Name
Affiliation
Papers
YONGZHUANG WEI
Department of Communication and Information Engineering, Guilin University of Electronic Technology, Guilin, 541004, China
45
Collaborators
Citations 
PageRank 
60
69
16.94
Referers 
Referees 
References 
160
438
333
Search Limit
100438
Title
Citations
PageRank
Year
Explicit infinite families of bent functions outside MM # .00.342022
Impossible Differential Cryptanalysis of BORON.00.342022
New Construction Of Highly Nonlinear Resilient S-Boxes Via Linear Codes10.402022
Minimal binary linear codes: a general framework based on bent concatenation00.342022
On the Modified Transparency Order of (n, m)-Functions00.342021
Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model00.342021
Wide Minimal Binary Linear Codes From The General Maiorana-Mcfarland Class00.342021
On the transparency order relationships between one Boolean function and its decomposition functions00.342021
Integral Distinguishers Of The Full-Round Lightweight Block Cipher Sat_jo00.342021
Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra <2n2☆00.342021
Vectorial Bent Functions Weakly/Strongly Outside The Completed Maiorana-Mcfarland Class20.372021
Further analysis of bent functions from C and D which are provably outside or inside M20.372020
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things00.342019
Guess and determine cryptanalysis with variable sampling and its applications00.342019
New second-order threshold implementation of AES00.342019
Bent functions from nonlinear permutations and conversely00.342019
A New Cube Attack on MORUS by Using Division Property00.342019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs70.422019
Generalized Nonlinear Invariant Attack And A New Design Criterion For Round Constants00.342018
Designing plateaued Boolean functions in spectral domain and their classification.10.352018
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.00.342018
Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions.20.412018
A General Framework For Secondary Constructions Of Bent And Plateaued Functions30.432018
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems.30.412018
Bent Functions In C And D Outside The Completed Maiorana-Mcfarland Class00.342017
Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus.30.432017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.10.352017
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n.10.352017
On algebraic properties of S-boxes designed by means of disjoint linear codes00.342016
Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling.00.342016
Constructions of Bent—Negabent Functions and Their Relation to the Completed Maiorana—McFarland Class110.622015
Optimizing The Placement Of Tap Positions10.372014
Call for papers: systematic network optimizations for security parameters (security and communication networks).00.342014
Generic related-key and induced chosen IV attacks using the method of key differentiation.10.362013
On the approximation of S-boxes via Maiorana-McFarland functions10.372013
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis.30.432012
Parallelized Near-Duplicate Document Detection Algorithm for Large Scale Chinese Web Pages00.342012
Guess and Determine Attacks on Filter Generators—Revisited20.432012
On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces30.392012
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity40.392012
A New Correlation Attack on Nonlinear Combining Generators00.342011
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits110.652011
New related-key rectangle attacks on reduced AES-192 and AES-256.40.452009
Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers10.372007
A construction of resilient functions with satisfying synthetical cryptographic criteria10.382005