impossible Differential Cryptanalysis on Feistel Ciphers with <i>SP</i> and <i>SPS</i> Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009
IACR Cryptol. ePrint Arch., 2009
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
On the 2<sup>m</sup>-variable symmetric Boolean functions with maximum algebraic immunity.
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables.
IEEE Trans. Inf. Theory, 2007
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count.
IACR Cryptol. ePrint Arch., 2005