Xian-Mo Zhang
According to our database1,
Xian-Mo Zhang
authored at least 54 papers
between 1990 and 2011.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011
2009
Int. J. Appl. Cryptogr., 2009
2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
Proceedings of the Information Security and Cryptology, 2005
2004
Discret. Math. Theor. Comput. Sci., 2004
2003
Theor. Comput. Sci., 2003
2002
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia), 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
2000
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptogr., 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Information Security and Cryptology, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
The nonhomomorphicity of S-boxes.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
J. Univers. Comput. Sci., 1996
Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors.
Des. Codes Cryptogr., 1996
Proceedings of the Advances in Cryptology, 1996
1995
Inf. Comput., May, 1995
J. Univers. Comput. Sci., 1995
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions.
J. Univers. Comput. Sci., 1995
Proceedings of the Advances in Cryptology, 1995
1994
IEEE Trans. Inf. Theory, 1994
Inf. Process. Lett., 1994
Australas. J Comb., 1994
Australas. J Comb., 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Australas. J Comb., 1993
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Product of Four Hadamard Matrices.
J. Comb. Theory A, 1992
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1992
1991
Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices.
Australas. J Comb., 1991
1990
Proceedings of the Advances in Cryptology, 1990