×

zbMATH — the first resource for mathematics

Feng, Dengguo

Compute Distance To:
Author ID: feng.dengguo Recent zbMATH articles by "Feng, Dengguo"
Published as: Feng, D.; Feng, Deng-Guo; Feng, DengGuo; Feng, Dengguo
Documents Indexed: 131 Publications since 1995, including 3 Books

Publications by Year

Citations contained in zbMATH

67 Publications have been cited 291 times in 272 Documents Cited by Year
The weight enumerator of a class of cyclic codes. Zbl 1366.94643
Ma, Changli; Zeng, Liwei; Liu, Yang; Feng, Dengguo; Ding, Cunsheng
37
2011
Cryptanalysis of the hash functions MD4 and RIPEMD. Zbl 1137.94358
Wang, Xiaoyun; Lai, Xuejia; Feng, Dengguo; Chen, Hui; Yu, Xiuyuan
35
2005
Certificateless public-key signature: Security model and efficient construction. Zbl 1151.94638
Zhang, Zhenfeng; Wong, Duncan S.; Xu, Jing; Feng, Dengguo
28
2006
HCTR: A variable-input-Length enciphering mode. Zbl 1151.94581
Wang, Peng; Feng, Dengguo; Wu, Wenling
13
2005
On Lin-Bose problem. Zbl 1056.15013
Wang, Mingsheng; Feng, Dengguo
12
2004
On quadratic bent functions in polynomial forms. Zbl 1325.94123
Hu, Honggang; Feng, Dengguo
8
2007
An arbitrated quantum message signature scheme. Zbl 1117.94326
Lü, Xin; Feng, Deng-Guo
8
2004
On a class of pseudorandom sequences from elliptic curves over finite fields. Zbl 1325.94109
Hu, Honggang; Hu, Lei; Feng, Dengguo
6
2007
Improved related-key impossible differential attacks on reduced-round AES-192. Zbl 1161.94434
Zhang, Wentao; Wu, Wenling; Zhang, Lei; Feng, Dengguo
6
2007
Incomplete exponential sums over Galois rings with applications to some binary sequences derived from \(\mathbb Z_{2^l}\). Zbl 1282.94027
Hu, Honggang; Feng, Dengguo; Wu, Wenling
6
2006
An attack on hash function HAVAL-128. Zbl 1187.94029
Wang, Xiaoyun; Feng, Dengguo; Yu, Xiuyuan
6
2005
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. Zbl 1312.94039
Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo; Ling, San; Wang, Huaxiong
5
2013
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Zbl 1298.94083
Chen, Cheng; Zhang, Zhenfeng; Feng, Dengguo
5
2011
Loiss: a byte-oriented stream cipher. Zbl 1272.94029
Feng, Dengguo; Feng, Xiutao; Zhang, Wentao; Fan, Xiubin; Wu, Chuankun
5
2011
New results on impossible differential cryptanalysis of reduced AES. Zbl 1182.94049
Zhang, Wentao; Wu, Wenling; Feng, Dengguo
5
2007
Boolean functions and their applications in cryptography. Zbl 1364.94010
Wu, Chuan-Kun; Feng, Dengguo
4
2016
Improved key recovery attacks on reduced-round Salsa20 and ChaCha. Zbl 1342.94096
Shi, Zhenqing; Zhang, Bin; Feng, Dengguo; Wu, Wenling
4
2013
Combined public-key schemes: the case of ABE and ABS. Zbl 1303.94072
Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo
4
2012
New results on periodic sequences with large \(k\)-error linear complexity. Zbl 1367.94292
Hu, Honggang; Gong, Guang; Feng, Dengguo
4
2009
Related-key differential-linear attacks on reduced AES-192. Zbl 1153.94444
Zhang, Wentao; Zhang, Lei; Wu, Wenling; Feng, Dengguo
