Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Camila Zacché de Aguiar
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Sébastien Gérard
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Chen Ma
Yuchun Huang
Home
/
Author
/
YONGZHUANG WEI
Author Info
Open Visualization
Name
Affiliation
Papers
YONGZHUANG WEI
Department of Communication and Information Engineering, Guilin University of Electronic Technology, Guilin, 541004, China
45
Collaborators
Citations
PageRank
60
69
16.94
Referers
Referees
References
160
438
333
Search Limit
100
438
Publications (45 rows)
Collaborators (60 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Explicit infinite families of bent functions outside MM # .
0
0.34
2022
Impossible Differential Cryptanalysis of BORON.
0
0.34
2022
New Construction Of Highly Nonlinear Resilient S-Boxes Via Linear Codes
1
0.40
2022
Minimal binary linear codes: a general framework based on bent concatenation
0
0.34
2022
On the Modified Transparency Order of (n, m)-Functions
0
0.34
2021
Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model
0
0.34
2021
Wide Minimal Binary Linear Codes From The General Maiorana-Mcfarland Class
0
0.34
2021
On the transparency order relationships between one Boolean function and its decomposition functions
0
0.34
2021
Integral Distinguishers Of The Full-Round Lightweight Block Cipher Sat_jo
0
0.34
2021
Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra <2n2☆
0
0.34
2021
Vectorial Bent Functions Weakly/Strongly Outside The Completed Maiorana-Mcfarland Class
2
0.37
2021
Further analysis of bent functions from C and D which are provably outside or inside M
2
0.37
2020
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things
0
0.34
2019
Guess and determine cryptanalysis with variable sampling and its applications
0
0.34
2019
New second-order threshold implementation of AES
0
0.34
2019
Bent functions from nonlinear permutations and conversely
0
0.34
2019
A New Cube Attack on MORUS by Using Division Property
0
0.34
2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
7
0.42
2019
Generalized Nonlinear Invariant Attack And A New Design Criterion For Round Constants
0
0.34
2018
Designing plateaued Boolean functions in spectral domain and their classification.
1
0.35
2018
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.
0
0.34
2018
Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions.
2
0.41
2018
A General Framework For Secondary Constructions Of Bent And Plateaued Functions
3
0.43
2018
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems.
3
0.41
2018
Bent Functions In C And D Outside The Completed Maiorana-Mcfarland Class
0
0.34
2017
Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus.
3
0.43
2017
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions.
1
0.35
2017
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n.
1
0.35
2017
On algebraic properties of S-boxes designed by means of disjoint linear codes
0
0.34
2016
Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling.
0
0.34
2016
Constructions of Bent—Negabent Functions and Their Relation to the Completed Maiorana—McFarland Class
11
0.62
2015
Optimizing The Placement Of Tap Positions
1
0.37
2014
Call for papers: systematic network optimizations for security parameters (security and communication networks).
0
0.34
2014
Generic related-key and induced chosen IV attacks using the method of key differentiation.
1
0.36
2013
On the approximation of S-boxes via Maiorana-McFarland functions
1
0.37
2013
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis.
3
0.43
2012
Parallelized Near-Duplicate Document Detection Algorithm for Large Scale Chinese Web Pages
0
0.34
2012
Guess and Determine Attacks on Filter Generators—Revisited
2
0.43
2012
On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces
3
0.39
2012
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity
4
0.39
2012
A New Correlation Attack on Nonlinear Combining Generators
0
0.34
2011
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
11
0.65
2011
New related-key rectangle attacks on reduced AES-192 and AES-256.
4
0.45
2009
Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers
1
0.37
2007
A construction of resilient functions with satisfying synthetical cryptographic criteria
1
0.38
2005
1