# Longjiang Qu

According to our database1, Longjiang Qu authored at least 104 papers between 2005 and 2021.

Collaborative distances:

Book
In proceedings
Article
PhD thesis
Other

## Bibliography

2021
New Constructions of Complete Permutations.
IEEE Trans. Inf. Theory, 2021

Finding Compositional Inverses of Permutations From the AGW Criterion.
IEEE Trans. Inf. Theory, 2021

Further Study of 2-to-1 Mappings Over F<sub>2<sup>n</sup></sub>.
IEEE Trans. Inf. Theory, 2021

A Complete Characterization of the APN Property of a Class of Quadrinomials.
IEEE Trans. Inf. Theory, 2021

Binary Linear Codes With Few Weights From Two-to-One Functions.
IEEE Trans. Inf. Theory, 2021

Autocorrelations of vectorial Boolean functions.
IACR Cryptol. ePrint Arch., 2021

On equivalence between known polynomial APN functions and power APN functions.
Finite Fields Their Appl., 2021

Cryptographically strong permutations from the butterfly structure.
Des. Codes Cryptogr., 2021

The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions.
Discret. Appl. Math., 2021

Two new infinite classes of APN functions.
CoRR, 2021

More permutations and involutions for constructing bent functions.
Cryptogr. Commun., 2021

Finding small solutions of the equation $\mathit{{Bx-Ay = z}}$ and its applications to cryptanalysis of the RSA cryptosystem.

2020
A New Construction of (<i>m</i>+<i>k</i>, <i>m</i>)-Functions with Low Differential Uniformity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Minimal linear codes from Maiorana-McFarland functions.
Finite Fields Their Appl., 2020

A link between two classes of permutation polynomials.
Finite Fields Their Appl., 2020

Finite Fields Their Appl., 2020

A new algorithm on the minimal rational fraction representation of feedback with carry shift registers.
Des. Codes Cryptogr., 2020

On two conjectures about the intersection distribution.
CoRR, 2020

A general method for finding the compositional inverses of permutations from the AGW criterion.
CoRR, 2020

On the Security of LWE Cryptosystem against Subversion Attacks.
Comput. J., 2020

New constructions of involutions over finite fields.
Cryptogr. Commun., 2020

Two classes of differentially 4-uniform permutations over 픽<sub>2<sup>n</sup></sub> with n even.

Constructing 1-resilient rotation symmetric functions over 픽<sub>p</sub> with q variables through special orthogonal arrays.

2019
Three Classes of Minimal Linear Codes Over the Finite Fields of Odd Characteristic.
IEEE Trans. Inf. Theory, 2019

On Two-to-One Mappings Over Finite Fields.
IEEE Trans. Inf. Theory, 2019

New Results About the Boomerang Uniformity of Permutation Polynomials.
IEEE Trans. Inf. Theory, 2019

New Classes of Efficient MDS Transformations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2.
Des. Codes Cryptogr., 2019

On the Differential-Linear Connectivity Table of Vectorial Boolean Functions.
CoRR, 2019

On the Differential Linear Connectivity Table of Vectorial Boolean Functions.
CoRR, 2019

Compositional inverses of permutation polynomials of the form x r h(x s ) over finite fields.
Cryptogr. Commun., 2019

Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.

Further study of 2-to-1 mappings over F2<sup>n</sup>.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

2018
Impossible Differential Cryptanalysis of Fantomas and Robin.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2018

New constructions of permutation polynomials of the form x<sup>r</sup> h(x <sup>q - 1</sup>) over 𝔽<sub>q<sup>2</sup></sub>.
Des. Codes Cryptogr., 2018

A lower dimension lattice attack on NTRU.
Sci. China Inf. Sci., 2018

A better bound for implicit factorization problem with shared middle bits.
Sci. China Inf. Sci., 2018

Permutation polynomials of the form cx + Tr<sub>q<sup>l</sup>/q</sub>(x<sup>a</sup>) and permutation trinomials over finite fields with even characteristic.
Cryptogr. Commun., 2018

New constructions of systematic authentication codes from three classes of cyclic codes.