4
2007
Multi-pass fast correlation attack on stream ciphers. Zbl 1161.94433
Zhang, Bin; Feng, Dengguo
4
2007
New guess-and-determine attack on the self-shrinking generator. Zbl 1172.94605
Zhang, Bin; Feng, Dengguo
4
2006
On non-binary quantum BCH codes. Zbl 1178.94252
Ma, Zhi; Lu, Xin; Feng, Keqin; Feng, Dengguo
4
2006
ID-based aggregate signatures from bilinear pairings. Zbl 1154.94477
Xu, Jing; Zhang, Zhenfeng; Feng, Dengguo
4
2005
A protocol of comparing information without leaking. Zbl 1109.68358
Qin, Jing; Zhang, Zhenfeng; Feng, Dengguo; Li, Bao
4
2004
(Pseudo) preimage attack on round-reduced Grøstl hash function and others. Zbl 1312.94101
Wu, Shuang; Feng, Dengguo; Wu, Wenling; Guo, Jian; Dong, Le; Zou, Jian
3
2012
A byte-based guess and determine attack on SOSEMANUK. Zbl 1253.94046
Feng, Xiutao; Liu, Jun; Zhou, Zhaocun; Wu, Chuankun; Feng, Dengguo
3
2010
Concurrently non-malleable black-box zero knowledge in the bare public-key model. Zbl 1248.94063
Deng, Yi; Di Crescenzo, Giovanni; Lin, Dongdai; Feng, Dengguo
3
2009
On the expected value of the joint 2-adic complexity of periodic binary multisequences. Zbl 1152.94388
Hu, Honggang; Hu, Lei; Feng, Dengguo
3
2006
Short threshold signature schemes without random oracles. Zbl 1153.94465
Wang, Hong; Zhang, Yuqing; Feng, Dengguo
3
2005
Collision attack and pseudorandomness of reduced-round Camellia. Zbl 1117.94339
Wu, Wenling; Feng, Dengguo; Chen, Hua
3
2005
Linear cryptanalysis of FASER128/256 and TriviA-ck. Zbl 1337.94081
Xu, Chao; Zhang, Bin; Feng, Dengguo
2
2014
Fully secure doubly-spatial encryption under simple assumptions. Zbl 1303.94073
Chen, Cheng; Zhang, Zhenfeng; Feng, Dengguo
2
2012
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. Zbl 1319.94087
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo; Wu, Chuankun
2
2012
Improved multi-pass fast correlation attacks with applications. Zbl 1267.94107
Zhang, Bin; Feng, Dengguo
2
2011
Cryptanalysis of the LANE hash function. Zbl 1267.94103
Wu, Shuang; Feng, Dengguo; Wu, Wenling
2
2009
On the 2-adic complexity and the \(k\)-error 2-adic complexity of periodic binary sequences. Zbl 1311.94062
Hu, Honggang; Feng, Dengguo
2
2008
Collision attack on reduced-round Camellia. Zbl 1187.94031
Wu, Wenling; Feng, Dengguo
2
2005
On the security of tweakable modes of operation: TBC and TAE. Zbl 1159.68450
Wang, Peng; Feng, Dengguo; Wu, Wenling
2
2005
A fast correlation attack on the shrinking generator. Zbl 1079.94579
Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng
2
2005
Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456
Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo
2
2003
Linear cryptanalysis of NUSH block cipher. Zbl 1151.94585
Wu, Wenling; Feng, Dengguo
2
2002
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\). Zbl 0889.94012
Feng, Dengguo; Pei, Dingyi
2
1996
Numerical study on high velocity impact welding using a modified SPH method. Zbl 1404.76221
Zhang, Z. L.; Ma, T.; Liu, M. B.; Feng, D.
