Jinyong Shan
Orcid: 0000-0001-6237-986X
According to our database1,
Jinyong Shan
authored at least 21 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Dataset, May, 2024
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data.
Cybersecur., December, 2023
IEEE Trans. Ind. Informatics, 2023
Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.
IEEE Trans. Inf. Forensics Secur., 2023
2022
Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond.
CoRR, 2022
2018
J. Syst. Sci. Complex., 2018
2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015
Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the IEEE International Conference on Information and Automation, 2014
2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012
2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011
2010
IACR Cryptol. ePrint Arch., 2010