2017
An equivalent condition on the switching construction of differentially 4-uniform permutations on from the inverse function.
Int. J. Comput. Math., 2017

Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

New classes of permutation binomials and permutation trinomials over finite fields.
Finite Fields Their Appl., 2017

New Constructions of Permutation Polynomials of the Form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$.
CoRR, 2017

Constructions of negabent functions over finite fields.
Cryptogr. Commun., 2017

2016
A New Approach to Constructing Quadratic Pseudo-Planar Functions Over F<sub>2</sub><sup>n</sup>.
IEEE Trans. Inf. Theory, 2016

New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Insights on AES-like SPN Ciphers.
IACR Cryptol. ePrint Arch., 2016

A new method to investigate the CCZ-equivalence between functions with low differential uniformity.
Finite Fields Their Appl., 2016

More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016

A New Approach to Constructing Quadratic Pseudo-Planar Functions over $\gf_{2^n}$.
CoRR, 2016

New Permutation Trinomials Constructed from Fractional Polynomials.
CoRR, 2016

New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽<sub>p</sub>.
Sci. China Inf. Sci., 2016

2015
Permutation Trinomials Over Finite Fields with Even Characteristic.
SIAM J. Discret. Math., 2015

A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2-Adic complexity of binary sequences with interleaved structure.
Finite Fields Their Appl., 2015

2014
A New Method to Compute the 2-Adic Complexity of Binary Sequences.
IEEE Trans. Inf. Theory, 2014

Dickson Polynomials of the Second Kind that Permute Z<sub>m</sub>.
SIAM J. Discret. Math., 2014

A recursive construction of highly nonlinear resilient vectorial functions.
Inf. Sci., 2014

When a Boolean Function can be Expressed as the Sum of two Bent Functions.
IACR Cryptol. ePrint Arch., 2014

An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on 𝔽<sub>2<sup>2k</sup></sub> from the Inverse Function.
IACR Cryptol. ePrint Arch., 2014

A Note on Cross Correlation Distribution of Ternary m-Sequences.
CoRR, 2014

On the Walsh spectrum of a family of quadratic APN functions with five terms.
Sci. China Inf. Sci., 2014

Some results on the differential functions over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Inf. Theory, 2013

On the Fourier Spectra of New APN Functions.
SIAM J. Discret. Math., 2013

New constructions of semi-bent functions in polynomial forms.
Math. Comput. Model., 2013

A note on vectorial bent functions.
Inf. Process. Lett., 2013

Linear complexity of binary sequences with interleaved structure.
IET Commun., 2013

On the Balanced Elementary Symmetric Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n.
Finite Fields Their Appl., 2013

More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$.
CoRR, 2013

New construction of perfect sequence set and low correlation zone sequence set.
Sci. China Inf. Sci., 2013

Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013

2012
On the number of rotation symmetric functions over GF(p).
Math. Comput. Model., 2012

New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.
Int. J. Found. Comput. Sci., 2012

A Comment on Algebraic Immunity of the Sum of Two Boolean Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A note on linearized polynomials and the dimension of their kernels.
Finite Fields Their Appl., 2012

Construction of highly nonlinear resilient S-boxes with given degree.
Des. Codes Cryptogr., 2012

New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Inf. Secur., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011

2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010

SQUARE attack on block ciphers with low algebraic degree.
Sci. China Inf. Sci., 2010

On the number of rotation symmetric Boolean functions.
Sci. China Inf. Sci., 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Constructing symmetric boolean functions with maximum algebraic immunity.
IEEE Trans. Inf. Theory, 2009

On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2009

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security, 12th International Conference, 2009

New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Minimum Distance between Bent and Resilient Boolean Functions.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
On the Construction of Boolean Functions With Optimal Algebraic Immunity.
IEEE Trans. Inf. Theory, 2008

Enumeration of Balanced Symmetric Functions over GF(p).
IACR Cryptol. ePrint Arch., 2008

On the 2<sup>m</sup>-variable symmetric Boolean functions with maximum algebraic immunity.
Sci. China Ser. F Inf. Sci., 2008

2007
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables.
IEEE Trans. Inf. Theory, 2007

Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
The Design Principle of Hash Function with Merkle-Damgård Construction.
IACR Cryptol. ePrint Arch., 2006

2005
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count.
IACR Cryptol. ePrint Arch., 2005