1
2019
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\). Zbl 1347.94016
Gong, Xinxin; Zhang, Bin; Feng, Dengguo; Yan, Tongjiang
1
2014
Near collision attack on the Grain v1 stream cipher. Zbl 1321.94097
Zhang, Bin; Li, Zhenqi; Feng, Dengguo; Lin, Dongdai
1
2014
ExBLACR: extending BLACR system. Zbl 1337.94102
Wang, Weijin; Feng, Dengguo; Qin, Yu; Shao, Jianxiong; Xi, Li; Chu, Xiaobo
1
2014
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract). Zbl 1310.94174
Zhang, Bin; Xu, Chao; Feng, Dengguo
1
2013
Round-optimal zero-knowledge proofs of knowledge for NP. Zbl 1270.68110
Li, Hongda; Feng, Dengguo; Li, Bao; Xue, Haixia
1
2012
Resettable cryptography in constant rounds – the case of zero knowledge. Zbl 1227.94041
Deng, Yi; Feng, Dengguo; Goyal, Vipul; Lin, Dongdai; Sahai, Amit; Yung, Moti
1
2011
On guess and determine analysis of Rabbit. Zbl 1225.94016
Feng, Xiutao; Shi, Zhenqing; Wu, Chuankun; Feng, Dengguo
1
2011
Hyper-Sbox view of AES-like permutations: a generalized distinguisher. Zbl 1295.94158
Wu, Shuang; Feng, Dengguo; Wu, Wenling; Su, Bozhan
1
2011
Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo
1
2010
A new client-to-client password-authenticated key agreement protocol. Zbl 1248.94103
Feng, Deng-Guo; Xu, Jing
1
2009
Security of truncated MACs. Zbl 1237.94097
Wang, Peng; Feng, Dengguo; Lin, Changlu; Wu, Wenling
1
2009
Survey of information security. Zbl 1142.94013
Shen, Changxiang; Zhang, Huangguo; Feng, Dengguo; Cao, Zhenfu; Huang, Jiwu
1
2007
Constructing parallel long-message signcryption scheme from trapdoor permutation. Zbl 1116.94013
Hu, Zhenyu; Lin, Dongdai; Wu, Wenling; Feng, Dengguo
1
2007
Pairwise key agreement protocols based on the Weil pairing. Zbl 1104.68503
Yao, Gang; Feng, Dengguo
1
2006
On the 2-adic complexity and the \(k\)-error 2-adic complexity of periodic binary sequences. Zbl 1145.94418
Hu, Honggang; Feng, Dengguo
1
2005
Research on theory and approach of provable security. Zbl 1096.68049
Feng, Dengguo
1
2005
Chosen ciphertext attack on a new class of self-synchronizing stream ciphers. Zbl 1113.94322
Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng
1
2004
Differential-linear cryptanalysis of Camellia. Zbl 1081.94542
Wu, Wenling; Feng, Dengguo
1
2004
Notes on packet marking for IP traceback. Zbl 1107.68322
Li, Dequan; Su, Purui; Feng, Dengguo
1
2004
Fast multiplication on a family of Koblitz elliptic curves. Zbl 1108.68458
Hu, Lei; Feng, Dengguo; Wen, Tiehua
1
2003
Study on strand space model theory. Zbl 1031.68063
Ji, QingGuang; Qing, SiHan; Zhou, YongBin; Feng, DengGuo
1
2003
Three characterizations of correlation-immune functions over the rings \(Z_N\). Zbl 0959.94019
Feng, Dengguo
1
1999
Maximum correlation analysis of nonlinear combining functions. Zbl 0987.94022
Feng, Dengguo; Pei, Dingyi; Xiao, Guozhen
1
1998
Numerical study on high velocity impact welding using a modified SPH method. Zbl 1404.76221
Zhang, Z. L.; Ma, T.; Liu, M. B.; Feng, D.
