Longjiang Qu

According to our database1, Longjiang Qu authored at least 72 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
New Results about the Boomerang Uniformity of Permutation Polynomials.
IACR Cryptology ePrint Archive, 2019

Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2.
Des. Codes Cryptogr., 2019

Compositional inverses of permutation polynomials of the form x r h(x s ) over finite fields.
Cryptography and Communications, 2019

Further improvement of factoring N = pr qs with partial known bits.
Adv. in Math. of Comm., 2019

2018
Impossible Differential Cryptanalysis of Fantomas and Robin.
IEICE Transactions, 2018

Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem.
IACR Cryptology ePrint Archive, 2018

Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m>n/2.
IACR Cryptology ePrint Archive, 2018

New constructions of permutation polynomials of the form xr h(x q - 1) over 𝔽q2.
Des. Codes Cryptogr., 2018

A lower dimension lattice attack on NTRU.
SCIENCE CHINA Information Sciences, 2018

A better bound for implicit factorization problem with shared middle bits.
SCIENCE CHINA Information Sciences, 2018

Permutation polynomials of the form cx + Trql/q(xa) and permutation trinomials over finite fields with even characteristic.
Cryptography and Communications, 2018

New constructions of systematic authentication codes from three classes of cyclic codes.
Adv. in Math. of Comm., 2018

2017
An equivalent condition on the switching construction of differentially 4-uniform permutations on from the inverse function.
Int. J. Comput. Math., 2017

Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key.
IEICE Transactions, 2017

New classes of permutation binomials and permutation trinomials over finite fields.
Finite Fields and Their Applications, 2017

Constructions of negabent functions over finite fields.
Cryptography and Communications, 2017

2016
A New Approach to Constructing Quadratic Pseudo-Planar Functions Over F2n.
IEEE Trans. Information Theory, 2016

New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions.
IEICE Transactions, 2016

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
IEICE Transactions, 2016

A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity.
IACR Cryptology ePrint Archive, 2016

A new method to investigate the CCZ-equivalence between functions with low differential uniformity.
Finite Fields and Their Applications, 2016

More constructions of differentially 4-uniform permutations on 𝔽22k.
Des. Codes Cryptogr., 2016

New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽p.
SCIENCE CHINA Information Sciences, 2016

New Insights on AES-Like SPN Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Permutation Trinomials Over Finite Fields with Even Characteristic.
SIAM J. Discrete Math., 2015

A New Attack on RSA with Known Middle Bits of the Private Key.
IEICE Transactions, 2015

2-Adic complexity of binary sequences with interleaved structure.
Finite Fields and Their Applications, 2015

2014
A New Method to Compute the 2-Adic Complexity of Binary Sequences.
IEEE Trans. Information Theory, 2014

Dickson Polynomials of the Second Kind that Permute Zm.
SIAM J. Discrete Math., 2014

A recursive construction of highly nonlinear resilient vectorial functions.
Inf. Sci., 2014

When a Boolean Function can be Expressed as the Sum of two Bent Functions.
IACR Cryptology ePrint Archive, 2014

An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on 𝔽22k from the Inverse Function.
IACR Cryptology ePrint Archive, 2014

On the Walsh spectrum of a family of quadratic APN functions with five terms.
SCIENCE CHINA Information Sciences, 2014

Some results on the differential functions over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Information Theory, 2013

On the Fourier Spectra of New APN Functions.
SIAM J. Discrete Math., 2013

New constructions of semi-bent functions in polynomial forms.
Mathematical and Computer Modelling, 2013

A note on vectorial bent functions.
Inf. Process. Lett., 2013

Linear complexity of binary sequences with interleaved structure.
IET Communications, 2013

On the Balanced Elementary Symmetric Boolean Functions.
IEICE Transactions, 2013

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation.
IEICE Transactions, 2013

A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n.
Finite Fields and Their Applications, 2013

New construction of perfect sequence set and low correlation zone sequence set.
SCIENCE CHINA Information Sciences, 2013

Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
SCIENCE CHINA Information Sciences, 2013

2012
On the number of rotation symmetric functions over GF(p).
Mathematical and Computer Modelling, 2012

New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties.
Int. J. Found. Comput. Sci., 2012

A Comment on Algebraic Immunity of the Sum of Two Boolean Functions.
IEICE Transactions, 2012

A note on linearized polynomials and the dimension of their kernels.
Finite Fields and Their Applications, 2012

Construction of highly nonlinear resilient S-boxes with given degree.
Des. Codes Cryptogr., 2012

New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

2011
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Information Security, 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
IEICE Transactions, 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011

2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010

SQUARE attack on block ciphers with low algebraic degree.
SCIENCE CHINA Information Sciences, 2010

On the number of rotation symmetric Boolean functions.
SCIENCE CHINA Information Sciences, 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Constructing symmetric boolean functions with maximum algebraic immunity.
IEEE Trans. Information Theory, 2009

On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions.
IEEE Trans. Information Theory, 2009

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Information Security, 12th International Conference, 2009

New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Minimum Distance between Bent and Resilient Boolean Functions.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
On the Construction of Boolean Functions With Optimal Algebraic Immunity.
IEEE Trans. Information Theory, 2008

Enumeration of Balanced Symmetric Functions over GF(p).
IACR Cryptology ePrint Archive, 2008

On the 2m-variable symmetric Boolean functions with maximum algebraic immunity.
Science in China Series F: Information Sciences, 2008

2007
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables.
IEEE Trans. Information Theory, 2007

Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
The Design Principle of Hash Function with Merkle-Damgård Construction.
IACR Cryptology ePrint Archive, 2006

2005
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count.
IACR Cryptology ePrint Archive, 2005


  Loading...