关注
Qichun Wang
Qichun Wang
National University of Singapore
在 fudan.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Constructions of cryptographically significant Boolean functions using primitive polynomials
Q Wang, J Peng, H Kan, X Xue
IEEE Transactions on Information Theory 56 (6), 3048-3053, 2010
1262010
A note on fast algebraic attacks and higher order nonlinearities
Q Wang, T Johansson
Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011
552011
A new family of differentially 4-uniform permutations over for odd k
J Peng, CH Tan, QC Wang
Science China Mathematics 59 (6), 1221-1234, 2016
262016
Transparency order for Boolean functions: analysis and construction
Q Wang, P Stănică
Designs, Codes and Cryptography 87, 2043-2059, 2019
232019
Cryptographic properties of the hidden weighted bit function
Q Wang, C Carlet, P Stănică, CH Tan
Discrete Applied Mathematics 174, 1-10, 2014
222014
The covering radius of the Reed–Muller code RM (2, 7) is 40
Q Wang
Discrete Mathematics 342 (12), 111625, 2019
122019
On the covering radius of the third order Reed–Muller code RM(3, 7)
Q Wang, CH Tan, TF Prabowo
Designs, Codes and Cryptography 86, 151-159, 2018
122018
New secondary constructions of differentially 4-uniform permutations over
J Peng, CH Tan, Q Wang
International Journal of Computer Mathematics 94 (8), 1670-1693, 2017
112017
Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights
Q Wang
Designs, Codes and Cryptography 87 (10), 2321-2333, 2019
102019
Concatenations of the hidden weighted bit function and their cryptographic properties.
Q Wang, CH Tan, P Stanica
Adv. Math. Commun. 8 (2), 153-165, 2014
102014
Properties of a family of cryptographic Boolean functions
Q Wang, CH Tan
Sequences and Their Applications-SETA 2014: 8th International Conference …, 2014
102014
A new method to construct Boolean functions with good cryptographic properties
Q Wang, CH Tan
Information Processing Letters 113 (14-16), 567-571, 2013
102013
Some results on fast algebraic attacks and higher-order non-linearities
Q Wang, T Johansson, H Kan
IET Information Security 6 (1), 41-46, 2012
102012
More new classes of differentially 4-uniform permutations with good cryptographic properties
J Peng, CH Tan, Q Wang, J Gao, H Kan
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
92018
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity
Q Wang, CH Tan
Discrete Applied Mathematics 167, 25-32, 2014
92014
New bounds on the covering radius of the second order Reed-Muller code of length 128
Q Wang, P Stănică
Cryptography and Communications 11, 269-277, 2019
82019
New bounds on the imbalance of a half-l-sequence
Q Wang, CH Tan
2015 IEEE International Symposium on Information Theory (ISIT), 2688-2691, 2015
72015
Searching for balanced S-boxes with high nonlinearity, low differential uniformity, and improved DPA-resistance
Y Xu, Q Wang
International Conference on Information Security, 95-106, 2020
62020
On equivalence classes of Boolean functions
Q Wang, T Johansson
Information Security and Cryptology-ICISC 2010: 13th International …, 2011
62011
The covering radius of the third-order reed-muller code rm (3, 7) is 20
J Gao, H Kan, Y Li, Q Wang
IEEE Transactions on Information Theory 69 (6), 3663-3673, 2023
52023
系统目前无法执行此操作,请稍后再试。
文章 1–20