1
2019
Boolean functions and their applications in cryptography. Zbl 1364.94010
Wu, Chuan-Kun; Feng, Dengguo
4
2016
Linear cryptanalysis of FASER128/256 and TriviA-ck. Zbl 1337.94081
Xu, Chao; Zhang, Bin; Feng, Dengguo
2
2014
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\). Zbl 1347.94016
Gong, Xinxin; Zhang, Bin; Feng, Dengguo; Yan, Tongjiang
1
2014
Near collision attack on the Grain v1 stream cipher. Zbl 1321.94097
Zhang, Bin; Li, Zhenqi; Feng, Dengguo; Lin, Dongdai
1
2014
ExBLACR: extending BLACR system. Zbl 1337.94102
Wang, Weijin; Feng, Dengguo; Qin, Yu; Shao, Jianxiong; Xi, Li; Chu, Xiaobo
1
2014
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. Zbl 1312.94039
Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo; Ling, San; Wang, Huaxiong
5
2013
Improved key recovery attacks on reduced-round Salsa20 and ChaCha. Zbl 1342.94096
Shi, Zhenqing; Zhang, Bin; Feng, Dengguo; Wu, Wenling
4
2013
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract). Zbl 1310.94174
Zhang, Bin; Xu, Chao; Feng, Dengguo
1
2013
Combined public-key schemes: the case of ABE and ABS. Zbl 1303.94072
Chen, Cheng; Chen, Jie; Lim, Hoon Wei; Zhang, Zhenfeng; Feng, Dengguo
4
2012
(Pseudo) preimage attack on round-reduced Grøstl hash function and others. Zbl 1312.94101
Wu, Shuang; Feng, Dengguo; Wu, Wenling; Guo, Jian; Dong, Le; Zou, Jian
3
2012
Fully secure doubly-spatial encryption under simple assumptions. Zbl 1303.94073
Chen, Cheng; Zhang, Zhenfeng; Feng, Dengguo
2
2012
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. Zbl 1319.94087
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo; Wu, Chuankun
2
2012
Round-optimal zero-knowledge proofs of knowledge for NP. Zbl 1270.68110
Li, Hongda; Feng, Dengguo; Li, Bao; Xue, Haixia
1
2012
The weight enumerator of a class of cyclic codes. Zbl 1366.94643
Ma, Changli; Zeng, Liwei; Liu, Yang; Feng, Dengguo; Ding, Cunsheng
37
2011
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Zbl 1298.94083
Chen, Cheng; Zhang, Zhenfeng; Feng, Dengguo
5
2011
Loiss: a byte-oriented stream cipher. Zbl 1272.94029
Feng, Dengguo; Feng, Xiutao; Zhang, Wentao; Fan, Xiubin; Wu, Chuankun
5
2011
Improved multi-pass fast correlation attacks with applications. Zbl 1267.94107
Zhang, Bin; Feng, Dengguo
2
2011
Resettable cryptography in constant rounds – the case of zero knowledge. Zbl 1227.94041
Deng, Yi; Feng, Dengguo; Goyal, Vipul; Lin, Dongdai; Sahai, Amit; Yung, Moti
1
2011
On guess and determine analysis of Rabbit. Zbl 1225.94016
Feng, Xiutao; Shi, Zhenqing; Wu, Chuankun; Feng, Dengguo
1
2011
Hyper-Sbox view of AES-like permutations: a generalized distinguisher. Zbl 1295.94158
Wu, Shuang; Feng, Dengguo; Wu, Wenling; Su, Bozhan
1
2011
A byte-based guess and determine attack on SOSEMANUK. Zbl 1253.94046
