Jian Zou
Orcid: 0000-0002-0864-0905Affiliations:
- Fuzhou University, College of Mathematics and Computer Science, Fuzhou, China
According to our database1,
Jian Zou
authored at least 24 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Further results on the (-1)-differential uniformity of some functions over finite fields with odd characteristic.
Appl. Algebra Eng. Commun. Comput., July, 2025
2023
Finite Fields Their Appl., December, 2023
Further results on several classes of optimal ternary cyclic codes with minimum distance four.
IACR Cryptol. ePrint Arch., 2023
The <i>c</i>-differential uniformity and boomerang uniformity of three classes of permutation polynomials over F2n.
Finite Fields Their Appl., 2023
2022
Quantum Inf. Process., 2022
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022
2021
2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
IET Inf. Secur., 2018
2015
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes.
IET Inf. Secur., 2015
2014
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014
2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptol. ePrint Arch., 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011