Yongzhuang Wei
Orcid: 0000-0002-3371-4865
According to our database1,
Yongzhuang Wei
authored at least 84 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Using P<sub>τ</sub> property for designing bent functions provably outside the completed Maiorana-McFarland class.
Des. Codes Cryptogr., September, 2024
Des. Codes Cryptogr., September, 2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., July, 2024
Minimal p-Ary Codes via the Direct Sum of Functions, Non-Covering Permutations and Subspaces of Derivatives.
IEEE Trans. Inf. Theory, June, 2024
Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers.
IEEE Trans. Circuits Syst. I Regul. Pap., January, 2024
Specifying cycles of minimal length for commonly used linear layers in block ciphers.
J. Inf. Secur. Appl., 2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Electron. Test., August, 2023
Cryptogr. Commun., May, 2023
Improved Certificateless Aggregate Signature Scheme Against Collusion Attacks for VANETs.
IEEE Syst. J., March, 2023
Explicit infinite families of bent functions outside the completed Maiorana-McFarland class.
Des. Codes Cryptogr., 2023
2022
KSII Trans. Internet Inf. Syst., 2022
Int. J. Distributed Sens. Networks, 2022
IACR Cryptol. ePrint Arch., 2022
Frontiers Comput. Sci., 2022
Des. Codes Cryptogr., 2022
Des. Codes Cryptogr., 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT.
Wirel. Commun. Mob. Comput., 2021
Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model.
IEEE ACM Trans. Audio Speech Lang. Process., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
On the transparency order relationships between one Boolean function and its decomposition functions.
J. Inf. Secur. Appl., 2021
Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra 2n2<sup>☆</sup>.
Inf. Sci., 2021
Des. Codes Cryptogr., 2021
Vectorial bent functions weakly/strongly outside the completed Maiorana-McFarland class.
Discret. Appl. Math., 2021
Cryptogr. Commun., 2021
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications.
Proceedings of the Information Security - 24th International Conference, 2021
Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Quantum Inf. Comput., 2020
A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg's bound.
IACR Cryptol. ePrint Arch., 2020
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound.
IACR Cryptol. ePrint Arch., 2020
Des. Codes Cryptogr., 2020
Further analysis of bent functions from C and D which are provably outside or inside M#.
Discret. Appl. Math., 2020
2019
IEEE Trans. Inf. Theory, 2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things.
Secur. Commun. Networks, 2019
IET Inf. Secur., 2019
2018
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.
IACR Trans. Symmetric Cryptol., 2018
Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions.
IEEE Trans. Inf. Theory, 2018
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.
IET Inf. Secur., 2018
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems.
Comput. Networks, 2018
2017
Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus.
IEEE Trans. Inf. Theory, 2017
计算机科学, 2017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.
Inf. Sci., 2017
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n.
Inf. Sci., 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
Int. J. Comput. Math., 2016
Infinite classes of vectorial plateaued functions, permutations and complete permutations.
Discret. Appl. Math., 2016
Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling.
CoRR, 2016
2015
Constructions of Bent - Negabent Functions and Their Relation to the Completed Maiorana - McFarland Class.
IEEE Trans. Inf. Theory, 2015
2014
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher.
Theor. Comput. Sci., 2014
Call for papers: systematic network optimizations for security parameters (security and communication networks).
Secur. Commun. Networks, 2014
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
IET Inf. Secur., 2013
Generic related-key and induced chosen IV attacks using the method of key differentiation.
IACR Cryptol. ePrint Arch., 2013
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
IEEE Trans. Inf. Theory, 2012
On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces.
IEEE Trans. Inf. Theory, 2012
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity.
Secur. Commun. Networks, 2012
IET Inf. Secur., 2012
IACR Cryptol. ePrint Arch., 2012
Parallelized Near-Duplicate Document Detection Algorithm for Large Scale Chinese Web Pages.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
Proceedings of the Advances in Information and Computer Security, 2012
2011
IEEE Trans. Inf. Theory, 2011
2010
IACR Cryptol. ePrint Arch., 2010
2009
Sci. China Ser. F Inf. Sci., 2009
2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
2005
A construction of resilient functions with satisfying synthetical cryptographic criteria.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005
2004
New construction of resilient functions with satisfying multiple cryptographic criteria.
Proceedings of the 3rd International Conference on Information Security, 2004