Feng, Xiutao; Liu, Jun; Zhou, Zhaocun; Wu, Chuankun; Feng, Dengguo
3
2010
Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo
1
2010
New results on periodic sequences with large \(k\)-error linear complexity. Zbl 1367.94292
Hu, Honggang; Gong, Guang; Feng, Dengguo
4
2009
Concurrently non-malleable black-box zero knowledge in the bare public-key model. Zbl 1248.94063
Deng, Yi; Di Crescenzo, Giovanni; Lin, Dongdai; Feng, Dengguo
3
2009
Cryptanalysis of the LANE hash function. Zbl 1267.94103
Wu, Shuang; Feng, Dengguo; Wu, Wenling
2
2009
A new client-to-client password-authenticated key agreement protocol. Zbl 1248.94103
Feng, Deng-Guo; Xu, Jing
1
2009
Security of truncated MACs. Zbl 1237.94097
Wang, Peng; Feng, Dengguo; Lin, Changlu; Wu, Wenling
1
2009
On the 2-adic complexity and the \(k\)-error 2-adic complexity of periodic binary sequences. Zbl 1311.94062
Hu, Honggang; Feng, Dengguo
2
2008
On quadratic bent functions in polynomial forms. Zbl 1325.94123
Hu, Honggang; Feng, Dengguo
8
2007
On a class of pseudorandom sequences from elliptic curves over finite fields. Zbl 1325.94109
Hu, Honggang; Hu, Lei; Feng, Dengguo
6
2007
Improved related-key impossible differential attacks on reduced-round AES-192. Zbl 1161.94434
Zhang, Wentao; Wu, Wenling; Zhang, Lei; Feng, Dengguo
6
2007
New results on impossible differential cryptanalysis of reduced AES. Zbl 1182.94049
Zhang, Wentao; Wu, Wenling; Feng, Dengguo
5
2007
Related-key differential-linear attacks on reduced AES-192. Zbl 1153.94444
Zhang, Wentao; Zhang, Lei; Wu, Wenling; Feng, Dengguo
4
2007
Multi-pass fast correlation attack on stream ciphers. Zbl 1161.94433
Zhang, Bin; Feng, Dengguo
4
2007
Survey of information security. Zbl 1142.94013
Shen, Changxiang; Zhang, Huangguo; Feng, Dengguo; Cao, Zhenfu; Huang, Jiwu
1
2007
Constructing parallel long-message signcryption scheme from trapdoor permutation. Zbl 1116.94013
Hu, Zhenyu; Lin, Dongdai; Wu, Wenling; Feng, Dengguo
1
2007
Certificateless public-key signature: Security model and efficient construction. Zbl 1151.94638
Zhang, Zhenfeng; Wong, Duncan S.; Xu, Jing; Feng, Dengguo
28
2006
Incomplete exponential sums over Galois rings with applications to some binary sequences derived from \(\mathbb Z_{2^l}\). Zbl 1282.94027
Hu, Honggang; Feng, Dengguo; Wu, Wenling
6
2006
New guess-and-determine attack on the self-shrinking generator. Zbl 1172.94605
Zhang, Bin; Feng, Dengguo
4
2006
On non-binary quantum BCH codes. Zbl 1178.94252
Ma, Zhi; Lu, Xin; Feng, Keqin; Feng, Dengguo
4
2006
On the expected value of the joint 2-adic complexity of periodic binary multisequences. Zbl 1152.94388
Hu, Honggang; Hu, Lei; Feng, Dengguo
3
2006
Pairwise key agreement protocols based on the Weil pairing. Zbl 1104.68503
Yao, Gang; Feng, Dengguo
1
2006
