Longjiang Qu
According to our database^{1},
Longjiang Qu
authored at least 72 papers
between 2005 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepage:

at orcid.org
On csauthors.net:
Bibliography
2019
New Results about the Boomerang Uniformity of Permutation Polynomials.
IACR Cryptology ePrint Archive, 2019
Constructing infinite families of low differential uniformity (n, m)functions with m > n / 2.
Des. Codes Cryptogr., 2019
Compositional inverses of permutation polynomials of the form x r h(x s ) over finite fields.
Cryptography and Communications, 2019
Further improvement of factoring N = p^{r} q^{s} with partial known bits.
Adv. in Math. of Comm., 2019
2018
Impossible Differential Cryptanalysis of Fantomas and Robin.
IEICE Transactions, 2018
Finding Small Solutions of the Equation BxAy=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptology ePrint Archive, 2018
Constructing Infinite Families of Low Differential Uniformity (n, m)Functions with m>n/2.
IACR Cryptology ePrint Archive, 2018
New constructions of permutation polynomials of the form x^{r} h(x ^{q  1}) over 𝔽_{q2}.
Des. Codes Cryptogr., 2018
A lower dimension lattice attack on NTRU.
SCIENCE CHINA Information Sciences, 2018
A better bound for implicit factorization problem with shared middle bits.
SCIENCE CHINA Information Sciences, 2018
Permutation polynomials of the form cx + Tr_{ql/q}(x^{a}) and permutation trinomials over finite fields with even characteristic.
Cryptography and Communications, 2018
New constructions of systematic authentication codes from three classes of cyclic codes.
Adv. in Math. of Comm., 2018
2017
An equivalent condition on the switching construction of differentially 4uniform permutations on from the inverse function.
Int. J. Comput. Math., 2017
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Transactions, 2017
New classes of permutation binomials and permutation trinomials over finite fields.
Finite Fields and Their Applications, 2017
Constructions of negabent functions over finite fields.
Cryptography and Communications, 2017
2016
A New Approach to Constructing Quadratic PseudoPlanar Functions Over F_{2}^{n}.
IEEE Trans. Information Theory, 2016
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Transactions, 2016
Construction of oddVariable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Transactions, 2016
A New Method to Investigate the CCZEquivalence between Functions with Low Differential Uniformity.
IACR Cryptology ePrint Archive, 2016
A new method to investigate the CCZequivalence between functions with low differential uniformity.
Finite Fields and Their Applications, 2016
More constructions of differentially 4uniform permutations on 𝔽_{22k}.
Des. Codes Cryptogr., 2016
New constructions of qvariable 1resilient rotation symmetric functions over 𝔽_{p}.
SCIENCE CHINA Information Sciences, 2016
New Insights on AESLike SPN Ciphers.
Proceedings of the Advances in Cryptology  CRYPTO 2016, 2016
2015
Permutation Trinomials Over Finite Fields with Even Characteristic.
SIAM J. Discrete Math., 2015
A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Transactions, 2015
2Adic complexity of binary sequences with interleaved structure.
Finite Fields and Their Applications, 2015
2014
A New Method to Compute the 2Adic Complexity of Binary Sequences.
IEEE Trans. Information Theory, 2014
Dickson Polynomials of the Second Kind that Permute Z_{m}.
SIAM J. Discrete Math., 2014
A recursive construction of highly nonlinear resilient vectorial functions.
Inf. Sci., 2014
When a Boolean Function can be Expressed as the Sum of two Bent Functions.
IACR Cryptology ePrint Archive, 2014
An Equivalent Condition on the Switching Construction of Differentially 4uniform Permutations on 𝔽_{22k} from the Inverse Function.
IACR Cryptology ePrint Archive, 2014
On the Walsh spectrum of a family of quadratic APN functions with five terms.
SCIENCE CHINA Information Sciences, 2014
Some results on the differential functions over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014
2013
Constructing Differentially 4Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Information Theory, 2013
On the Fourier Spectra of New APN Functions.
SIAM J. Discrete Math., 2013
New constructions of semibent functions in polynomial forms.
Mathematical and Computer Modelling, 2013
A note on vectorial bent functions.
Inf. Process. Lett., 2013
Linear complexity of binary sequences with interleaved structure.
IET Communications, 2013
On the Balanced Elementary Symmetric Boolean Functions.
IEICE Transactions, 2013
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Transactions, 2013
A negative answer to BrackenTanTan's problem on differentially 4uniform permutations over F2n.
Finite Fields and Their Applications, 2013
New construction of perfect sequence set and low correlation zone sequence set.
SCIENCE CHINA Information Sciences, 2013
Construction of evenvariable rotation symmetric Boolean functions with maximum algebraic immunity.
SCIENCE CHINA Information Sciences, 2013
2012
On the number of rotation symmetric functions over GF(p).
Mathematical and Computer Modelling, 2012
New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.
Int. J. Found. Comput. Sci., 2012
A Comment on Algebraic Immunity of the Sum of Two Boolean Functions.
IEICE Transactions, 2012
A note on linearized polynomials and the dimension of their kernels.
Finite Fields and Their Applications, 2012
Construction of highly nonlinear resilient Sboxes with given degree.
Des. Codes Cryptogr., 2012
New Families of Differentially 4Uniform Permutations over ${\mathbb F}_{2^{2k}}$.
Proceedings of the Sequences and Their Applications  SETA 2012, 2012
2011
Construction of OddVariable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011
Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Information Security, 2011
Construction of OddVariable Resilient Boolean Functions with Optimal Degree.
IEICE Transactions, 2011
Balanced 2pvariable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011
2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010
SQUARE attack on block ciphers with low algebraic degree.
SCIENCE CHINA Information Sciences, 2010
On the number of rotation symmetric Boolean functions.
SCIENCE CHINA Information Sciences, 2010
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy  15th Australasian Conference, 2010
2009
Constructing symmetric boolean functions with maximum algebraic immunity.
IEEE Trans. Information Theory, 2009
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Information Theory, 2009
Construction of OddVariable Boolean Function with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security, 12th International Conference, 2009
New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Minimum Distance between Bent and Resilient Boolean Functions.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
On the Construction of Boolean Functions With Optimal Algebraic Immunity.
IEEE Trans. Information Theory, 2008
Enumeration of Balanced Symmetric Functions over GF(p).
IACR Cryptology ePrint Archive, 2008
On the 2^{m}variable symmetric Boolean functions with maximum algebraic immunity.
Science in China Series F: Information Sciences, 2008
2007
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables.
IEEE Trans. Information Theory, 2007
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
The Design Principle of Hash Function with MerkleDamgård Construction.
IACR Cryptology ePrint Archive, 2006
2005
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count.
IACR Cryptology ePrint Archive, 2005