Xian-Mo Zhang

According to our database1, Xian-Mo Zhang authored at least 54 papers between 1990 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011

2009
Unconditionally secure disjointness tests for private datasets.
Int. J. Appl. Cryptogr., 2009

2008
Efficient Disjointness Tests for Private Datasets.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2006
Ideal Secret Sharing Schemes from Permutations.
Int. J. Netw. Secur., 2006

On Algebraic Immunity and Annihilators.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Proceedings of the Information Security and Cryptology, 2005

2004
The Generalized XOR Lemma.
Theor. Comput. Sci., 2004

Characterisations of Ideal Threshold Schemes.
Discret. Math. Theor. Comput. Sci., 2004

On Cheating Immune Secret Sharing.
Discret. Math. Theor. Comput. Sci., 2004

2003
Connections among nonlinearity, avalanche and correlation immunity.
Theor. Comput. Sci., 2003

2002
Multisecret Sharing Immune Against Cheating.
Informatica (Slovenia), 2002

Ideal Threshold Schemes from MDS Codes.
Proceedings of the Information Security and Cryptology, 2002

Ideal Threshold Schemes from Orthogonal Arrays.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Cheating Prevention in Linear Secret Sharing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
On plateaued functions.
IEEE Trans. Inf. Theory, 2001

Cheating Prevention in Secret Sharing over GF(p<sup>t</sup>).
Proceedings of the Progress in Cryptology, 2001

Constructions of Cheating Immune Secret Sharing.
Proceedings of the Information Security and Cryptology, 2001

2000
The kth-Order Nonhomomorphicity of S-Boxes.
J. Univers. Comput. Sci., 2000

Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptogr., 2000

Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

New Results on Correlation Immunity.
Proceedings of the Information Security and Cryptology, 2000

On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.
Proceedings of the Advances in Cryptology, 2000

1999
Restriction, Terms and Nonlinearity of Boolean Functions.
Theor. Comput. Sci., 1999

Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Relationships between Bent Functions and Complementary Plateaued Functions.
Proceedings of the Information Security and Cryptology, 1999

1998
The Nonhomomorphicity of Boolean Functions.
Proceedings of the Selected Areas in Cryptography '98, 1998

The nonhomomorphicity of S-boxes.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1997
Cryptographically resilient functions.
IEEE Trans. Inf. Theory, 1997

Duality of Boolean functions and its cryptographic significance.
Proceedings of the Information and Communication Security, First International Conference, 1997

New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes.
J. Univers. Comput. Sci., 1996

Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors.
Des. Codes Cryptogr., 1996

Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions.
Proceedings of the Advances in Cryptology, 1996

1995
Nonlinearity and Propagation Characteristics of Balanced Boolean Functions
Inf. Comput., May, 1995

GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions.
J. Univers. Comput. Sci., 1995

The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions.
J. Univers. Comput. Sci., 1995

On Nonlinear Resilient Functions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

1994
Comments on 'Generating and counting binary Bent sequences'.
IEEE Trans. Inf. Theory, 1994

Improving the Strict Avalanche Characteristics of Cryptographic Functions.
Inf. Process. Lett., 1994

Cryptographic Boolean functions via group Hadamard matrices.
Australas. J Comb., 1994

Construction of bent functions from two known bent functions.
Australas. J Comb., 1994

Relationships Among Nonlinear Criteria (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Pitfalls in Designing Substitution Boxes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1994

Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Regular sets of matrices and applications.
Graphs Comb., 1993

Semi-regular sets of matrices and applications.
Australas. J Comb., 1993

Some orthogonal matrices constructed by strong Kronecker multiplication.
Australas. J Comb., 1993

On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

Systematic Generation of Cryptographically Robust S-Boxes.
Proceedings of the CCS '93, 1993

1992
Product of Four Hadamard Matrices.
J. Comb. Theory, Ser. A, 1992

Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1992

1991
Some orthogonal designs and complex Hadamard matrices by using two Hadamard matrices.
Australas. J Comb., 1991

1990
Permutation Generators of Alternating Groups.
Proceedings of the Advances in Cryptology, 1990


  Loading...