Xiyong Zhang

According to our database1, Xiyong Zhang authored at least 26 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Model and criteria on the global finite-time synchronization of the chaotic gyrostat systems.
Math. Comput. Simul., 2020

2019
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
Ad Hoc Networks, 2019

2017
More constructions of near optimal codebooks associated with binary sequences.
Adv. Math. Commun., 2017

2016
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

2015
Trace self-orthogonal relations of normal bases.
Finite Fields Their Appl., 2015

2014
Finding normal bases over finite fields with prescribed trace self-orthogonal relations.
Finite Fields Their Appl., 2014

2013
On the conjecture about the nonexistence of rotation symmetric bent functions
CoRR, 2013

2012
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions.
IEEE Trans. Inf. Theory, 2012

A method of evaluation of exponential sum of binary quadratic functions.
Finite Fields Their Appl., 2012

2011
Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables.
IEEE Trans. Inf. Theory, 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Characterizations of Bent and Almost Bent Function on \mathbb<i>Z</i><sub><i>p</i></sub><sup>2</sup>.
Graphs Comb., 2011

Proof of a conjecture about rotation symmetric functions.
Discret. Math., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

Proof of a Conjecture about Rotation Symmetric Functions
CoRR, 2010

2009
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Electron. Notes Theor. Comput. Sci., 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

On perfect nonlinear functions (Pi).
Appl. Algebra Eng. Commun. Comput., 2008

2007
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007

2006
Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006

A Note of Perfect Nonlinear Functions.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...