Baofeng Wu

Orcid: 0000-0002-6567-9216

According to our database1, Baofeng Wu authored at least 50 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers.
J. Syst. Sci. Complex., December, 2023

New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey.
Comput. J., September, 2023

Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Revisiting the Boomerang Attack from a Perspective of 3-differential.
IACR Cryptol. ePrint Arch., 2023

Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques.
IACR Cryptol. ePrint Arch., 2023

2022
Towards non-independence of modular additions in searching differential trails of ARX ciphers: new automatic methods with application to SPECK and Chaskey.
CoRR, 2022

Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium.
CoRR, 2022

Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey.
IACR Cryptol. ePrint Arch., 2021

Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2.
IACR Cryptol. ePrint Arch., 2021

Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers.
Cybersecur., 2021

Balancedness and spectra of signed graphs obtained by $$\dot{H}$$-join operation.
Comput. Appl. Math., 2021

2020
Minimum fundamental cycle basis of some bipartite graphs.
AKCE Int. J. Graphs Comb., 2020

2019
Recent Results on Constructing Boolean Functions with (Potentially) Optimal Algebraic Immunity Based on Decompositions of Finite Fields.
J. Syst. Sci. Complex., 2019

Further results on permutation trinomials with Niho exponents.
Cryptogr. Commun., 2019

2018
Further Results on Generalized Bent Functions and Their Complete Characterization.
IEEE Trans. Inf. Theory, 2018

General constructions of permutation polynomials of the form (x2m+x+δ)i(2m-1)+1+x over F22m.
Finite Fields Their Appl., 2018

Three new infinite families of bent functions.
Sci. China Inf. Sci., 2018

Direct Constructions of (Involutory) MDS Matrices from Block Vandermonde and Cauchy-Like Matrices.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

Lightweight Recursive MDS Matrices with Generalized Feistel Network.
Proceedings of the Advances in Information and Computer Security, 2018

Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP.
Proceedings of the Information Security - 21st International Conference, 2018

2017
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies.
IACR Cryptol. ePrint Arch., 2017

Further results on permutation polynomials of the form (x<sup>p<sup>m</sup></sup>-x+δ)<sup>s</sup>+L(x) over F<sub>p<sup>2m</sup></sub>.
Finite Fields Their Appl., 2017

A general construction of permutation polynomials of the form (x<sup>2<sup>m</sup></sup>+x+δ)<sup>i(2<sup>m</sup>-1)+1</sup>+x over F<sub>2<sup>2m</sup></sub>.
CoRR, 2017

A two-port SRAM using a single-port cell array with a self-timed write-after-read control scheme to save 47% area & 63% standby power.
Proceedings of the 12th IEEE International Conference on ASIC, 2017

2016
Dembowski-Ostrom polynomials from reversed Dickson polynomials.
J. Syst. Sci. Complex., 2016

Designing Optimal Implementations of Linear Layers (Full Version).
IACR Cryptol. ePrint Arch., 2016

Construction of MDS block diffusion matrices for block ciphers and hash functions.
Sci. China Inf. Sci., 2016

Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
A combinatorial condition and Boolean functions with optimal algebraic immunity.
J. Syst. Sci. Complex., 2015

On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions.
IACR Cryptol. ePrint Arch., 2015

On constructing complete permutation polynomials over finite fields of even characteristic.
Discret. Appl. Math., 2015

Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the dual of generalized Boolean bent functions over ℤ4.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
A note on two classes of Boolean functions with optimal algebraic immunity.
J. Syst. Sci. Complex., 2014

Constructing 2<i>M</i>-variable Boolean Functionswith Optimal Algebraic Immunity Based on Polar Decomposition of.
Int. J. Found. Comput. Sci., 2014

The compositional inverse of a class of linearized permutation polynomials over 𝔽<sub>2<sup>n</sup></sub>, n odd.
Finite Fields Their Appl., 2014

Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields.
CoRR, 2014

Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract).
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

New classes of quadratic bent functions in polynomial forms.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
The compositional inverse of a class of bilinear permutation polynomials over finite fields of characteristic 2.
Finite Fields Their Appl., 2013

Linearized polynomials over finite fields revisited.
Finite Fields Their Appl., 2013

A remark on algebraic immunity of Boolean functions
CoRR, 2013

Constructing $2m$-variable Boolean functions with optimal algebraic immunity based on polar decomposition of $\mathbb{F}_{2^{2m}}^*$
CoRR, 2013

New constructions of quaternary bent functions.
CoRR, 2013

2012
Constructing Generalized Bent Functions from Trace Forms of Galois Rings.
Proceedings of the Computer Mathematics, 2012

2011
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity.
IACR Cryptol. ePrint Arch., 2011

1-Resilient Boolean Function with Optimal Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2011

A new proof to the complexity of the dual basis of a type I optimal normal basis
CoRR, 2011

2007
Strong global convergence of an adaptive nonmonotone memory gradient method.
Appl. Math. Comput., 2007


  Loading...