Cryptanalysis of the hash functions MD4 and RIPEMD. Zbl 1137.94358
Wang, Xiaoyun; Lai, Xuejia; Feng, Dengguo; Chen, Hui; Yu, Xiuyuan
35
2005
HCTR: A variable-input-Length enciphering mode. Zbl 1151.94581
Wang, Peng; Feng, Dengguo; Wu, Wenling
13
2005
An attack on hash function HAVAL-128. Zbl 1187.94029
Wang, Xiaoyun; Feng, Dengguo; Yu, Xiuyuan
6
2005
ID-based aggregate signatures from bilinear pairings. Zbl 1154.94477
Xu, Jing; Zhang, Zhenfeng; Feng, Dengguo
4
2005
Short threshold signature schemes without random oracles. Zbl 1153.94465
Wang, Hong; Zhang, Yuqing; Feng, Dengguo
3
2005
Collision attack and pseudorandomness of reduced-round Camellia. Zbl 1117.94339
Wu, Wenling; Feng, Dengguo; Chen, Hua
3
2005
Collision attack on reduced-round Camellia. Zbl 1187.94031
Wu, Wenling; Feng, Dengguo
2
2005
On the security of tweakable modes of operation: TBC and TAE. Zbl 1159.68450
Wang, Peng; Feng, Dengguo; Wu, Wenling
2
2005
A fast correlation attack on the shrinking generator. Zbl 1079.94579
Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng
2
2005
On the 2-adic complexity and the \(k\)-error 2-adic complexity of periodic binary sequences. Zbl 1145.94418
Hu, Honggang; Feng, Dengguo
1
2005
Research on theory and approach of provable security. Zbl 1096.68049
Feng, Dengguo
1
2005
On Lin-Bose problem. Zbl 1056.15013
Wang, Mingsheng; Feng, Dengguo
12
2004
An arbitrated quantum message signature scheme. Zbl 1117.94326
Lü, Xin; Feng, Deng-Guo
8
2004
A protocol of comparing information without leaking. Zbl 1109.68358
Qin, Jing; Zhang, Zhenfeng; Feng, Dengguo; Li, Bao
4
2004
Chosen ciphertext attack on a new class of self-synchronizing stream ciphers. Zbl 1113.94322
Zhang, Bin; Wu, Hongjun; Feng, Dengguo; Bao, Feng
1
2004
Differential-linear cryptanalysis of Camellia. Zbl 1081.94542
Wu, Wenling; Feng, Dengguo
1
2004
Notes on packet marking for IP traceback. Zbl 1107.68322
Li, Dequan; Su, Purui; Feng, Dengguo
1
2004
Making the key agreement protocol in mobile ad hoc network more efficient. Zbl 1131.68456
Yao, Gang; Ren, Kui; Bao, Feng; Deng, Robert H.; Feng, Dengguo
2
2003
Fast multiplication on a family of Koblitz elliptic curves. Zbl 1108.68458
Hu, Lei; Feng, Dengguo; Wen, Tiehua
1
2003
Study on strand space model theory. Zbl 1031.68063
Ji, QingGuang; Qing, SiHan; Zhou, YongBin; Feng, DengGuo
1
2003
Linear cryptanalysis of NUSH block cipher. Zbl 1151.94585
Wu, Wenling; Feng, Dengguo
2
2002
Three characterizations of correlation-immune functions over the rings \(Z_N\). Zbl 0959.94019
Feng, Dengguo
1
1999
Maximum correlation analysis of nonlinear combining functions. Zbl 0987.94022
Feng, Dengguo; Pei, Dingyi; Xiao, Guozhen
1
1998
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\). Zbl 0889.94012
Feng, Dengguo; Pei, Dingyi
2
1996
all top 5

Cited by 543 Authors

