Wen-Feng Qi
Orcid: 0000-0002-3031-4719Affiliations:
- Information Engineering University, Zhengzhou, China
- PLA Strategic Support Force Information Engineering University, Zhengzhou, China
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
According to our database1,
Wen-Feng Qi
authored at least 103 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128.
Cryptogr. Commun., September, 2024
Cryptogr. Commun., July, 2024
J. Syst. Sci. Complex., June, 2024
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities.
J. Inf. Secur. Appl., February, 2024
IACR Trans. Symmetric Cryptol., 2024
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS.
IET Inf. Secur., 2024
2023
Des. Codes Cryptogr., December, 2023
J. Syst. Sci. Complex., October, 2023
Non-Existence of One-Byte Active Impossible Differentials for 5-Round AES in the Master-Key Setting.
J. Syst. Sci. Complex., June, 2023
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64.
J. Cryptogr. Eng., June, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Provable and Practical Security, 2023
SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Finite Fields Their Appl., 2022
Des. Codes Cryptogr., 2022
2021
Finite Fields Their Appl., 2021
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2<sup>p</sup>).
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
On the Provable Security Against Truncated Impossible Differential Cryptanalysis for AES in the Master-Key Setting.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Finite Fields Their Appl., 2020
Des. Codes Cryptogr., 2020
Cryptogr. Commun., 2020
Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
2019
IEEE Trans. Inf. Theory, 2019
J. Syst. Sci. Complex., 2019
Constructions of de Bruijn sequences from a full-length shift register and an irreducible LFSR.
Finite Fields Their Appl., 2019
Finite Fields Their Appl., 2019
Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures.
Des. Codes Cryptogr., 2019
Des. Codes Cryptogr., 2019
Discret. Appl. Math., 2019
2018
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0.
IET Inf. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
Finite Fields Their Appl., 2018
Finite Fields Their Appl., 2018
Des. Codes Cryptogr., 2018
Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
IET Inf. Secur., 2017
IET Inf. Secur., 2017
IET Inf. Secur., 2017
2016
Des. Codes Cryptogr., 2016
Cryptogr. Commun., 2016
2015
Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR.
IEEE Trans. Inf. Theory, 2015
J. Syst. Sci. Complex., 2015
Further results on the distinctness of modulo 2 reductions of primitive sequences over Z/(2<sup>32</sup>-1).
Des. Codes Cryptogr., 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
2013
Further Result on Distribution Properties of Compressing Sequences Derived From Primitive Sequences Over Z/(p<sup>e</sup>).
IEEE Trans. Inf. Theory, 2013
On the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers.
IEEE Trans. Inf. Theory, 2013
Further Results on the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers.
IEEE Trans. Inf. Theory, 2013
J. Complex., 2013
On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of Variables.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity.
Des. Codes Cryptogr., 2013
2012
Distribution of one-error linear complexity of binary sequences for arbitrary prime period.
J. Syst. Sci. Complex., 2012
On the distinctness of modular reductions of primitive sequences modulo square-free odd integers.
Inf. Process. Lett., 2012
Finite Fields Their Appl., 2012
Des. Codes Cryptogr., 2012
Appl. Algebra Eng. Commun. Comput., 2012
2011
Finite Fields Their Appl., 2011
2010
Distribution properties of compressing sequences derived from primitive sequences over Z/(p<sup>e</sup>).
IEEE Trans. Inf. Theory, 2010
Des. Codes Cryptogr., 2010
2009
SIAM J. Discret. Math., 2009
Finite Fields Their Appl., 2009
Finite Fields Their Appl., 2009
Finite Fields Their Appl., 2009
Des. Codes Cryptogr., 2009
Cryptogr. Commun., 2009
2008
IEEE Trans. Inf. Theory, 2008
On the distinctness of modular reductions of maximal length sequences modulo odd prime powers.
Math. Comput., 2008
2007
IEEE Trans. Inf. Theory, 2007
IEEE Trans. Inf. Theory, 2007
Uniqueness of the distribution of zeroes of primitive level sequences over Z/(p<sup>e</sup>) (II).
Finite Fields Their Appl., 2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
Symmetric Boolean functions depending on an odd number of variables with maximum algebraic immunity.
IEEE Trans. Inf. Theory, 2006
Finite Fields Their Appl., 2006
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
CoRR, 2006
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Sequences and Their Applications, 2006
Construction and Analysis of Boolean Functions of 2<i>t</i>+1 Variables with Maximum Algebraic Immunity.
Proceedings of the Advances in Cryptology, 2006
2005
Uniqueness of the distribution of zeroes of primitive level sequences over Z/(p<sup>e</sup>).
Finite Fields Their Appl., 2005
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
CoRR, 2005
2003