Xiutao Feng
Orcid: 0000-0003-4260-2571
  According to our database1,
  Xiutao Feng
  authored at least 48 papers
  between 2004 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
CNF Characterization of Sets over ℤ<sub>2</sub><sup>n</sup> and Its Applications in Cryptography.
    
  
    J. Syst. Sci. Complex., August, 2025
    
  
  2024
Towards a classification of permutation binomials of the form x<sup>i+ax</sup> over ${\mathbb {F}}_{2^n}$.
    
  
    Des. Codes Cryptogr., December, 2024
    
  
    Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
    
  
  2023
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited.
    
  
    Des. Codes Cryptogr., May, 2023
    
  
A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers.
    
  
    IACR Trans. Symmetric Cryptol., 2023
    
  
    IACR Cryptol. ePrint Arch., 2023
    
  
CNF Characterization of Sets over ℤ<sub>2<sup>n</sup></sub> and Its Applications in Cryptography.
    
  
    IACR Cryptol. ePrint Arch., 2023
    
  
A classification of permutation binomials of the form x<sup>i</sup>+ax over {F<sub>2<sup>n</sup></sub> for dimensions up to 8.
    
  
    CoRR, 2023
    
  
  2022
    J. Syst. Sci. Complex., 2022
    
  
    IACR Cryptol. ePrint Arch., 2022
    
  
  2021
    Des. Codes Cryptogr., 2021
    
  
  2020
  2019
    IEEE Trans. Inf. Theory, 2019
    
  
    Finite Fields Their Appl., 2019
    
  
    Finite Fields Their Appl., 2019
    
  
A recursive construction of permutation polynomials over F<sub>q<sup>2</sup></sub> with odd characteristic related to Rédei functions.
    
  
    Des. Codes Cryptogr., 2019
    
  
  2018
    Int. J. Bifurc. Chaos, 2018
    
  
  2017
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies.
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
A Recursive Construction of Permutation Polynomials over F<sub>q<sup>2</sup></sub> with Odd Characteristic from Rédei Functions.
    
  
    CoRR, 2017
    
  
  2016
On algebraic immunity of trace inverse functions on finite fields of characteristic two.
    
  
    J. Syst. Sci. Complex., 2016
    
  
    CoRR, 2016
    
  
  2015
    Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015
    
  
  2014
    IACR Cryptol. ePrint Arch., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    IACR Cryptol. ePrint Arch., 2014
    
  
    Proceedings of the Network and System Security - 8th International Conference, 2014
    
  
  2013
    IACR Cryptol. ePrint Arch., 2013
    
  
  2012
    Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
    
  
  2011
    Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
    
  
    Proceedings of the Coding and Cryptology - Third International Workshop, 2011
    
  
    Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
    
  
  2010
    IACR Cryptol. ePrint Arch., 2010
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
    
  
  2007
Classification and counting on multi-continued fractions and its application to multi-sequences.
    
  
    Sci. China Ser. F Inf. Sci., 2007
    
  
  2005
  2004
    Proceedings of the Sequences and Their Applications, 2004
    
  
    Proceedings of the Sequences and Their Applications, 2004
    
  
    Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004