9 Liu, Jinwang
9 Yue, Qin
8 Feng, Dengguo
7 Li, Chengju
7 Zeng, Xiangyong
6 Wu, Wenling
6 Zheng, Dabin
5 Hu, Lei
5 Li, Dongmei
5 Liu, Hongwei
5 Qi, Wenfeng
5 Sasaki, Yu
5 Wang, Mingsheng
5 Wang, Xiaoqiang
4 Dunkelman, Orr
4 Fouque, Pierre-Alain
4 Lucks, Stefan
4 Mendel, Florian
4 Sarkar, Palash
4 Susilo, Willy
4 Tian, Tian
4 Wang, Peng
4 Wen, Qiaoyan
4 Xiong, Maosheng
4 Yang, Yuguang
4 Zhang, Liting
4 Zheng, Licui
4 Zhu, Shi-xin
3 Bouillaguet, Charles
3 Cuén-Ramos, Jesús E.
3 Ding, Cunsheng
3 Dutta, Ratna
3 Forler, Christian
3 Fúster-Sabater, Amparo
3 Huang, Xinyi
3 Kamlovskiĭ, Oleg Vital’evich
3 Keller, Nathan
3 Li, Chao
3 Li, Chunlei
3 Li, Fengwei
3 Li, Jiguo
3 Liu, Chunlei
3 Liu, Yan
3 Lu, Jiqiang
3 Maitra, Subhamoy
3 Meidl, Wilfried
3 Mu, Yi
3 Peyrin, Thomas
3 Qiu, Daowen
3 Sarkar, Santanu
3 Shi, Weimin
3 Vega, Gerardo
3 Wang, Gaoli
3 Xiao, Di
3 Yan, Haode
3 Yu, Long
3 Zhang, Bin
3 Zhang, Futai
3 Zhang, Lei
3 Zhou, Yihua
3 Zhou, Zhengchun
3 Zou, Xiangfu
2 Anbar, Nurdagül
2 Aoki, Kazumaro
2 Bae, Sunghan
2 Bi, Jing-Lin
2 Biryukov, Alex
2 Caballero-Gil, Pino
2 Chakraborty, Debrup
2 Chen, Kefei
2 Choi, Kyu Young
2 Dey, Sabyasachi
2 Di Crescenzo, Giovanni
2 Dobraunig, Christoph
2 Feng, Xiutao
2 Fu, Guiqin
2 Gorski, Michael
2 Guan, Jiancheng
2 Guo, Fuchun
2 Guo, Lina
2 Hell, Martin
2 Helleseth, Tor
2 Hu, Yupu
2 Huang, Qiong
2 Iwata, Tetsu
2 Johansson, Thomas
2 Kanso, Ali
2 Kelsey, John
2 Kim, Jongsung
2 Kircanski, Aleksandar
2 Klapper, Andrew M.
2 Li, Chengqing
2 Li, Fagen
2 Li, Fulin
2 Li, Nian
2 Li, Ping
2 Li, Qin
2 Li, Ruilin
2 Li, Weiqing
2 Lin, Dongdai
...and 443 more Authors
all top 5

Cited in 56 Serials

25 Designs, Codes and Cryptography
23 Information Sciences
13 Journal of Cryptology
13 Finite Fields and their Applications
11 Cryptography and Communications
10 Science China. Information Sciences
8 International Journal of Theoretical Physics
8 Advances in Mathematics of Communications
7 Information Processing Letters
6 Discrete Mathematics
6 Theoretical Computer Science
6 Applicable Algebra in Engineering, Communication and Computing
6 Journal of Systems Science and Complexity
6 Science in China. Series F
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Quantum Information Processing
4 Multidimensional Systems and Signal Processing
4 Mathematical Problems in Engineering
4 Wuhan University Journal of Natural Sciences (WUJNS)
3 Computers & Mathematics with Applications
3 Discrete Applied Mathematics
3 Communications in Nonlinear Science and Numerical Simulation
2 Journal of Computer Science and Technology
2 Linear Algebra and its Applications
2 Journal of Applied Mathematics
2 Journal of Zhejiang University. Science A
2 Journal of Mathematical Cryptology
2 Science China. Mathematics
2 Journal of Algebra, Combinatorics, Discrete Structures and Applications
1 Acta Informatica
1 Bulletin of the Australian Mathematical Society
1 Mathematical Notes
1 Circuits, Systems, and Signal Processing
1 Journal of Complexity
1 Information and Computation
1 Journal of Automated Reasoning
1 International Journal of Foundations of Computer Science
1 Discrete Mathematics and Applications
1 Communications in Statistics. Theory and Methods
1 Journal of Mathematical Sciences (New York)
1 Advances in Applied Clifford Algebras
1 Complexity
1 Engineering Analysis with Boundary Elements
1 Science in China. Series E
1 Nonlinear Dynamics
1 Soft Computing
1 Sādhanā
1
1 Journal of Discrete Algorithms
1 Science in China. Series G
1 Journal of Shanghai Jiaotong University (Science)
1
1 Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A: Matemáticas. RACSAM
1 RAIRO. Theoretical Informatics and Applications
1 Frontiers of Computer Science
1 Axioms

Citations by Year